CFP last date
20 December 2024
Reseach Article

Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource

by Shubham Nema, Akash Mittal, Yogendra Kumar Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 12
Year of Publication: 2016
Authors: Shubham Nema, Akash Mittal, Yogendra Kumar Jain
10.5120/ijca2016910956

Shubham Nema, Akash Mittal, Yogendra Kumar Jain . Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource. International Journal of Computer Applications. 146, 12 ( Jul 2016), 34-38. DOI=10.5120/ijca2016910956

@article{ 10.5120/ijca2016910956,
author = { Shubham Nema, Akash Mittal, Yogendra Kumar Jain },
title = { Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 12 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number12/25453-2016910956/ },
doi = { 10.5120/ijca2016910956 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:17.796240+05:30
%A Shubham Nema
%A Akash Mittal
%A Yogendra Kumar Jain
%T Proof of Retrievability in Cloud Computing Environment using Sharing of Key based on Resource
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 12
%P 34-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The storage and retrieval of data over cloud computing is big issue. For the storage and retrieval cloud computing used the concept of authentication and authorization. The process of authentication and authorization used primary and secondary authentication system. In primary authentication system used login id and password, in secondary login used the OTP and some other verification code. In both login systems trap the OTP code and primary information of user and the security process of cloud environment are compromised. In this paper proposed a model of secured access based on the concept of fake and genuine user. In the case of fake user the received file is fake. This file is generated by the system. For the authentication of genuine and fake user used the concept of shared key concept. The shared key gives the option of retrieval of data over cloud environment. The proposed model implemented in java software and used java RMI tool for access of remote machine.

References
  1. Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa, “OPOR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices” IEEE 2015, Pp 195 205
  2. Qian Wang, Kui Ren, Member, Wenjing Lou, Jin “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” IEEE 2011 847 -859
  3. Meera Chheda, Anmol Achhra, Priyanka Vaswani, Rajeshwari Agale, Vidya Bhise. “Public Auditing For The Shared Data In The Cloud”. International Journal of Advance Foundation and Research in Computer (IJAFRC) 2015 Pp 724-728.
  4. Prof. N.L. Chourasiya, Dayanand Lature, Arun Kumavat, Vipul Kalaskar, Sanket Thaware. “Privacy-Preserving Public Auditing for Secure Cloud Storage” International Journal of Engineering Research and General Science , 2015 Pp 744 -748.
  5. R.Guruprasath, M.Arulprakash “Privacy Preserving Public Auditing For Shared Data With Large Groups In The Cloud” Journal of Recent Research in Engineering and Technology 2015 Pp 40-46
  6. Mrunali Pingale, Prof. Jyoti Pingalkar “Security Preserving Access Control Mechanism In Public Clouds Using PANDA Security Mechanism” iPGCON, 2015 Pp 1-5.
  7. Pradnya Chikhale, Namrata Dwivedi, Parna Dutta, Aparajita Sain, Vrunda Bhusari “Enhancing Data Storage Security In Cloud Computing Using PDDS Technique” PISER 2014 Pp 53-59.
  8. J.Aparna, Mr.R.Sathiyaraj “Auditing Mechanisms for Outsourced Cloud Storage” International Journal of Computer Science and Mobile Computing, 2014, Pp 219-229
  9. Ch. Rajeshwari, S. Suresh “An Efficient PDP Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers” International Journal of Science Engineering and Advance Technology, 2014 Pp 985-988
  10. Betzy K. Thomas, M. Newlin Rajkumar “A Dynamic Public Auditing Security Scheme To Preserve Privacy In Cloud Storage” IJSHJE 2013 Pp 93-97.
  11. GuangyangYang, Hui Xia, Wenting Shen, Xiu xiu Jiang,Jia Yu “Public Data Auditing with Constrained Auditing Number for Cloud Storage” 2015 IJSIA Pp 21-32.
  12. Jian Yang, Haihang Wang, Jian Wang, Chengxiang Tan , Dingguo “Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing” Journal Of Networks, 2011 Pp1033-1040.
  13. Javed Akthar Khan, Ritika Arora “A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor” International Journal of Electrical, Electronics and Computer Engineering 2014 Pp144-148.
  14. Harleen Kaur, Er. Vinay Gautam “A Survey of Various Cloud Simulators” International Journal of Computer Sciences and Engineering 2014 Pp35- 38.
  15. Clementine Gritti, Willy Susilo, Thomas Plantard ,Rongmao Chen “Improvements on Efficient Dynamic Provable Data Possession scheme with Public Veri_ability and Data Privacy”Centre for Computer and Information Security Research 2014 Pp 1-19
  16. Chunming Gao, Noriyuki Iwane “A Social Network Model With Privacy Preserving And Reliability Assurance And Its Applications In Health Care ” International Journal Of Energy, Information And Communications 2015, Pp.45-58.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication cryptography Sharing of Key.