SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 363
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Anju Panicker1, Ankita Bhavsar2, Monika Mandge3, Pooja Bothara4
1Anju Panicker, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik
2Ankita Bhavsar, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik
3Monika Mandge, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik
4Pooja Bothara, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing known to be the latest
development in data center technology. User use to store their
confidential data on cloud, so security and data integrity is
main concern while using cloud services. Thus, enablingpublic
auditability for cloud storage is of critical importance so that
users can resort to a third-party auditor (TPA) to check the
integrity of outsourced data and be worry free, butwhile using
TPA, there is chances of data leakage from TPA, so we are
handling data leakage from TPA. Along with that in our
system extensive security and performanceanalysisishandled
by encryption algorithms like AES , RSA.
Key Words: Privacy preserving, Public auditability,Random
masking, Encryption algorithms, Batch auditing.
1. INTRODUCTION
The recently emerged cloud computing, known to be the
latest development in data center technology. Users can
remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of
configurable computing resources, without the burden of
local data storage andmaintenance.Fromuser’s perspective,
including both individuals and IT enterprises, storing data
remotely to the cloud in a flexible on-demandmannerbrings
appealing benefits relief of the burden for storage
management,universal data access with location
independence. While cloud computing makes these
advantages more appealing than ever, it also bringsnewand
challenging security threats toward user’ s outsourced data.
As users no longer physically possess the storage of their
data, To fully ensure the data integrity and save the cloud
user’ s computation resources as well as online burden, it is
of critical importance to enable public auditing service for
cloud data storage, so that users may resort to an
independent third-party auditor (TPA) to audit the
outsourced data when needed. The TPA, who has expertise
and capabilities that users do not, can periodically check the
integrity of all the data stored in the cloud on behalf of the
users, which provides a much more easier and affordable
way for the users to ensure their storage correctness in the
cloud. In these paper we are also focusing on encryption
algorithms for data security and data integrity.Forextensive
security and integrity we are using encryption algorithm. In
symmetric algorithm, both parties share the secret key for
both encryption/decryption, and from privacy perceptive it
is important that this key is not compromised, because
cascading data will then be compromised. On theother hand
in asymmetric algorithm uses Pairs of keys,ofwhichonekey
is used for encryption while other key is usedfordecryption.
In this paper to check the performance analysis one of
symmetric algorithm and one of theasymmetricalgorithmis
used i.e. AES and RSA. Multilevel trust has been identified as
vital component for establishing and maintaining successful
relational exchanges between e-commerce trading partners
in cloud environment.
2. LITERATURE SURVEY
[1] G. Ateniese, R. Burns, R. Curtmola , J. Herring, L. Kissner,
Z.Peterson, and D. Song, “Provable Data Possession at
Untrusted Stores,” In this paper publicauditabilityisdefined
as “provable data possession”model forensuringpossession
of files on untrusted storages. In their scheme, they utilize
RSA-based homomorphic tags for auditing outsourced data,
thus public auditability is achieved. However, they do not
consider the case of dynamic data storage, and the direct
extension of their scheme from static data storage to
dynamic case may suffer design and security problems.
[2] Chang Liu*, Rajiv Ranjan+, Xuyun Zhang*, Chi Yang*,
Dimitrios Georgakopoulos+, JinjunChen,“PublicAuditingfor
Big Data Storage in Cloud Computing -- A Survey”, In this
paper we provide an analysis on authenticator-based
efficient data integrity verification. In their scheme, they
introduce two standard signature schemes (RSA and BLS)
and one authenticated data structure (MHT). For Dynamic
data possession they utilized another authenticated data
structure rank-based skip list mainly for verification of
updates. They also proposed a new scheme that can support
both dynamic data and public verifiability at the same time.
Although the current formalizations and security model
seemed very rigorous and potent, new exploits can always
exist, especially with dynamic data streamsandvaryinguser
groups. Finding the security holes and fixing them can be a
long-lasting game.
