Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data

G.Dileep Kumar, A.Sreenivasa Rao, , ,
Affiliations
M.Tech (CS), Department of Computer Science & Engineering, Malla Reddy College Of Engineering
Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
:NOT ASSIGNED


Abstract
In this paper, we distinguish the framework prerequisites and difficulties toward accomplishing privacy preserving outsourced cloud data services, usable configuration and basically effective quest plans for scrambled cloud storage. We are exhibiting a general approach for these utilizing searchable encryption methods, which permits scrambled data to be sought by clients without leaking data about the data itself and client's solicitation. Empowering open review capacity for cloud storage is of discriminating significance with the goal that clients can utilize something like a third party auditor (TPA) to check the trustworthiness of outsourced data and can be effortless. To proficiently present a compelling TPA, the examining procedure ought to get no new vulnerabilities towards client data protection, and help to evade extra online weight to client. We propose a protected and productive cloud storage framework supporting privacy preserving open sourced cloud storage data.


Citation
G.Dileep Kumar,A.Sreenivasa Rao."Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.767-770, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1114.pdf,


Keywords : Trusted third party auditor (TPA), Cloud Service provider (CSP), data integrity, data authenticity.

References
[1] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski,Top-k Retrieval from a Confidential Index,” Proc. Int’l Conf. Extending Database Technology: Advances in Database Technology (EDBT ’09), 2009. 
[2] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search over Encrypted Data in Cloud Computing,” Proc. IEEE Infocom ’10, 2010. 
[3] N. Cao, C. Wang, K. Ren, and W. Lou, “Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE Infocom ’11, 2011. 
[4] C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.
 [5] Cong Wang, Ning Cao, KuiRen and Wenjing Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
[6] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," To appear, IEEE Transactions on Service Computing (TSC). 
[7] A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
 [8] M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected] Volume 3, Issue 7, July 2014 ISSN 2319 - 4847 Volume 3, Issue 7, July 2014 Page 72 
[9] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Transactions on, 22(5):847 – 859, may 2011.
 [10] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008.
 [11] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp. 355–370.
 [12] A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584– 597.


DOI Link : NOT ASSIGNED

Download :
  V2I1114.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]