Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage Using Finger Print Authentication

Authors(3) :-Praveena Warambhe, Sanskrit Gode, Shruti Mule

Cloud computing is one of the rising advances, that takes set of associations clients to the following level. One of the significant difficulties in this innovation is Security. Biometric frameworks give the response to guarantee that just a legitimate client or an approved client and nobody else get to the rendered administrations. Biometric frameworks perceive clients based on behavioral or physiological qualities. Additionally, information honesty support is the significant goal in cloud storage. It incorporates try out utilizing TPA for unapproved get to. This work executes ensuring the information and recovery of information on the off chance that somebody misuses it. This activity will be allotted to a Proxy server. The information of the clients will be put away in public and private zone of the cloud. With the goal client will get to that lone public cloud information and private cloud will stay more secured. Once any unapproved adjustment is made, the first information in the private cloud will be recovered by the Proxy server and will be come back to the client. This paper realizes another reproduction of a security framework where in clients bring to the table numerous biometric fingerprints amid Enrollment for an administration. The way toward joining conventional client id and secret key component alongside biometric picture preparing procedure finger print acknowledgment is altogether investigated for enhancing security in public cloud framework. The likelihood of presenting another cloud benefit as "Bio-measurements as a Service" is likewise investigated.

Authors and Affiliations

Praveena Warambhe
Reteach Scholar, Department of Computer Science & Engineering, G. H. Raisoni College of Engineering (Autonomous), Nagpur, India
Sanskrit Gode
Assistant Professor, Department of Computer Science & Engineering, G. H. Raisoni College of Engineering (Autonomous), Nagpur, India
Shruti Mule

Cloud Computing, Data Security, Regenerating Codes, Public Audit, Privacy Preserving, Finger Print Authentication

  1. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A Berkeley view of cloud computing,” Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28, p. 13, 2009.
  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ła07. New York, NY, USA: ACM, 2007, pp. 598- 609.
  3. A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584-597.
  4. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “Mr-pdp: Multiplereplica provable data possession,” in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on. IEEE, 2008, pp. 411-420.
  5. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187-198.
  6. J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographicallydispersed clouds,” Journal of Computer and System Sciences, vol. 78, no. 5, pp. 1345-1358, 2012.
  7. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010, pp. 31-42.
  8. H. Chen and P. Lee, “Enabling data integrity protection in regeneratingcoding- based cloud storage: Theory and implementation,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 407-416, Feb 2014.
  9. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717ła1726, 2013.
  10. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 12, pp. 2231- 2244, 2012.
  11. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proceedings of the IEEE, vol. 99, no. 3, pp. 476-489, 2011.
  12. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology-ASIACRYPT 2008. Springer, 2008, pp. 90- 107.
  13. Y. Hu, H. C. Chen, P. P. Lee, and Y. Tang, “Nccloud: Applying network coding for the storage repair in a cloud-of-clouds,” in USENIX FAST, 2012.
  14. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.
  15. C. Wang, S. S. Chow, Q.Wang, K. Ren, andW. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362-375, 2013.
  16. Wang, Q. Wang, K. Ren, and W. Lou, “Towards secure and dependable storage services in cloud computing,” Service Computing, IEEE Transactions on, vol. 5, no. 2, pp. 220ła232, May 2012.
  17. Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil pairing,” Journal of Cryptology, vol. 17, no. 4, pp. 297ła319, 2004.
  18. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539ła4551, 2010.
  19. T. Ho, M. MAł ┤edard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,” Information Theory, IEEE Transactions on, vol. 52, no. 10, pp. 4413ła 4430, 2006.
  20. D. Boneh, D. Freeman, J. Katz, and B. Waters, “Signing a linear subspace: Signature schemes for network coding,” in Public Key Cryptography-PKC 2009. Springer, 2009, pp. 68-87.
  21. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology CRYPTO 2001. Springer, 2001, pp. 213-229.
  22. A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for fr-reduction,” IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 84, no. 5, pp. 1234-1243, 2001.
  23. R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, “Secure network coding over the integers,” in Public Key Cryptography-PKC 2010. Springer, 2010, pp. 142-160.
  24. S. Goldwasser, S. Micali, and R. Rivest, “A digital signature scheme secure against adaptive chosen message attacks,” SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, 1988.
  25. Neha T, P.S Murthy, “A Novel Approach to Data Integrity Proofs in Cloud Storage”, Volume 2, Issue 10, October 2012.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 725-730
Manuscript Number : CSEIT1726192
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Praveena Warambhe, Sanskrit Gode, Shruti Mule, "Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage Using Finger Print Authentication", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.725-730, November-December-2017.
Journal URL :

Article Preview