© 2017, IJCERT All Rights Reserved Page | 392
Impact Factor Value: 4.029 ISSN: 2349-7084 International Journal of Computer Engineering In Research Trends Volume 4, Issue 9, October-2017, pp. 392-399 www.ijcert.org
Proxy Cryptography Based on Data Uploading
and Data Integrity in Cloud 1Hafsa Fatima Amreen, 2 Ms. FirdousRehana,3 Dr. G.S.S Rao
1Pursuing MTech(CSE),
2Assistant Professor
,3Professor & HOD
1,2,3Nawab Shah Alam Khan College of Engineering and Technology, Hyd
Email:[email protected],[email protected],[email protected]
------------------------------------------------------------------------------------------------------------------
Abstract: Many consumers wish to reserved their knowledge publicly cloud server (pcs). Along with the
immersive evolution of cloud computing. There is a drawback within the security thus this security
problem needs to be resolved to help purchasers to endeavor their knowledge in pcs. When pcs
approach is incommodious for the consumer to the method the info the consumer can become envoy its
proxy and so transfer them. There’s Associate in nursing another responsibility drawback referred to as
remote knowledge integrity checking cloud storage publicly. It permits the consumer to examine whether
or not their outsourced knowledge is unbroken flawless while not downloading the fundamental
experience. From this security drawback, we tend to propose unique remote knowledge integrity.
Checking and proxy originated knowledge uploading on identity-based publicly cloud employing a linear
pairingripu-IDC protocol is represented. Supported the hardness of Diffie dramatist drawback the ripper-
IDC protocol is assured. The particular ripe-IDC protocol is additionally coherent and pliant. Depends on
the initial consumer authorization. The planned ripu-IDC will notice confidential remote knowledge
integrity checking, emisory remote knowledge integrity checking and public remote knowledge integrity
checking.
Key Words: Public Cloud Server, Integrity Checking, BilinearPairing, Coherent, And Pliant.
------------------------------------------------------------------------------------------------------------------
1. Introduction
A great deal of information is originated with the
sudden growth desires a lot of resources and a lot of
space for storing. Today the cloud computing
becomes very talked-about, and it satisfies all the
applying cravings and necessities and developing
speedily. Cloud computing has become a big
technology that surpasses all different older
computing technology it provides varied favored
compared to previous computing technology.It
additionally offers various sorts of services to its
users. Storage as a service is one amongst the
services offered by cloud infrastructure. Like storage,
knowledge security, and computing, etc.
Relieved the freight of storage management by
mistreatment public cloud platform and additionally
freelance geographical location access by universal
knowledge. Thus many consumers wish to store and
method their expertise by the remote cloud automatic
data processing system. LONG with the speedy
development of computing and communication
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 393
technologies, a superb deal of information unit
generated. This Brobdingnagian information needs
further durable computation resource and greater
house for storing. Over the last years. Loud
computing satisfies the applying wants and grows
quickly. It takes the information processes a service,
like storage, computing, information security, etc. By
mistreatment, the final public cloud platform, the
shopper's unit mitigated off. Thus, further and extra
purchasers would adore to store and methodology
their information by mistreatment the remote cloud
system.
In public cloud computing, the patrons store their
Brobdingnagian knowledge inside the remote public
cloud servers. Since the keep information is outside
of the management of the patrons, it entails the
security risks regarding confidentiality, integrity, and
convenience of data and repair. Remote information
integrity checking may be a primitive which may be
accustomed persuade the cloud shoppers that their
information is unbroken intact. In some special cases,
the info owner could also be restricted to access the
general public cloud server; the info owner can
delegate the task of information process and
uploading to the third party, for example, the proxy.
On the opposite facet, the remote knowledge integrity
checking protocol should be economical to create it
appropriate for capacity-limited finish devices.
