Securing the Data in Cloud by Code Generation Method in Two- Tier Architecture

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2017 by IJPTT Journal
Volume - 7 Issue - 1
Year of Publication : 2017
Authors : K.Sathya, Mr. Syed Ismail .A


K.Sathya, Mr. Syed Ismail .A "Securing the Data in Cloud by Code Generation Method in Two- Tier Architecture". International Journal of P2P Network Trends and Technology (IJPTT), V7(1):15-21 Jan - Feb 2017, ISSN:2249-2615,, Published by Seventh Sense Research Group.


The cloud security is one of the important roles in cloud. In this paper, the regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Here we can overcome the security issues in our project. In existing they are using a remote verification technique to audit by the third party or private auditing. In this project the data owners need to be online to manage that auditing. In our system we are using the own auditing based on the token generation. Using this token generation technique compare the token values from original tokens we can find out the changes about the file. Generally users can login into their account then they upload our files. The files will be stored into the cloud storage. In this project we provide the two tier security for our uploaded files. The files does not stored directly it will be divided into the three files, it will be stored into three different cloud server locations. The original file content split into three parts and it will be store into each files. Not only stored also the content will be encrypted in the cloud server. If anyone try to hack at the cloud end is not possible to break the two tier block. They need first decrypt the files and also combine first decrypt the files and also combine the splited files from three different locations. Anyone can download the files from the server with file owner permission. At the time of download key generated (code based key generation) and it will send to the file owner. Every data stored in the cloud will be generated with the Code generation (Token generation) technique, So that the security will be maintained. Once any unauthorized modification is made, the original data in the private cloud will be retrieved by the Owner and will be returned to the user.


1) B. Wang, B. Li, and H. Li, “Oruta: Privacy- Preserving PublicAuditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf.Cloud Computing, pp. 295-302, 2012.
2) M. Armbrust, A. Fox, R. Griffith, A.D. Joseph
3) R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
4) K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69- 73, 2012.
5) D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012.
6) C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533, 2010.
7) B. Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf. Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
8) R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
9) The MD5 Message-Digest Algorithm (RFC1321). https://tools., 2014.
10) G. Ateniese, R. Burns, R. Curtmola, J. Herring, 11) L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-610, 2007.
12) H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90- 107, 2008.
13) C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
14) Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security (ESORICS’09), pp. 355-370, 2009.
15) C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.
16) B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-Based Distributed Storage Systems,” Proc. ACM Workshop Cloud Computing Security Workshop (CCSW’10), pp. 31-42, 2010.

Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure.