Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security

International Journal of ComputerTrends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-8 Number-2                          
Year of Publication : 2014
Authors : Tejashree Paigude , Prof. T. A. Chavan
DOI :  10.14445/22312803/IJCTT-V8P118


Tejashree Paigude , Prof. T. A. Chavan. "Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security". International Journal of Computer Trends and Technology (IJCTT) V8(2):96-101, February 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

[1] C wang, Sherman S. M. Chow, Q. Wang, K Ren and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”,IEEETrasaction on Computers I, vol. 62, no. 2, pp.362-375 , February 2013.
[2] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public auditing for storage security in cloud computing”, in Proc.of IEEE INFOCOM’10, March 2010.
[3] Wang Shao-hu, Chen Dan-we, Wang Zhi-weiP, Chang Su-qin, “Public auditing for ensuring cloud data storage security with zero knowledge Privacy” College of Computer, Nanjing University of Posts and Telecommunications, China, 2009
[4] KunalSuthar, Parmalik Kumar, Hitesh Gupta, “SMDS: secure Model for Cloud Data Storage”, International Journal of Computer applications, vol56, No.3, October 2012
[5] AbhishekMohta, Lalit Kumar Awasti, “Cloud Data Security while using Third Party Auditor”, International Journal of Scientific & Engineering Research, Volume 3, Issue 6, ISSN 2229-8 June 2012.
[6] Q. Wang, C. Wang,K.Ren, W. Lou and Jin Li “Enabling Public Audatability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transaction on Parallel and Distributed System, vol. 22, no. 5, pp. 847 – 859,2011.
[7] D. Shrinivas, “Privacy-Preserving Public Auditing in Cloud Storage security”, International Journal of computer science and Information Technologies, vol 2, no. 6, pp. 2691-2693, ISSN: 0975-9646, 2011
[8] K Govinda, V. Gurunath prasad and H. sathish kumar, “ Third Party Auditing for Secure Data Storage in Cloud Through Digital Signature Using RSA”, International Journal of Advanced science and Technical Research, vol 4,no. 2, ISSN: 2249-9954,4 August 2012
[9] S. Marium, Q. Nazir, A. Ahmed, S. Ahthasham and Aamir M. Mirza, “Implementation of EAP with RSA for Enhancing The Security of Cloud Computig”, International Journal of Basic and Applied Science, vol 1, no. 3, pp. 177-183, 2012
[10] XU Chun-xiang, HE Xiao-hu, Daniel Abraha, “Cryptanalysis of Auditing protocol proposed by Wang et al. for data storage security in cloud computing”,, and cryptology eprint archive: Listing for 2012.
[11] B. Dhiyanesh“A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing” , International Journal of Advanced Research in Technology, vol. 1,no. 1, pp. 29-33, ISSN: 6602 3127, 2011
[12] C. Wang, Q. Wang and K. Ren, “Ensuring Data Storage security in Cloud Computing”,IEEE Conference Publication, 17th International Workshop on Quality of Service (IWQoS), 2009
[13] Balkrishnan. S, Saranya. G, Shobana. S and Karthikeyan. S, “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”, International Journal of computer science and Technology, vol. 2, no. 2, ISSN 2229-4333 (Print) | ISSN: 0976-8491(Online), June 2012
[14] K. Kiran Kumar, K. Padmaja, P. Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing”, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN: 2229-4333 (Print), March 2012
[15] LingarajDhabale, PritiPavale, “Providing Secured Data Storage by Privacy and Third Party Auditing In Cloud”, International Conference on Computing and Control Engineering, ISBN 978-1-2248-9, 12 & 13 April, 2012
[16] Jachak K. B., Korde S. K., Ghorpade P. P. and Gagare G. J. ,“Homomorphic Authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing”,Bioinfo Security Informatics, vol. 2, no. 2, pp. 49-52, ISSN. 2249-9423, 12 April 2012
[17] Dr. P. K. Deshmukh, Mrs. V. R. Desale, Prof. R. A. Deshmukh, “Investigation of TPA (Third Party Auditor Role) foe Cloud Data Security”, International Journal of Scientific and Engineering Research, vo. 4,no. 2,ISSn 2229-5518, Feb 2013.
[18] Gayatri. R, “Privacy Preserving Third Party Auditing for Dynamic Data”, International Journal of Communication and engineering, vol. 1, no. 1, issue: 03, March 2012
[19] Prince Jain “Security Issues and their solution in cloud computing”, International Journal of computing and business research, ISSN (Online): 2229-6166
[20] Amala “Dynamic Audit Services for Achieving Data Integrity in Clouds”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021
[21] R.Ushadevi V. Rajamani, “A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism”, International Journal of Computer Applications (0975 – 8887) Volume 58– No.22, November 2012

Privacy Preserving, Public Auditing, TPA, Data Security