A. Motivation in exceedingly public cloud
surroundings, most purchasers transfer their
knowledge to PCS and check their remote data’s
integrity by the net. once the consumer is a private
manager, some practical issues can happen. If the
manager is suspected of being concerned with the
industrial fraud, we are quarantined by the police.
throughout the amount of investigation, the manager
is restricted to access the network to protect against
collusion. But, the manager’s legal business can
proceed throughout the amount of investigation. once
an outsized of information is generated, World
Health Organization will facilitate him method this
knowledge? If these data can't be processed simply in
time, the manager can face the loss of economic
interest. To forestall the case happening, the manager
has to delegate the proxy to method its information,
for instance, his secretary. But, the manager won't
hope others can perform the remote information
integrity checking. Public checking will incur some
danger of unseaworthy the privacy. for example, the
keep information volume is detected by the malicious
verifiers. once the uploaded information volume is
confidential, personal remote information integrity
checking is important. Although the secretary has the
ability to a technique and transfers the information to
the manager, he still cannot check the manager’s
remote information integrity unless the manager
delegates him. We tend to tend to make your mind up
to the secretary as a result of the proxy of the
manager. In PKI (public key infrastructure), remote
information integrity checking protocol will perform
the certificate management. once the manager
delegates some entities to perform the remote
information integrity checking, it will incur intensive
overheads since the supporter will check the
certificate once it checks the remote information
integrity. In PKI, the intensive overheads come back
from the various certificate verification, certificates
generation, delivery, revocation, renewals, etc.
publicly cloud computing, the highest devices might
need low computation capability, like mobile, iPad,
etc. Identity-based public key cryptography can
eliminate the troublesome certificate management.
thus on extend the efficiency, identity-based proxy-
oriented information uploading and remote
information integrity checking square measure
further engaging. Thus, it will be essential to review
the ID-PUIC protocol. In 1984 Shamir [41] asked for
a public key secret writing theme inside that the final
public secret's typically Associate in Nursing
absolute string. In such a topic their square measure
four algorithms:
(1) Setup generates System International parameters
and a master-key,
(2) extract uses the master-key to come back up with
the private key resembling Associate in Nursing
absolute public key string ID ∈∗,
(3) Cipher encrypts messages victimization the final
public key ID, and
(4) Rewrite decrypts messages victimization the
corresponding personal key. Shamir’s original
motivation for identity-based secret writing was to
alter certificate management in e-mail systems.
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 394
once Alice sends email to Bob at [email protected]
she simply encrypts her message mistreatment the
final public key string “[email protected].” There
isn't any wish for Alice to induce Bob’s public key
certificate. Once Bob receives the encrypted email,
he contacts a third party that we tend to tend to make
your mind up to the Private Key Generator (PKG).
Bob attests himself to the PKG inside an equivalent
approach he would attest himself to a CA and obtains
his key from the PKG. Bob can then scans his e-mail.
Note that not like the current secure e-mail
infrastructure, Alice can send encrypted email to Bob
although Bob has not nonetheless started his public
key certificate. to boot, note that key legal document
is inherent in identity-based e-mail systems: the PKG
is tuned into Bob’s key. We tend to tend to debate
key revocation, however as several new applications
for IBE schemes inside following section. Since the
matter was shown in 1984 their square measure
several proposals for IBE schemes [11, 45, 31, 25]
(see to boot [33, p. 561]). However, none of these
square measure completely satisfactory. Some
solutions would like that users not conspire. Different
solutions would like the PKG to pay a prolonged time
for each personal key generation request. Some
solutions would like tamper-resistant hardware. it's
truthful to say that until the ends up in [5]
constructing a usable IBE system was Associate in
Nursing open drawback. Apparently, the connected
notion of Associate in the nursing identity-based
signature and authentication schemes, to boot
introduced by Shamir [41], does have satisfactory
solutions [15, 14]. During this paper, we tend to tend
to propose a purposeful identity-based secret writing
theme. The performance of our system is cherished
the performance of ElGamal secret writing in F ∗P.
the protection of our system relies on a natural analog
of the method Diffie-Hellman assumption.
2. Related Work
There exist many different security problems inside
the cloud computing [1], [2]. This paper depends on
the analysis results of proxy cryptography, identity-
based public key cryptography and remote
information integrity checking cloud publicly. In
some cases, the cryptographical operation goes to be
delegated to the third party, for example, proxy.
