Public Auditing for the Shared Data in the Cloud  
  Authors : Anmol Achhra; Priyanka Vaswani; Rajeshwari Agale; Meera Chheda

 

Using Cloud Storage, users can store their data remotely and utilize the high quality applications and services from a shared pool of configurable computing resources, eliminating the burden of local data storage and maintenance. With data storage and sharing services in the cloud, users can easily modify and share data. The main aim of this study is to check the integrity of the user in order to prevent data being attacked by unauthorized user. Hence, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of shared data and be worryfree. But if TPA gets hacked, then data can be accessed by any unauthorized user. To overcome this problem ,we are coming with the model of service which will replace TPA by Data Auditing service.

 

Published In : IJCAT Journal Volume 2, Issue 4

Date of Publication : April 2015

Pages : 125 - 129

Figures :01

Tables : --

Publication Link :Public Auditing for the Shared Data in the Cloud

 

 

 

Anmol Achhra : Final Year Computer Department, Pune University Dr. D.Y. Patil College Of Engineering, Pune,India

Priyanka Vaswani : Final Year Computer Department, Pune University Dr. D.Y. Patil College Of Engineering, Pune,India

Rajeshwari Agale : Final Year Computer Department, Pune University Dr. D.Y. Patil College Of Engineering, Pune,India

Meera Chheda : Final Year Computer Department, Pune University Dr. D.Y. Patil College Of Engineering, Pune,India

 

 

 

 

 

 

 

Cloud Computing

Auditability

Integrity

A Proposing module study of data security with respect to data leakage, fake profile, insecure interface and their factors. Rest network base security threats like Distributed Denial Of Service(DDOS) attack, Bruit force attack are to be target in future enhancement.

 

 

 

 

 

 

 

 

 

[1] Razali, A.M. and S. Ali, “Generating treatment plan in medicine: A data mining approach”. In the Proceedings of Am. J. Applied Sci., 6 2009: pp. 345- 351. [2] Oliveira, S., &Zaiane, O. “Privacy preserving frequent itemset mining” In the Proceedings of IEEE International Conference On Data Mining,November 2002,pp. 43–54. [3] Saygin, Y., V.S. Verykios and A.K. Elmagarmid. “Privacy preserving association rule mining”. In the Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering ECommerce/ E-Business Systems, Feb. 24-25, IEEE Xplore Press, SanJose, CA. USA.2002, pp. 151-158. [4] Vaidya, J., H. Yu and X. Jiang. “Privacy preserving SVM classification”.In the Proceedings of Knowl. Inform.2008 Syst., pp. 161-178. [5] Verykios, V.S., A.K. Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni. “Association rule hiding”. In the Proceedings of IEEE Trans. Knowl. Data Eng.,2004 16:pp.434-447. [6] Evfimievski, A., R. Srikant, R. Agrawal and J. Gehrke. “Privacy preserving mining of association rules”. Proceedings of the 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-25, ACM Press, Edmonton, AB., Canada,2002 pp. 1-12. [7] Wang, S.L., B. Parikh and A. Jafari. ” Hiding informative association rule sets”. Exp. Syst. Appli., 33: pp. 316-323, 2007. [8] Y. H. Wu, C.M. Chiang and A.L.P. Chen. “Hiding Sensitive Association Rules with Limited Side Effects”, In the Proceedings of IEEE Transactions on Knowledge and Data Engineering, vol.19 (1), pp. 29–42, Jan. 2007. [9] V.S. Verykios, A.K. Elmagarmid, E. Bertino, Y. Saygin, and E. DasseniIn the Proceedings of “Association rule hiding, IEEE Transactions on Knowledge and Data engineering”, vol. 16(4), pp. 434–447, April 2004. [10] K. Duraiswamy, and D. Manjula, “Advanced Approach in Sensitive Rule Hiding”, In the Proceedings of Modern Applied Science, vol. 3(2), Feb. 2009. [11] X. Sun and P.S. Yu, “A Border-Based Approach for Hiding Sensitive Frequent Itemsets”, In Proc. Fifth IEEE Int’l Conf. Data Mining (ICDM ’05), pp. 426– 433, Nov. 2005. [12] Y. Saygin, V. S. Verykios, and A. K. Elmagarmid, “Privacy preserving association rule mining”, In Proc. Int’l Workshop on ResearchIssues in Data Engineering (RIDE 2002), pp. 151–163, 2002. [13] T. Mielikainen, “On inverse frequent set mining,” In Proc. 3rd IEEE ICDM Workshop on Privacy Preserving Data Mining. IEEE Computer Society, pp.18–23, 2003. [14] J. Vaidya and C. Clifton, “Privacy preserving association rule mining in vertically partitioned data,” In proc. Int’l Conf. Knowledge Discovery and Data Mining, pp. 639–644, July 2002. [15] R. Agrawal and R. Srikant, “ Privacy preserving data mining “,In the Proceedings of ACM SIGMOD Conference on Management of Data pages 439- 450,Dallas, Texas, May 2000. [16] Yogendra Kumar Jain et al. / International Journal on Computer Science and Engineering (IJCSE) ISSN