A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage  
  Authors : M. Guresh; R. Suresh

 

The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we propose a new innovative idea for Privacy Preserving Public Auditing with watermarking for data Storage security in cloud computing. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

 

Published In : IJCAT Journal Volume 1, Issue 11

Date of Publication : 31 December 2014

Pages : 599 - 604

Figures :04

Tables : 01

Publication Link :A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage

 

 

 

M. Guresh : completed my B Tech in Narayana Engineering College ,pursuing M Tech in Chadalawada Ramanamma Engineering College. His areas of interests includes Image Processing, software engineering , Object Oriented systems and Data Mining & Image Mining

Prof. R.Suresh : received B.E.degree from SVNIT(REC) in 1996 and M.Tech., degree from JNTU Hyderabad in 2001 and pursuing the Ph.D degree from JNTUA, Anantapuramu. From 1998 to Till date he is with the JNTUA, Anantapur working at different levels. His areas of interests includes Image Processing, software engineering , Object Oriented systems and Data Mining & Image Mining. His Current interests include Texture model approach to Mammograms’ classification and Detection.

 

 

 

 

 

 

 

Privacy Preserving

Security

Cloud computing

Data storage

Watermarking

In this paper, we proposed watermarking technique for Privacy Preserving Public Auditing for cloud data storage security. Cloud computing security is a major issue that needs to be considered. Using TPA, We can verify the correctness and integrity of data stored on a cloud. It uses public key based homomorphic linear authentication (HLA) protocol with random masking to achieve privacy preserving data security. We achieved zero knowledge privacy through random masking technique. It supports batch auditing where TPA will handle multiple users request at the same time which reduces communication and computation overhead. It uses bilinear signature to achieve batch auditing.

 

 

 

 

 

 

 

 

 

[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598–609. [2] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008. [3] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09, volume 5789 of LNCS. Springer- Verlag, Sep. 2009, pp. 355–370. [4] Yunhong Gu , Robert L. Grossman, “UDT: UDPbased data transfer for high-speed wide area networks ” National Center for Data Mining, University of Illinois at Chicago, 851 S Morgan St, M/C 249, Chicago, IL 60607, United States [5] Yunhong Gu and Robert L. Grossman, “Supporting Configurable Congestion Control in Data Transport Services”,Proceedings of the 2005 ACM/IEEE SC|05 Conference (SC’05).