Akanksha Pawar, Sarabjeet Kaur Popli, Priyanka Rawat, Prajakta Salke


Cloud is a growing trend now a days. It is used in almost all growing sectors. It also finds its application in banking sector. Clouds In banking sector is used to store the account information of the bank customers. Using clouds puts the security of the data in a fix. Data integrity is not guaranteed. Online transactions are not yet safe to be done. We propose a system that contains Clouds and public auditing scheme which provides data integrity check by a Third Party auditor (TPA). The TPA is enabled to perform audits for multiple user simultaneously. Along with the alpha numeric passwords we enable the user to set an image password which uses visual cryptography as its underlying mechanism. K-N sharing algorithm is use in this. This effectively increases the security by reducing the risk password hacking. Our system also provides an additional feature of de-duplication in order to avoid duplications of files stored at the main server. This saves the memory usage as well as the bandwidth. Thus our system includes the features of cloud computing with public auditing using TPA, Visual Cryptography, and de-duplication.


Cloud computing, De-duplication, Digital Signature, Public Auditing, TPA, Visual Cryptography

Full Text:



I. Cong Wong, Sherman S.-M. Chow ,Qian Wang, Kui Ren (2013) : Privacy-Preserving Public Auditing for Secure Cloud Storage , IEEE.

II. J. Yaun and S. Yu (2013): Secure And Constant Cost Public Cloud StorageAuditing With De-duplication, IEEE Conference on Communication and Network Security.

III. S.Halevi, D. Harnik, B. Pinkas and A. Shulman (2011):Proofs of ownership in remote storage system, ACM .

IV. G. Ateniese, R. Burns, R. Curtmola, J. Herring (2007): Provable Data Posession at Untrusted Stores, ACM, New York.

V. H. Wang (2013):Proxy Provable data possession in public clouds, IEEE Transactions on Services Computing.

VI. Q. Wang , C. wang, J. Li, K. Ren (2009):Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing,ESORICS.

VII. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom (2012):Cloud Computing Security:From Single To Multi-Clouds , !EEE, Melbourne.

VIII. M.A. AlZain and E. Pardede(2011): Using Multi Shares for Ensuring Privacy in Databases-as-a-Service, Hawaii Intl. Conf on System Sciences.

IX. K. Birman, G. Chockler and R. Van Renesse (2009): Toward A Cloud Computing Research Ageda , SIGACT news

X. C.Cachin, I. Keidar and A. Shraer(2009): Trusting The Cloud, ACM SIGACT news.

XI. G.Chockler, R. Guerraoui, I. Keidar and M. Vukolic(2009): Reliable Distributed StorageComputer 42.

XII. Clavister (2008): Security in Cloud, White paper.

XIII. S.I. Garfinkel (2003):Email Based Identification and Authentication:An Alternative to PKI?, IEEE.

XIV. Jingwei Li, Jin Li, Dongqing Xie and Zhang C (2015): Secure Auditimg and Deduplicating Data in Cloud, IEEE

XV. M. Armbrust, A. Fox, R.Griffith, A.D. Joseph, R. Kartz, A. Rabkin, M. Zaharia (2010): A View of Cloud computing.

XVI. S. Keelveedhi, M. Bellare and T. Ristenpart(2013): Dupless: Server aided encryption for deduplicated storage, USINEX, Washington.

XVII. H. Sharcham and B. Waters(2008): Compact Proofs of Retrievability, ASIACRYPT , Berlin


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.