Privacy Preserving In Cloud Using Dual Protection

Authors(4) :-C. Bhagya Lakshmi, K. Gomathi, P. Manisha, Mrs.L.Sharmila

Security in cloud is one of the important factor in cloud, here we can preserve our data into cloud storage. More number of clients will like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. To save local data storage costs the data is outsourced to cloud servers by cloud storage services. Multiple verification tasks can be performed efficiently by by the auditor from different users and the cloud-stored data can be updated dynamically. It allows the clients to check whether their data which has been outsourced is kept intact without downloading the whole data. In our system own auditing is used based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. We are using novel public verification scheme for the cloud storage using in distinguish ability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. Apart from storing ,the content will be encrypted in the cloud server. If someone tries to hack at the cloud end,it is impossible to break the two different blocks. The security mechanism of our scheme is under the strongest security model. They needto decrypt the files first and then combine the splitted files from three different locations. This is not possible by anyone. With the file owner permission anyone can download the files from the server. At the time of download,key will be generated (code based key generation) and it will be sent to the file owner. We can download the file need to use the key for verification and some other users want to download file owner permission is necessary.

Authors and Affiliations

C. Bhagya Lakshmi
UG Student, CSE , Alpha College of Engineering, Chennai, Tamilnadu, India
K. Gomathi
Asst.Professor, CSE, Alpha College of Engineering, Chennai, Tamilnadu, India
P. Manisha


PCS, Cloud Servers, Cloud Storage Services, Key Generation Technique

  1. Prof H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. Shen, "Enabling ?ne-grained multi-keyword search supporting classi?ed sub-dictionaries over encrypted cloud data," IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312-325, 2016.
  2. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public veri?ability and data dynamics for storage security in cloud computing," in Proceedings of ESORICS. Springer, 2009, pp. 355-370.
  3. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  4. M.Sookhak,A.Gani,H.Talebian,A.Akhunzada,S.U.Khan,R.Buyya, and A. Y. Zomaya, "Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues," ACM Computing Surveys, vol. 47, no. 4, 2015.
  5. H. Li, D. Liu, Y. Dai, and T. H. Luan, "Engineering searchable encryption of mobile cloud networks: When qoe meets qop," IEEE Wireless Communications, vol. 22, no. 4, pp. 74-80, 2015.
  6. A. Juels and B. S. K. Jr, "Pors: Proofs of retrievability for large ?les," in Proceedings of CCS. ACM, 2007, pp. 583-597.
  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of CCS. ACM, 2007, pp. 598-609.
  8. J. Ni, Y. Yu, Y. Mu, and Q. Xia, "On the security of an ef?cient dynamic auditing protocol in cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 2760-2761, 2013.
  9. Y. Zhang, C. Xu, J. Zhao, X. Zhang, and J. Wen, "Cryptanalysis of an integrity checking scheme for cloud data sharing," Journal of Information Security and Applications, vol. 23, pp. 68-73, 2015.
  10. E. Shi, E. Stefanov, and C. Papamanthou, "Practical dynamic proofs of retrievability," in Proceedings of CCS. ACM, 2013, pp. 325-336.
  11. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proceedings of INFOCOM. IEEE, 2010, pp. 1-9.
  12. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013.
  13. H. Shacham and B. Waters, "Compact proofs of retrievability," Journal of Cryptology, vol. 26, no. 3, pp. 442-483, 2013.
  14. Y. Zhang, C. Xu, H. Li, and X. Liang, "Cryptographic public veri?cation of data integrity for cloud storage systems," IEEE Cloud Computing, vol. 3, no. 5, pp. 44-52, 2016.
  15. R. C. Merkle, "Protocols for public key cryptosystems," in Proceedings of S & P. IEEE, 1980, pp. 122-134.
  16. J. Katz and Y. Lindell, Introduction to Modern Cryptography. CRC Press, 2014.
  17. C. Gentry, A. Lewko, A. Sahai, and B. Waters, "Indistinguishability obfuscation from the multilinear subgroup elimination assumption," in Proceedings of FOCS. IEEE, 2015, pp. 151-170.
  18. D. Boneh and M. Zhandry, "Multiparty key exchange, ef?cient traitor tracing, and more from indistinguishability obfuscation," in Proceedings of CRYPTO. Springer, 2014, pp. 480-499.
  19. C. Baun, I. Damg?ard, and C. Orlandi, "Publicly auditable secure multiparty computation," in Proceedings of SCN. Springer, 2014.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 631-635
Manuscript Number : CSEIT1833219
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

C. Bhagya Lakshmi, K. Gomathi, P. Manisha, Mrs.L.Sharmila, "Privacy Preserving In Cloud Using Dual Protection", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.631-635, March-April-2018.
Journal URL :

Follow Us

Contact Us