Thus, we've to use the proxy cryptography. Proxy
cryptography could also be a vital cryptography
primitive. In 1996, Mambo et al. projected the notion
of the proxy cryptosystem [3]. Once the additive
pairings unit brought into the identity-based
cryptography, identity-based cryptography becomes
economical and wise. Since identity-based
cryptography becomes further economical as a result
of it avoids of the certificate management, further and
extra specialist’s unit apt to examine identity-based
proxy cryptography. In 2013, Yoon et al. projected
associate ID-based proxy signature theme with
message recovery [4]. Chen et al. projected a proxy
signature theme and a threshold proxy signature
theme from the Weil pairing [5].
By combining the proxy cryptography with secret
writing technique, some proxy re-encryption schemes
unit planned. Liu et al. formalize and construct the
attribute-based proxy signature [6]. Guo et al. given a
non-interactive accountant (chosen-plaintext attack)-
secure proxy re-encryption theme, that is resistant to
collusion attacks info re-encryption keys [7]. Many
completely different concrete proxy re-encryption
schemes and their applications are also projected [8-
10].
Cloud computing is associate organic process new
model for distributed computing consisting of
centralized information centers that offer resources
for massively ascendible units of computing. This
machine facilities unit delivered as a service to users
over Associate in nursing associate insecure medium
just like the internet and can be bridged to wireless
packet information networks. A client of a cloud
provider can address changes in demand for its
method needs by replicating applications inside the
cloud to many runtime instances, and by running
them on cloud servers in a concurrent fashion.
Unforeseen burst demands like flash traffic on a web
server may even be met automatically whereas not
noticeable delay. The patron does not have to be
compelled to incur a high capital expense up front in
anticipation of future application usage patterns
which can be powerful to predict accurately, and can
otherwise cause outages if left unaddressed; excess
capacity and idle cycles unit avoided. The easy
quantifiability of cloud applications finishes up in
civil rights of benefits to firms big and tiny.
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 395
3. Recent Method In public cloud setting, most shoppers transfer their
info to Public Cloud Server (PCS) and check their
remote data’s integrity by the online. Once the patron
could be a personal manager, some wise problems
will happen. If the manager is suspected of caring
with the business fraud, we tend to square measure
planning to be isolated by the police. Throughout the
number of the investigation, the manager goes to be
restricted to access the network thus on defend
against collusion. But, the manager’s legal business
will prolong throughout the number of the
investigation. Once Associate in Nursing outsized of
information is generated, UN agency can facilitate
him methodology this information? If this knowledge
cannot be processed merely in time, the manager will
face the loss of economic interest. Thus on forestall
the case happening, the manager should delegate the
proxy to methodology its info, for example, his
secretary. But, the manager will not hope others have
the flexibleness to perform the remote info integrity
checking.
Public checking will incur some danger of leaky the
privacy. For example, the keep info volume could
also be detected by the malicious verifiers. Once the
uploaded info volume is confidential, personal
remote info integrity checking is very important.
Although the secretary has the flexibleness to a
technique and transfers the information to the
manager, he still cannot check the manager’s remote
info integrity unless the manager delegates him.
We've got an inclination to call the secretary as a
result of the proxy of the manager. In PKI (public key
infrastructure), remote info integrity checking
protocol will perform the certificate management.
Once the manager delegates some entities to perform
the remote info integrity checking, it'll incur intensive
overheads since the protagonist can check the
certificate once it checks the remote info integrity
In public cloud, remote info integrity checking is
associate vital security drawback. Since the clients’
Brobdingnagian info is outside of their management,
the clients’ info may even be corrupted by the
malicious cloud server despite by alternative or
accidentally. Thus on agitating the novel security
drawback, some economic models square measure
given. In 2007, Tennesee al. planned demonstrable
info possession (PDP) paradigm [11]. In PDP model,
the checker can check the remote info integrity
whereas not retrieving or downloading the full
knowledge. The checker can perform the remote info
integrity checking by maintaining small knowledge.