[3] Prof. D. N. Rewadkar, Suchita Y. Ghatage, Cloud Storage
System Enabling Secure Privacy Preserving Third Party
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 364
Audit. This article studies the problems of ensuring data
storage correctness and proposes an efficient and secure
method to address these issues. A homomorphic encryption
scheme is used to encrypt the data which will besharedwith
the TPA. In this they analyzed two basic schemes MACbased
solution and HLA based solution. HLA allows efficient data
auditing and consumes only constant bandwidth. However
HLA technique may reveal user data information to TPA as
he can simply solve a system of linear equations used in the
HLA technique. So it violates the privacy preserving
guarantee.
3. PROPOSED MODEL
In this paper, we utilize the public key based homomorphic
authenticator and uniquely integrate it with random mask
technique to achieve a privacy-preserving public auditing
system for cloud data storage security. Enabling public
auditability for cloud storage is of critical importancesothat
users can resort to a third-party auditor (TPA) to check the
integrity of outsourced data. TPA to support batch auditing.
In previous papers several schemes are proposed for data
security and data integrity but new exploits can alwaysexist
in system so to handle the security issue we are using two
different encryption algorithms like AES and RSA . In order
to find out which is more efficient we are comparing them.
3.1 Algorithm used
1. Advanced Encryption Standard (AES)
Advanced Encryption Standard is a symmetric key
cryptographic algorithm which means same key is used to
both encrypt and decrypt data. Also cipher text produced
by AES algorithm is the same size as the plain text data.
2. Ron Rivest, Adi Shamir, Leonard Aldmen (RSA)
Rivest, Shamir, Aldmen is asymmetric key cryptographic
algorithm which means two different keys are used during
encryption and decryption process .It is block cipher which
converts plain text into cipher text at sender side and vice
versa at receiver side.
3.2 System Architecture
Fig -1: System Diagram
The cloud user, who has large amount of data files to be
stored in the cloud. The cloud server, which is managed by
the cloud service provider to provide data storage service
and has storage space andcomputationresources.Thethird-
party auditor, who has expertise and capabilities that cloud
users do not have and is trusted to assess the cloud storage
service reliability on behalf of the user upon request. Users
rely on the CS for cloud data storage and maintenance. In
this system two algorithms AES and RSA are compared in
terms of time and security. TPA to audit user’s data which is
stored on cloud and also data leakage from TPA is handled.
4. OBJECTIVES
Following are the objectives of the system:-
1. We encourage the public auditing system of data storage
security in cloud computing and provide a privacy
preserving auditing record. Our scheme enables an Third
Party Auditor (TPA) to audit user’s cloud data without
learning the data content.
2. This scheme achieves batch auditing where multiple
authorized auditing tasks from different users can be
performed simultaneously by the TPA in a privacy-
preserving manner.
3. Privacy is main concern in the cloud storage In order to
preserve privacy many algorithms are been adapted but in
this paper we are mainly focusing on AES and RSA.
5. CONCLUSIONS
In these system we propose a privacy- preserving public
auditing system fordata storagesecurityincloudcomputing.
To achieve privacy-preserving public auditing, we propose
to uniquely integrate the homomorphic linear authenticator
with random maskingtechnique. Thirdpartyauditortoaudit
users data on cloud to maintain integrity. TPA would not
learn any knowledge about the data content stored on the
cloud server during the data auditing process. These system
also used to prevent data leakage.
ACKNOWLEDGEMENT
With all respect and gratitude, we would like to thank all the
people who have helped us directly or indirectly for the
completion of the project “Secure Privacy Preserving Using
Multilevel Trust For Cloud Storage”. We express ourheartily
gratitude towards Prof. S.P.Jadhav for guiding us to
understand the work conceptually and also for his constant
encouragement to completetheproject.Ourassociation with
his as a student has been extremely inspiring. We would like
to give our sincere thanks to Prof. V. S. Patil, Head of the
Department of Information Technology for his technical
support and constant encouragement. We would also like to
extend our sincere thanks to our Principal Dr.K.S.Holkarfor
his help and support in all respects. We would also like to
thank all our staff members and collogues who helped us
directly or indirectly throughout our dissertation work.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 365
REFERENCES
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-
Preserving Public Auditing for Storage SecurityinCloud
Computing,” Proc.IEEE INFOCOM ’10, Mar. 2010.
