Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data
G.Dileep Kumar, A.Sreenivasa Rao, , ,
Affiliations M.Tech (CS), Department of Computer Science & Engineering, Malla Reddy College Of EngineeringProfessor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
In this paper, we distinguish the framework prerequisites and difficulties toward accomplishing privacy preserving
outsourced cloud data services, usable configuration and basically effective quest plans for scrambled cloud storage. We are
exhibiting a general approach for these utilizing searchable encryption methods, which permits scrambled data to be sought by
clients without leaking data about the data itself and client's solicitation. Empowering open review capacity for cloud storage is of
discriminating significance with the goal that clients can utilize something like a third party auditor (TPA) to check the
trustworthiness of outsourced data and can be effortless. To proficiently present a compelling TPA, the examining procedure
ought to get no new vulnerabilities towards client data protection, and help to evade extra online weight to client. We propose a
protected and productive cloud storage framework supporting privacy preserving open sourced cloud storage data.
G.Dileep Kumar,A.Sreenivasa Rao."Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.767-770, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1114.pdf,
Keywords : Trusted third party auditor (TPA), Cloud Service provider (CSP), data integrity, data authenticity.
 S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski,Top-k Retrieval from a Confidential Index,â€ Proc. Intâ€™l Conf. Extending Database Technology: Advances in Database Technology (EDBT â€™09), 2009.
 J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, â€œFuzzy Keyword Search over Encrypted Data in Cloud Computing,â€ Proc. IEEE Infocom â€™10, 2010.
 N. Cao, C. Wang, K. Ren, and W. Lou, â€œPrivacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,â€ Proc. IEEE Infocom â€™11, 2011.
 C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, â€œAchieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,â€ Proc. IEEE INFOCOM, 2012.
 Cong Wang, Ning Cao, KuiRen and Wenjing Lou, â€œEnabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Dataâ€ IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
 Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," To appear, IEEE Transactions on Service Computing (TSC).
 A. Boldyreva, N. Chenette, Y. Lee, and A. Oâ€™Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
 M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383â€“392. IEEE, 2011. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: firstname.lastname@example.org Volume 3, Issue 7, July 2014 ISSN 2319 - 4847 Volume 3, Issue 7, July 2014 Page 72
 Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Transactions on, 22(5):847 â€“ 859, may 2011.
 M. A. Shah, R. Swaminathan, and M. Baker, â€œPrivacy preserving audit and extraction of digital contents,â€ Cryptology ePrint Archive, Report 2008/186, 2008.
 Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, â€œEnabling public verifiability and data dynamics for storage security in cloud computing,â€ in Proc. of ESORICSâ€™09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp. 355â€“370.
 A. Juels and J. Burton S. Kaliski, â€œPors: Proofs of retrievability for large files,â€ in Proc. of CCSâ€™07, Alexandria, VA, October 2007, pp. 584â€“ 597.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.