After that, some dynamic PDP model and protocols
square measure designed [12–16]. Following
Atenieseet et al. pioneering work, much remote info
integrity checking models and protocols square
measure planned [17]– [19]. In 2008, proof of
retrievability (POR) theme was planned by
Shachamet al. [20]. POR may be a stronger model
that makes the checker not entirely check the remote
info integrity but to boot retrieve the remote info.
Many POR schemes square measure planned [21]–
[26]. In some cases, the buyer may delegate the
remote info integrity checking task to the third party.
In cloud computing, the third party auditing is
indispensable [27–30]. By mistreatment cloud
storage, the patrons can access the remote info with
freelance geographical locations. The tip devices may
even be mobile and restricted in computation and
storage.
4. Proposed Work In public cloud, this paper focuses on the identity-
based proxy-oriented info uploading and remote info
integrity checking. By victimization identity-based
public key discipline, our planned ID-PUIC protocol
is economical since the certificate management is
eliminated. ID-PUIC is additionally a novel proxy-
oriented info uploading and remote info integrity
checking model publicly cloud. We tend to tend to
tend to produce the formal system model and security
model for ID-PUIC protocol. Then, supported the
linear pairings, we tend to tend to tend to style the
first concrete ID-PUIC protocol. Within the random
oracle model, our designed ID-PUIC protocol is
incontrovertibly secure. Supported the initial client’s
authorization, our protocol will notice personal
checking, delegated checking and public checking.
A. Concrete ID-PUIC Protocol
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 396
Concrete ID-PUIC protocol contains four procedures:
Setup, Extract, Proxy-key generation, TagGen, and
Proof. Thus on imply the intuition of our
construction, the concrete protocol’s vogue is
delineated in Fig.1 First, Setup is performed and to
boot the system parameters unit generated. Supported
the generated system parameters, the other
procedures unit performed as Fig.1.It's delineated
below: (1) within the 0.5 Extract, once the entity’s
identity is input, KGC generates the entity’s key.
Especially, it will make the personal keys for the
patron and boot the proxy. (2) Within the 0.5 Proxy-
key generation, the first shopper creates the warrant
and helps the proxy generate the proxy key. (3)
Within the 0.5 TagGen, once the data block is input,
the proxy generates the block’s tag and transfer
block-tag pairs to PCS. (4) Within the 0.5 Proof, the
first shopper O interacts with PCS.
B. Personal Checking, Delegated
Checking, And Public Checking
Our planned ID-PUIC protocol satisfies the private
checking, delegated checking and free checking.
Inside the remote knowledge integrity checking
procedure, R1, Ro, Rp unit indispensable. Thus, the
process will solely be performed by the entity
administrative unit has R1, Ro, Rp. In general, since
R1, Ro, Rp unit unbroken secret by the first shopper,
our protocol will solely be performed by the early
shopper. Thus, it's personal checking. In some cases,
the primary shopper cannot check its remote
knowledge integrity, such as, he's taking a vacation
or in jail or within the track, etc. Thus, it's planning to
delegate the third party to perform the ID-PUIC
protocol. it ought to be the third auditor or the proxy
or varied entities. The first shopper sends R1, Ro, and
Rp to the delegated third party. The delegated third
party has the liability to perform the ID-PUIC
protocol. Thus, it's the property of delegated
checking. On the opposite hand, if the first shopper
makes R1, Ro, Rp public, any entity has the liability
to perform the ID-PUIC protocol. Thus, our protocol
has the property of the general public conjointly.
C. Additive Pairing
Our protocol is created on additive pairing:
Denote G1 and G2 as a pair of cyclic increasing
groups international organization agency have a
similar prime order letter of the alphabet. Let
Z∗qdenotes the increasing cluster of the sphere Fq.
Additive pairings may be an additive map: G1 × G1
→ G2 that satisfies the properties below
1) Bilinearity: ∀g1, g2, g3 ∈ G1 and a, b ∈Z∗q, e (g1,
g2g3) = e (g2g3, g1) = e (g2, g1) e (g3, g1) e (g1a,
g2b) = e (g1, g2) ab
2) Non-degeneracy: ∃g4, g5 ∈ G1 such e (g4, g5)
6=1G2.
