The Cloud computing is a latest technology which
provides various services through internet. The Cloud server
allows user to store their data on a cloud without worrying about
correctness & integrity of data. Cloud data storage has many
advantages over local data storage. User can upload their data
on cloud and can access those data anytime anywhere without
any additional burden. The User doesn’t have to worry about
storage and maintenance of cloud data. But as data is stored at
the remote place how users will get the confirmation about
stored data. Hence Cloud data storage should have some
mechanism which will specify storage correctness and integrity
of data stored on a cloud. The major problem of cloud data
storage is security. Many researchers have proposed their work
or new algorithms to achieve security or to resolve this security
problem. In this paper, we propose a new innovative idea for
Privacy Preserving Public Auditing with watermarking for data
Storage security in cloud computing. It supports data dynamics
where the user can perform various operations on data like
insert, update and delete as well as batch auditing where
multiple user requests for storage correctness will be handled
simultaneously which reduce communication and computing
cost.
Published In : IJCAT Journal Volume 1, Issue 11
Date of Publication : 31 December 2014
Pages : 599 - 604
Figures :04
Tables : 01
Publication Link :A Meticulous Description of Applying
Watermarking Technique for Secure Cloud Storage
M. Guresh : completed my B Tech in
Narayana Engineering College ,pursuing M
Tech in Chadalawada Ramanamma
Engineering College. His areas of interests
includes Image Processing, software
engineering , Object Oriented systems and
Data Mining & Image Mining
Prof. R.Suresh : received B.E.degree
from SVNIT(REC) in 1996 and M.Tech.,
degree from JNTU Hyderabad in 2001
and pursuing the Ph.D degree from
JNTUA, Anantapuramu. From 1998 to
Till date he is with the JNTUA,
Anantapur working at different levels.
His areas of interests includes Image
Processing, software engineering ,
Object Oriented systems and Data
Mining & Image Mining. His Current
interests include Texture model approach to Mammograms’
classification and Detection.
Privacy Preserving
Security
Cloud computing
Data storage
Watermarking
In this paper, we proposed watermarking technique for
Privacy Preserving Public Auditing for cloud data storage
security. Cloud computing security is a major issue that
needs to be considered. Using TPA, We can verify the
correctness and integrity of data stored on a cloud. It uses
public key based homomorphic linear authentication
(HLA) protocol with random masking to achieve privacy
preserving data security. We achieved zero knowledge
privacy through random masking technique. It supports
batch auditing where TPA will handle multiple users
request at the same time which reduces communication
and computation overhead. It uses bilinear signature to
achieve batch auditing.
[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable data
possession at untrusted stores,” in Proc. of CCS’07,
Alexandria, VA, October 2007, pp. 598–609.
[2] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy
preserving audit and extraction of digital contents,”
Cryptology ePrint Archive, Report 2008/186, 2008.
[3] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
“Enabling public verifiability and data dynamics for
storage security in cloud computing,” in Proc. of
ESORICS’09, volume 5789 of LNCS. Springer-
Verlag, Sep. 2009, pp. 355–370.
[4] Yunhong Gu , Robert L. Grossman, “UDT: UDPbased
data transfer for high-speed wide area networks
” National Center for Data Mining, University of
Illinois at Chicago, 851 S Morgan St, M/C 249,
Chicago, IL 60607, United States
[5] Yunhong Gu and Robert L. Grossman, “Supporting
Configurable Congestion Control in Data Transport
Services”,Proceedings of the 2005 ACM/IEEE SC|05
Conference (SC’05).