Research Article | Open Access | Download PDF
Volume 7 | Issue 1 | Year 2017 | Article Id. IJPTT-V7I1P404 | DOI : https://doi.org/10.14445/22492615/IJPTT-V7I1P404Securing the Data in Cloud by Code Generation Method in Two- Tier Architecture
K.Sathya, Mr. Syed Ismail .A
Citation :
K.Sathya, Mr. Syed Ismail .A, "Securing the Data in Cloud by Code Generation Method in Two- Tier Architecture," International Journal of Computer Trends and Technology (IJCTT), vol. 7, no. 1, pp. 15-21, 2017. Crossref, https://doi.org/10.14445/22492615/IJPTT-V7I1P404
Abstract
The cloud security is one of the important roles in cloud. In this paper, the regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Here we can overcome the security issues in our project. In existing they are using a remote verification technique to audit by the third party or private auditing. In this project the data owners need to be online to manage that auditing. In our system we are using the own auditing based on the token generation. Using this token generation technique compare the token values from original tokens we can find out the changes about the file. Generally users can login into their account then they upload our files. The files will be stored into the cloud storage. In this project we provide the two tier security for our uploaded files. The files does not stored directly it will be divided into the three files, it will be stored into three different cloud server locations. The original file content split into three parts and it will be store into each files. Not only stored also the content will be encrypted in the cloud server. If anyone try to hack at the cloud end is not possible to break the two tier block. They need first decrypt the files and also combine first decrypt the files and also combine the splited files from three different locations. Anyone can download the files from the server with file owner permission. At the time of download key generated (code based key generation) and it will send to the file owner. Every data stored in the cloud will be generated with the Code generation (Token generation) technique, So that the security will be maintained. Once any unauthorized modification is made, the original data in the private cloud will be retrieved by the Owner and will be returned to the user.
Keywords
Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure.
References
1) B. Wang, B. Li, and H. Li, “Oruta: Privacy- Preserving
PublicAuditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf.Cloud
Computing, pp. 295-302, 2012.
2) M. Armbrust, A. Fox, R. Griffith, A.D. Joseph
3) R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol.
53, no. 4, pp. 50-58, Apr. 2010.
4) K. Ren, C. Wang, and Q. Wang, “Security Challenges for the
Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69- 73, 2012.
5) D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data
Protection for the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012.
6) C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving
Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE
INFOCOM, pp. 525-533, 2010.
7) B. Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted
Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf. Comm. and Network
Security (CNS ’13), pp. 90-99, 2013.
8) R. Rivest, A. Shamir, and L. Adleman, “A Method for
Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21,
no. 2, pp. 120-126, 1978.
9) The MD5 Message-Digest Algorithm (RFC1321). https://tools.
ietf.org/html/rfc1321, 2014.
10) G. Ateniese, R. Burns, R. Curtmola, J. Herring, 1
1) L. Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm.
Security (CCS ’07), pp. 598-610, 2007.
12) H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology
and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90- 107,
2008.
13) C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,
“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm.
Security (CCS’09), pp. 213-222, 2009.
14) Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling
Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,”
Proc. 14th European Conf. Research in Computer Security (ESORICS’09), pp.
355-370, 2009.
15) C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data
Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of
Service (IWQoS’09), pp. 1-9, 2009.
16) B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote
Data Checking for Network Coding-Based Distributed Storage Systems,” Proc. ACM
Workshop Cloud Computing Security Workshop (CCSW’10), pp. 31-42, 2010.