[2] Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian
Wang, Member,IEEE, KuiRen, Senior Member,IEEE,and
Wenjing Lou, Senior Member, IEEE,”Privacy-Preserving
Public Auditing for Secure Cloud Storage” IEEE
Transactions on Computers, vol. 62, no. 2, February 2013.
[3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,
Z.Peterson, and D. Song, “Provable Data Possession at
UntrustedStores,” Proc. 14th ACM Conf. Computer and
Comm. Security(CCS ’07), pp. 598-609, 2007.
[4] Prof. D. N. Rewadkar, Suchita Y. Ghatage, “Cloud Storage
System Enabling Secure Privacy Preserving Third Party
Audit” 2014 International Conference on Control,
Instrumentation, Communication and Computational
Technologies (ICCICCT).
[5] Chang Liu*, Rajiv Ranjan+, Xuyun Zhang*, Chi Yang*,
Dimitrios Georgakopoulos+, Jinjun Chen, “Public
Auditing for Big Data Storage in Cloud Computing -- A
Survey”2013 IEEE 16th International Conference on
Computational Science and Engineering.
[6] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling
Public Auditability and Data Dynamics for Storage
Security in Cloud Computing," IEEE Transactions on
Parallel and Distributed Systems, vol. 22, pp. 847 - 859,
2011.
[7] Cloud Security Alliance, “Top Threats to Cloud
Computing,”http://www.cloudsecurityalliance.org,
2010.

More Related Content

PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
Paper id 27201448
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Survey on securing outsourced storages in cloud
PDF
Survey on securing outsourced storages in cloud
PDF
Data Search in Cloud using the Encrypted Keywords
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Paper id 27201448
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Data Search in Cloud using the Encrypted Keywords

What's hot (20)

PDF
Ijariie1196
PDF
IJARCCE 20
PDF
H1803035056
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Accessing secured data in cloud computing environment
PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
PDF
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
3 ijece 1 ed iqbal qc
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
Ijariie1196
IJARCCE 20
H1803035056
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Accessing secured data in cloud computing environment
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET - Multimedia Security on Cloud Computing using Cryptography
3 ijece 1 ed iqbal qc
Cloud Auditing With Zero Knowledge Privacy
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
Ad

Similar to Secure Privacy Preserving Using Multilevel Trust For Cloud Storage (20)

PDF
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
50120140507005
PDF
50120140507005 2
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PDF
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Implementation of De-Duplication Algorithm
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
International Journal of Computational Engineering Research(IJCER)
50120140507005
50120140507005 2
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Third Party Public Auditing Scheme for Security in Cloud Storage
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Implementation of De-Duplication Algorithm
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
web development for engineering and engineering
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Geodesy 1.pptx...............................................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
PPT on Performance Review to get promotions
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
composite construction of structures.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
573137875-Attendance-Management-System-original
OOP with Java - Java Introduction (Basics)
web development for engineering and engineering
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Foundation to blockchain - A guide to Blockchain Tech
Geodesy 1.pptx...............................................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT on Performance Review to get promotions
Operating System & Kernel Study Guide-1 - converted.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CYBER-CRIMES AND SECURITY A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
bas. eng. economics group 4 presentation 1.pptx