3) Computability: ∀g6, g7 ∈ G1, there's Associate in
Nursing economical rule to work out e (g6, g7).
The concrete additive pairings practice creates e the
modified Weil or John Orley poet pairings on Elliptic
Curves
Algorithm: algorithm to supply economical search in
cryptography formula
When the protection parameter k is input, the
algorithm outputs the public system parameters and
additionally the master secret key. The system public
parameters unit created public and additionally the
master secret key mask is formed confidential by
KGC.
A region correction algorithm.
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 397
5.Result
The consumer is already registered by mistreatment
his details and so he can login into the cloud
mistreatment username and Arcanum, and so he
uploads the file.
The proxy can login into the house page by
mistreatment username and Arcanum, and he can
check the proxy of the file.
The kgc can log in by mistreatment username and
Arcanum and generate the key and so update to the
transfer file. The file can transfer to the cloud
This graph shows however the file is rated supported
the downloads
5. Conclusions This paper proposes the novel security thought of ID-
PUIC publicly cloud. The paper formalizes ID-PUC's
system model and security model. Then, the primary
concrete ID-PUIC protocol is meant by victimization
the linear pairings technique. The concrete ID-PUIC
protocol is incontrovertibly secure and economical by
victimization the formal security proof and potency
analysis. On the opposite hand, the projected ID-
PUIC protocol also can understand personal remote
knowledge integrity checking, delegated remote
knowledge integrity checking and public remote
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 398
information integrity checking supported the first
client’s authorization.
References [1] V. Saiharitha, S. J. Saritha, “A privacy and
dynamic multi-keyword ranked search scheme over
cloud data encrypted” ,” IEICE Trans. Commun., pp.
190–200, 2016.
[2] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee,
“Mutual verifiable provable data auditing in public
cloud storage,” J. Internet Technol., vol. 16, no. 2,
pp. 317–323, 2015.
[3] M. Mambo, K. Usuda, and E. Okamoto, “Proxy
signatures for delegating signing operation,” in Proc.
CCS, 1996, pp. 48– 57.
[4] E.-J. Yoon, Y. Choi, and C. Kim, “New ID-based
proxy signature scheme with message recovery,” in
Grid and Pervasive Computing (Lecture Notes in
Computer Science), vol. 7861. Berlin, Germany:
SpringerVerlag, 2013, pp. 945– 951.
[5] B.-C. Chen and H.-T.Yeh, “Secure proxy
signature schemes from the weil pairing,” J.
Supercomput., vol. 65, no. 2, pp. 496–506, 2013.
[6] X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li,
“Personal health records integrity verification using
attribute based proxy signature in cloud computing,”
in Internet and Distributed Computing Systems
(Lecture Notes in Computer Science), vol. 8223.
Berlin, Germany: SpringerVerlag, 2013, pp. 238–
251.
[7] H. Guo, Z. Zhang, and J. Zhang, “Proxy re-
encryption with unforgeable re-encryption keys,” in
Cryptology and Network Security (Lecture Notes in
Computer Science), vol. 8813. Berlin, Germany:
Springer-Verlag, 2014, pp. 20–33.
[8] E. Kirshanova, “Proxy re-encryption from
lattices,” in Public-Key Cryptography (Lecture Notes
in Computer Science), vol. 8383. Berlin, Germany:
Springer-Verlag, 2014, pp. 77–94.
[9] P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained
and heterogeneous proxy re-encryption for secure
cloud storage,” Chin. Sci. Bull., vol. 59, no. 32, pp.
4201–4209, 2014.
[10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka,
and K. Matsuura, “Re-encryption verifiability: How
to detect malicious activities of a proxy in proxy re-
encryption,” in Proc. CT-RSA Conf., vol. 9048.
2015, pp. 410–428.
[11] G. Ateniese et al., “Provable data possession at
untrusted stores,” in Proc. CCS, 2007, pp. 598–609.
[12] G. Ateniese, R. Di Pietro, L. V. Mancini, and G.
Tsudik, “Scalable and efficient provable data
possession,” in Proc. SecureComm, 2008, Art. ID 9.
