Remote Data Integrity Checking for Public Clouds
|
|
- Jeffry Pitts
- 8 years ago
- Views:
Transcription
1 IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with Reza Curtmola (NJIT) Giuseppe Ateniese (JHU) Randal Burns (JHU)
2 Outsource Data to the Cloud Cloud computing/storage brings a lot of benefits: Good elasticity, low cost, easy management, high reliability, etc. People can choose to outsource their data to the cloud to enjoy the benefits However? How can the data owners have confidence that their data have not been tampered with over time Security is one of the largest barriers that stop people from using the cloud How can I make sure that my data are OK all the time???
3 Remote Data Checking (RDC) Remote Data Checking (RDC) is a mechanism used by the data owner (auditor) to check the integrity of data stored at a third party, such as a Cloud Storage Provider (CSP) CSP is not trusted A general RDC scheme contains two phases: Setup and Challenge phase Setup Client may now delete the file Challenge challenge proof of possession 3
4 Provable Data Possession (PDP) Ateniese et al. propose an efficient RDC scheme, Provable Data Possession (PDP) [AB+07, AB+11] PDP is efficient due to the adoption of adopts spot checking technique, in which the client (auditor) randomly samples a certain number of blocks for checking (rather than check the whole outsourced data) PDP shows that if the adversary corrupts 1% of the data, by randomly sampling 460 blocks, the client can detect the corruption with 99% probability The auditor challenges a server for a random set of blocks b1 b b3 b4 b5 b6 b7 b8 b9 bn client Spot checking technique 4
5 Vulnerability of Spot Checking Spot checking technique, however, is vulnerable to small corruption attack Small corruption can be as small as 1 bit very difficult to detect small corruptions by spot checking The adversary only corrupts a few blocks among the file 5
6 Preliminary Solutions for Small Corruption Attack An (n, k) Error Correcting Code (ECC): k data symbols are encoded into n symbols, such that any k out of n symbols can be used to recover the original k data symbols. It can correct up to d=n-k erasures 1 3 k 1 d k data symbols d=n-k parity symbols Small corruption problem is usually addressed by integrating ECCs with Remote Data Checking (Robustness) Robustness can guarantee that small errors which cannot be detected can be recovered How to integrate ECC code to address small corruption attack? 6
7 Preliminary Solutions for Small Corruption Attack (cont.) Full-file encoding encoded file F 9 file F (1, 9) ECC code parity p F is the input of RDC file F 1 st attempt: Expensive encoding, because the code must be as large as the file 7
8 Preliminary Solutions for Small Corruption Attack (cont.) Chunk-based encoding encoded file F file F chunk encode parity p F is the input of RDC (4, 3) ECC for each chunk nd attempt: Cheap encoding (the chunk is small) Cannot address small corruption parity p problem
9 πr scheme πr scheme can address the small corruption problem [CBK08, AB+11, BJO09] Must hide the association between symbols and the corresponding constraint groups The server should not know which symbols are in the same constraint group original file F constraint group F is randomly permuted parity P A (4, 3) error correcting code is applied on every chunk encoded file F P is randomly permuted and encrypted 8 9 F is the input of RDC πr scheme 9
10 Dynamic Setting We have provided solutions to address the small corruption problem for static data Static data: Once the data have been stored in the server, it will never be updated What if the data needs to be updated? Update operations: Insert, delete, modify, append Challenge: Under an adversarial setting, there is a fundamental tension between dynamic updates and the encoding required for small corruption attack file parity untrusted cloud server 10
11 R-DPDP: Robust Dynamic Provable Data Possession Bo Chen and Reza Curtmola, Robust Dynamic Provable Data Possession, ICDCS-SPCC 01, June 01. Bo Chen and Reza Curtmola, Robust Dynamic Remote Data Checking for Public Clouds, The 35th IEEE Sarnoff Symposium (Student Posters), May
12 Cauchy Reed-Solomon Codes Cauchy Reed-Solomon codes are a type of RS codes (Error Correcting Code) which are efficient in encoding/decoding [PX06] and have some useful properties: When modifying/appending a symbol, we only need the parity symbols and a data symbol to update the codeword efficiently data symbol modify P P parity symbol P = _ + neglect coding coefficients P 3 3 append P P 5 P P = + 5 Update a (5, 4) Cauchy RS code Insert/delete one symbol requires a number of symbols linear to the code size Inefficient 1
13 VLCG We propose VLCG (Variable Length Constraint Group) scheme based on two insights: To encode the file initially, we assign symbols to constraint groups based on the value of the symbols o o To insert/delete/modify/append a symbol does not affect the entire file (only affect one constraint group) Constraint groups may have different sizes To leverage the properties of Cauchy RS codes, we convert all the update operations into append and modify operations o o o Insertion operation is converted into append operation Deletion operation is converted into modify operation A modification is equivalent to a deletion plus an insertion 13
14 VLCG (cont.) file F initial file encoding h K ( ) hk(.) is a PRF keyed with key K constraint group parity P insert a symbol P h K ( ) delete a symbol P h K ( 5 ) 14
15 RDC-NC: Remote Data Checking for Network Coding-based Distributed Storage Systems Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns, Remote Data Checking for Network Coding-based Distributed Storage Systems, ACM CCSW '10, October
16 Beyond Single-server RDC Single-server RDC (PDP, R-DPDP) is only one facet of maintaining the health of data (prevention) We really want to ensure long-term data reliability Remote data checking for distributed storage systems Data is stored redundantly at multiple servers Replication Erasure coding Network coding S1 S Sn client 16