composite construction of structures.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 363 Secure Privacy Preserving Using Multilevel Trust For Cloud Storage Anju Panicker1, Ankita Bhavsar2, Monika Mandge3, Pooja Bothara4 1Anju Panicker, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 2Ankita Bhavsar, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 3Monika Mandge, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 4Pooja Bothara, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing known to be the latest development in data center technology. User use to store their confidential data on cloud, so security and data integrity is main concern while using cloud services. Thus, enablingpublic auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free, butwhile using TPA, there is chances of data leakage from TPA, so we are handling data leakage from TPA. Along with that in our system extensive security and performanceanalysisishandled by encryption algorithms like AES , RSA. Key Words: Privacy preserving, Public auditability,Random masking, Encryption algorithms, Batch auditing. 1. INTRODUCTION The recently emerged cloud computing, known to be the latest development in data center technology. Users can remotely store their data and enjoy the on-demand high- quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage andmaintenance.Fromuser’s perspective, including both individuals and IT enterprises, storing data remotely to the cloud in a flexible on-demandmannerbrings appealing benefits relief of the burden for storage management,universal data access with location independence. While cloud computing makes these advantages more appealing than ever, it also bringsnewand challenging security threats toward user’ s outsourced data. As users no longer physically possess the storage of their data, To fully ensure the data integrity and save the cloud user’ s computation resources as well as online burden, it is of critical importance to enable public auditing service for cloud data storage, so that users may resort to an independent third-party auditor (TPA) to audit the outsourced data when needed. The TPA, who has expertise and capabilities that users do not, can periodically check the integrity of all the data stored in the cloud on behalf of the users, which provides a much more easier and affordable way for the users to ensure their storage correctness in the cloud. In these paper we are also focusing on encryption algorithms for data security and data integrity.Forextensive security and integrity we are using encryption algorithm. In symmetric algorithm, both parties share the secret key for both encryption/decryption, and from privacy perceptive it is important that this key is not compromised, because cascading data will then be compromised. On theother hand in asymmetric algorithm uses Pairs of keys,ofwhichonekey is used for encryption while other key is usedfordecryption. In this paper to check the performance analysis one of symmetric algorithm and one of theasymmetricalgorithmis used i.e. AES and RSA. Multilevel trust has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. 2. LITERATURE SURVEY [1] G. Ateniese, R. Burns, R. Curtmola , J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” In this paper publicauditabilityisdefined as “provable data possession”model forensuringpossession of files on untrusted storages. In their scheme, they utilize RSA-based homomorphic tags for auditing outsourced data, thus public auditability is achieved. However, they do not consider the case of dynamic data storage, and the direct extension of their scheme from static data storage to dynamic case may suffer design and security problems. [2] Chang Liu*, Rajiv Ranjan+, Xuyun Zhang*, Chi Yang*, Dimitrios Georgakopoulos+, JinjunChen,“PublicAuditingfor Big Data Storage in Cloud Computing -- A Survey”, In this paper we provide an analysis on authenticator-based efficient data integrity verification. In their scheme, they introduce two standard signature schemes (RSA and BLS) and one authenticated data structure (MHT). For Dynamic data possession they utilized another authenticated data structure rank-based skip list mainly for verification of updates. They also proposed a new scheme that can support both dynamic data and public verifiability at the same time. Although the current formalizations and security model seemed very rigorous and potent, new exploits can always exist, especially with dynamic data streamsandvaryinguser groups. Finding the security holes and fixing them can be a long-lasting game. [3] Prof. D. N. Rewadkar, Suchita Y. Ghatage, Cloud Storage System Enabling Secure Privacy Preserving Third Party
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 364 Audit. This article studies the problems of ensuring data storage correctness and proposes an efficient and secure method to address these issues. A homomorphic encryption scheme is used to encrypt the data which will besharedwith the TPA. In this they analyzed two basic schemes MACbased solution and HLA based solution. HLA allows efficient data auditing and consumes only constant bandwidth. However HLA technique may reveal user data information to TPA as he can simply solve a system of linear equations used in the HLA technique. So it violates the privacy preserving guarantee. 