[13] C. C. Erway, A. Küpçü, C. Papamanthou, and R.
Tamassia, “Dynamic provable data possession,” in
Proc. CCS, 2009, pp. 213–222.
[14] E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis
and optimization on FlexDPDP: A practical solution
for dynamic provable data possession,” Intelligent
Cloud Computing (Lecture Notes in Computer
Science), vol. 8993. Berlin, Germany: Springer-
Verlag, 2014, pp. 65–83.
[15] E. Zhou and Z. Li, “An improved remote data
possession checking protocol in cloud storage,” in
Algorithms and Architectures for Parallel Processing
(Lecture Notes in Computer Science), vol. 8631.
Berlin, Germany: SpringerVerlag, 2014, pp. 611–
617.
[16] H. Wang, “Proxy provable data possession in
public clouds,” IEEE Trans. Services Comput., vol.
6, no. 4, pp. 551– 559, Oct./Dec. 2013.
[17] H. Wang, “Identity-based distributed provable
data possession in multicloud storage,” IEEE Trans.
Services Comput., vol. 8, no. 2, pp. 328–340,
Mar./Apr. 2015.
[18] H. Wang, Q. Wu, B. Qin, and J. Domingo-
Ferrer, “FRR: Fair remote retrieval of outsourced
private medical records in electronic health
networks,” J. Biomed. Inform., vol. 50, pp. 226–233,
Aug. 2014.
[19] H. Wang, “Anonymous multi-receiver remote
data retrieval for pay-TV in public clouds,” IET Inf.
Secur., vol. 9, no. 2, pp. 108–118, Mar. 2015.
[20] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proc. ASIACRYPT, vol.
5350.2008, pp. 90– 107.
[21] Q. Zheng and S. Xu, “Fair and dynamic proofs
of retrievability,” in Proc. CODASPY, 2011, pp.
237–248.
[22] D. Cash, A. Küpçü, and D. Wichs, “Dynamic
proofs of retrievability via oblivious RAM,” in Proc.
EUROCRYPT, vol. 7881. 2013, pp. 279–295.
[23] J. Zhang, W. Tang, and J. Mao, “Efficient public
verification proof of retrievability scheme in cloud,”
Cluster Comput., vol. 17, no. 4, pp. 1401–1411,
2014.
[24] J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee,
“A novel routing protocol providing good
transmission reliability in underwater sensor
networks,” J. Internet Technol., vol. 16, no. 1, pp.
171–178, 2015.
[25] T. Ma et al., “Social network and tag sources
based augmenting collaborative recommender
system,” IEICE Trans. Inf. Syst., vol. E98-D, no. 4,
pp. 902–910, 2015.
//crypto.stanford.edu/pbc/thesis.pdf
[26] P.FARZANA,
A.HARSHAVARDHAN,”Integrity Auditing for
Outsourced DynamicCloud Data with Group User
Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,
International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.
© 2017, IJCERT All Rights Reserved Page | 399
Revocation.”International Journal of Computer
Engineering in Research Trends., vol.2, no.11, pp.
877-881, 2015.
[27] N. Meghasree,U.Veeresh and Dr.S.Prem
Kumar,”Multi Cloud Architecture to Provide
DataPrivacy and Integrity.”International Journal of
Computer Engineering in Research Trends., vol.2,
no.9, pp. 558-564, 2015.
[28] A.Shekinahpremasunaina,”Decentralized Fine-
grained Access Controlscheme for Secure Cloud
Storage data.”International Journal of Computer
Engineering in Research Trends., vol.2, no.7, pp.
421-424, 2015.
[29] P. Rizwanakhatoon andDr.C.MohammedGulzar
,”SecCloudPro:A Novel Secure CloudStorage System
for Auditing andDeduplication.”International Journal
of Computer Engineering in Research Trends., vol.3,
no.5, pp. 210-215, 2016.
[30] B.Sameena Begum,
P.RaghaVardhini,”Augmented Privacy-Preserving
AuthenticationProtocol by Trusted Third Party in
Cloud.”International Journal of Computer
Engineering in Research Trends., vol.2, no.5, pp.
378-382, 2015.