An Efficient Strategy for Storage Based Preserving Privacy

DOI : 10.17577/IJERTV3IS070801

Download Full-Text PDF Cite this Publication

Text Only Version

An Efficient Strategy for Storage Based Preserving Privacy

V. Vikrantp

1Assistant Professor, Dept of CSE,

SriDevi Womens Engineering College, Hyderabad, A.P, India

P. Avinasp

2Associate Professor, Dept of CSE,

SriDevi Womens Engineering College, Hyderabad, A.P, India

Abstract – There is a lot of demand with respect to the strategy of the computation related to the cloud. Here this particular phenomena plays a major role in terms of the implementation based strategy followed by the accuracy in terms of the analysis based aspect respectively. Here many of the users are getting attracted to this particular strategy in a well efficient manner respectively. Now many of the companies are completely based on the strategy related to the advancement in the internet based phenomena in a well effective manner respectively. Here the users are getting attracted to this particular strategy due to the service provided in the well effective manner followed by the reliable data transmission takes place in the system in a well efficient manner respectively. Here the services of the cloud based scenario are based on the mutual agreement based strategy in a well effective manner respectively. Due to the reliability in the data transfer followed by the reduced cost followed by the power with the direct orientation of the reduced computations oriented phenomena in a well efficient fashion. So here the services of the cloud based phenomena include services oriented with the infrastructure, Services oriented with the plat form followed by the services oriented with the software is a well effective fashion respectively. Here many of the users are getting frustrated regarding their stored data in the third party by the help of the decentralization based strategy by the particular cloud. So here user is very much worried about these particular phenomena in order to overcome this problem in terms of the security in which it plays a major role in terms of the privacy based aspect in a well respective fashion. So here a new technique implemented by the help of the protocol oriented by the TPA based scenario in which there is an implementation of the strategy related to the integration of the audit based system for the accurate implementation based scenario respectively. Simulations have been conducted on the present method and a huge analysis is made with respect to the different data sets in a well efficient manner followed by the several environmental based perspectives where there is an accurate analysis of the response of the system in a well effective manner respectively.

Keywords: Cloud computing, Data authentication, Data generalization, Wireless network, TPA protocol, Verification of the batch oriented strategy respectively.

  1. INTRODUCTION

    Here the computation related to the aspect of the cloud oriented strategy plays an efficient role in its implementation based aspect followed by the accuracy in its analysis in a well respective fashion by which there is a huge challenge for the present method related to the aspect

    of the security is a primary concern respectively [1]. Here there is a major problem at the time of the outsourcing of the data in a well oriented fashion where here there is a utilization of the system based on the strategy of the wireless based phenomena in a well efficient manner respectively [2][3]. Due to this wireless based strategy there is a major problems related to the attacks oriented strategy in the form of the threats is a major concern respectively in the malicious attacks is a primary concern. So in order to overcome the above problem based analysis a new technique has to be implemented in a well effective fashion for the accurate analysis in terms of the performance based strategy followed by the outcome in a well respective fashion [4][10].

    BLOCK DIAGRAM

    Fig 1: Shows the block diagram of the present method respectively

  2. METHODOLOGY

    In this paper a method is designed with a well efficient framework oriented strategy in which it is on be of the powerful technique it is implemented by which it completely overcome the problems of the several previous methods followed by the improvement in the performance based strategy in a well explicit manner respectively [5][6]. Here the implementation of the present method is shown in the above figure in the form of the block diagram and is explained in the elaborative fashion respectively. Here the present method is effective and efficient in terms of the performance based strategy followed by the outcome in a

    well effective fashion related to the entire aspect of the system in a well oriented fashion respectively. Here the present method completely overcomes the drawback of the several previous methods in a well effective manner respectively [7][8][9].

    Here in the present strategy a scheme is introduced in which there is an auditing of the public based strategy in which there is an accurate solution of the outsourcing plays a major role in its implementation oriented provision of both the data followed by the integration oriented scenario related to this outsourcing phenomena respectively. Here for the effective auditing of the phenomena a TPA based strategy is introduced for the data authentication in which related to the privacy oriented aspect depending on the users of the multiple analysis. Here the technique includes the major phenomena of the integrated format of both linear authentication followed by the masking of the randomization. Here the randomness of the server masks the server major analysis in a well efficient fashion.

  3. EXPECTED RESULTS

    Fig 1: Shows the graphical representation of the present method respectively

    A lot of analysis is made on the present method and a huge number of computations have been applied on the large number of the data sets in a well efficient manner with respect to the different environmental aspects respectively. A comparative analysis is made between the present method to that of the several previous methods in a well efficient fashion and is shown in the below figure in the form of the graphical representation and is explained in the elaborative fashion respectively. There is a huge challenge for the present method in which it is implemented in such a way that it should be able analyze the problems of the several previous methods in a well efficient fashion with respect to the control oriented strategy of the improvement in the degraded performance due to the several previous methods,

  4. CONCLUSION

In this paper a method is designed with a powerful framework oriented strategy in a well efficient manner for the improvement in the performance followed by the outcome of the entire system in a well effective fashion respectively. Here a strategy is designed oriented with the aspect of the system based on the auditing oriented phenomena in a well efficient fashion related to the preservation of the public privacy based aspect in the well oriented strategy respectively. Here the security plays a major role for the efficient implementation of the system with a well oriented fashion respectively. Here a linear authentication based on the homo morphic strategy in which there is a guarantee for the masking oriented with the randomized strategy in a well efficient manner where there should be no chance for the protocol based on the strategy of the TPA based aspect with which no prior knowledge related to the content of the data in a well oriented fashion with respect to the server of the cloud which it is at the time of the storage of the data in a well oriented fashion of the process of the efficient auditing based strategy respectively. Which plays a huge task in which there is a complete reduction of the burden of the user from the leakage oriented strategy from the stored phenomena by the efficient process of the auditing based process in the well effective manner respectively? Here we finally conclude that the present method is effective and efficient in terms of the analysis respectively.

REFERENCES

  1. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.

  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), pp. 598-609, 2007.

  3. M.A. Shah, R. Swaminathan, and M. Baker, Privacy-Preserving Audit and Extraction of Digital Contents, Cryptology ePrint Archive, Report 2008/186, 2008.

  4. A. Juels and J. Burton, S. Kaliski, PORs: Proofs of Retrievability for Large Files, Proc. ACM Conf. Computer and Comm. Security (CCS 07), pp. 584-597, Oct. 2007.

  5. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, http://www.cloudsecurityalliance. org, 2009.

  6. H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt), vol. 5350, pp. 90-107, Dec. 2008.

  7. C. Wang, K. Ren, W. Lou, and J. Li, Towards Publicly Auditable Secure Cloud Data Storage Services, IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.

  8. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS 07), pp. 1-6, 2007.

  9. 104th United States Congress, Health Insurance Portability and Accountability Act of 1996 (HIPPA), http://aspe.hhs.gov/ admnsimp/pl104191.htm, 1996.

  10. R. Curtmola, O. Khan, and R. Burns, Robust Remote Data Checking, Proc. Fourth ACM Intl Workshop Storage Security and Survivability (StorageSS 08), pp. 63-68, 2008.

Leave a Reply