3. PROPOSED MODEL In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security. Enabling public auditability for cloud storage is of critical importancesothat users can resort to a third-party auditor (TPA) to check the integrity of outsourced data. TPA to support batch auditing. In previous papers several schemes are proposed for data security and data integrity but new exploits can alwaysexist in system so to handle the security issue we are using two different encryption algorithms like AES and RSA . In order to find out which is more efficient we are comparing them. 3.1 Algorithm used 1. Advanced Encryption Standard (AES) Advanced Encryption Standard is a symmetric key cryptographic algorithm which means same key is used to both encrypt and decrypt data. Also cipher text produced by AES algorithm is the same size as the plain text data. 2. Ron Rivest, Adi Shamir, Leonard Aldmen (RSA) Rivest, Shamir, Aldmen is asymmetric key cryptographic algorithm which means two different keys are used during encryption and decryption process .It is block cipher which converts plain text into cipher text at sender side and vice versa at receiver side. 3.2 System Architecture Fig -1: System Diagram The cloud user, who has large amount of data files to be stored in the cloud. The cloud server, which is managed by the cloud service provider to provide data storage service and has storage space andcomputationresources.Thethird- party auditor, who has expertise and capabilities that cloud users do not have and is trusted to assess the cloud storage service reliability on behalf of the user upon request. Users rely on the CS for cloud data storage and maintenance. In this system two algorithms AES and RSA are compared in terms of time and security. TPA to audit user’s data which is stored on cloud and also data leakage from TPA is handled. 4. OBJECTIVES Following are the objectives of the system:- 1. We encourage the public auditing system of data storage security in cloud computing and provide a privacy preserving auditing record. Our scheme enables an Third Party Auditor (TPA) to audit user’s cloud data without learning the data content. 2. This scheme achieves batch auditing where multiple authorized auditing tasks from different users can be performed simultaneously by the TPA in a privacy- preserving manner. 3. Privacy is main concern in the cloud storage In order to preserve privacy many algorithms are been adapted but in this paper we are mainly focusing on AES and RSA. 5. CONCLUSIONS In these system we propose a privacy- preserving public auditing system fordata storagesecurityincloudcomputing. To achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic linear authenticator with random maskingtechnique. Thirdpartyauditortoaudit users data on cloud to maintain integrity. TPA would not learn any knowledge about the data content stored on the cloud server during the data auditing process. These system also used to prevent data leakage. ACKNOWLEDGEMENT With all respect and gratitude, we would like to thank all the people who have helped us directly or indirectly for the completion of the project “Secure Privacy Preserving Using Multilevel Trust For Cloud Storage”. We express ourheartily gratitude towards Prof. S.P.Jadhav for guiding us to understand the work conceptually and also for his constant encouragement to completetheproject.Ourassociation with his as a student has been extremely inspiring. We would like to give our sincere thanks to Prof. V. S. Patil, Head of the Department of Information Technology for his technical support and constant encouragement. We would also like to extend our sincere thanks to our Principal Dr.K.S.Holkarfor his help and support in all respects. We would also like to thank all our staff members and collogues who helped us directly or indirectly throughout our dissertation work.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 365 REFERENCES [1] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Storage SecurityinCloud Computing,” Proc.IEEE INFOCOM ’10, Mar. 2010. [2] Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member,IEEE, KuiRen, Senior Member,IEEE,and Wenjing Lou, Senior Member, IEEE,”Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, vol. 62, no. 2, February 2013. [3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at UntrustedStores,” Proc. 14th ACM Conf. Computer and Comm. Security(CCS ’07), pp. 598-609, 2007. [4] Prof. D. N. Rewadkar, Suchita Y. Ghatage, “Cloud Storage System Enabling Secure Privacy Preserving Third Party Audit” 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). [5] Chang Liu*, Rajiv Ranjan+, Xuyun Zhang*, Chi Yang*, Dimitrios Georgakopoulos+, Jinjun Chen, “Public Auditing for Big Data Storage in Cloud Computing -- A Survey”2013 IEEE 16th International Conference on Computational Science and Engineering. [6] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 847 - 859, 2011. [7] Cloud Security Alliance, “Top Threats to Cloud Computing,”http://www.cloudsecurityalliance.org, 2010.