17 Reliability in Distributed Storage Systems Traditional approaches to store data redundantly at multiple servers: Replication Erasure Coding Reduced storage overhead Large bandwidth overhead for repair (entire file is retrieved) repair repair S 1 F S F S 1 c 1 F MB S S 3 F F new replica created F b 1 1MB b 1MB S S 3 c c 3 S c 3 new coded block created Replication Any blocks are enough to recover original file (3,) Erasure coding 17
18 Reliability based on Network Coding Network Coding (Regenerating Code): A new coding method that sacrifices some storage overhead for repair bandwidth [DGW+07, DGW+10] Compute coded blocks as linear combinations of original blocks Repair bandwidth is optimal (retrieve x bits to repair x bits) random coding coefficient F 0.66MB 0.66MB 0.66MB b 1 b b 3 S 1 S b 1 b b 3 b 1 +b b 1 +b b 1 +b +b S b 1 +3b +b 3 3b 1 +4b +b 3 new coded blocks created b 1 +b 3 S 3 b +b 3 Network coding (n=3, k=) 18
19 The Need for Remote Data Integrity Checking What if storage servers (cloud servers) are not trusted? Client must ensure storage servers don t misbehave Client periodically checks integrity of outsourced data stored in each server (challenge phase) Client takes action (repair) upon detecting corruption at one of the storage servers (repair phase) 19
20 Adversarial Model Mobile adversary that can behave arbitrarily (Byzantine behavior) The adversary can corrupt at most n-k out of the n servers within any given time interval (an epoch) 0
21 Localize faulty servers Challenges Lack of fixed file layout (makes it difficult to maintain constant storage on client) Erasure coding has fixed file layout (a new, repaired block is identical to the original block) Additional attacks. Replay attack, pollution attack, etc. The newly generated blocks in repair are not necessarily equal to the original corrupted blocks (replay attack) The untrusted servers are responsible for generating the blocks in repair phase (pollution attack) 1
22 Integrity Check for Each Server Can single server solutions (PDP[AB+07, AB+11], PoR [JK07, SW08]) be used? No! Collusion of servers (server can reuse each other s data and meta-data to answer the challenge) Our solution still uses metadata for integrity checks (allows to easily localize faulty servers) Meta-data is customized per server per block: Assign a logical ID to coded blocks (server_index block_index) and embed IDs and coding coefficients into meta-data Tackle the problem of collusion of servers Provide integrity for every block in every server
23 Replay Attack By replaying intentionally, the adversary can corrupt the whole system Replay attack is specific for random network coding-based distributed storage systems (reduce the linear independency of blocks, eventually corrupt the whole system) Difficult to detect and maintain constant client storage (3, ) network coding, original file contains 3 blocks (b1, b, b3) The original data is unrecoverable b 1 b 1 3b 1 +3b 3 3b +3b 3 S 1 S 1 S 1 S 1 b +b 3 b +b 3 3b +3b 3 3b 1 +3b 3 b 3 b 3 b 3 b 3 S b 1 +b S b 1 +b S b 1 +b Replay without being detected S b 1 +b b 1 +b 3 b 1 +b +b 3 S 3 S 3 b +b 3 b 1 +b S 3 b 1 +b +b 3 b 1 +b 3 b 1 +b S 3 b +b 3 S 3 b 1 +b 3 b +b 3 epoch1 epoch epoch3 epoch4 3
24 Replay Attack (cont.) Our solution for replay attack We encrypt the coding coefficients (under the assumption that the original file should not be public) We prove that by encrypting the coefficients, a malicious server s ability to execute a harmful replay attack becomes negligible The server cannot do better than randomly select blocks for replay attack Please refer to the paper for the detailed proof 4
25 Inconsistency between Challenge Phase and Repair Phase Malicious servers can pretend to be good in challenge phase, but behave maliciously in repair Corrupt data (pollution attack) Do not use the random coefficients to generate the new block (entropy attack) 5
26 Inconsistency between Challenge Phase and Repair Phase (cont.) Our solution Repair tag which supports aggregation Client picks the random coefficients and enforces servers to use Client checks if servers use correctly coded blocks Client checks if servers use coding coefficients provided by client repair tag server side Repair client side 0.66MB 0.66MB 0.66MB b 1 b b 3 S 1 S b 1 b b 3 b 1 +b b 1 +b 3 1 b 1 +b 1 1*(b 1 +b )+1*b 3 = t 1 b 1 +b +b 3 t 1 t 1 T t T = (t 1 ) 1 ( t ) 1 S b 1 +3b +b 3 3b 1 +4b +b 3 new coded block created S 3 b +b 3 proof that coded block is correctly computed 6
27 References [AB+07] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, in Proc. of ACM CCS, 007. [AB+11] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, Remote Data Checking Using Provable Data Possession, ACM Transactions on Information and System Security (TISSEC), May 011. [CBK08] R. Curtmola, O. Khan, and R. Burns, Robust remote data checking, in Proc. of ACM StorageSS, 008. [BJO09] K. D. Bowers, A. Juels, and A. Oprea, Proofs of retrievability: Theory and implementation, in Proc. of CCSW, 009. [PX06] J. S. Plank and L. Xu, Optimizing Cauchy Reed-Solomon codes for faulttolerant network storage applications, IEEE NCA 006. [DGW+07] A. G. Dimakis, B. Godfrey, M. J. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, In INFOCOM, 007. [DGW+10] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, IEEE Transactions on Information Theory, 010. [JK07] A. Juels and B. S. Kaliski, PORs: Proofs of retrievability for large files, In Proc. of ACM CCS, 007. [SW08] H. Shacham and B. Waters, Compact proofs of retrievability, in Proc. of Asiacrypt,
28 Conclusion Remote Data Checking (RDC) allows the data owners to check the integrity of the data outsourced to the public clouds We propose Robust Dynamic Provable Data Possession (R-DPDP), to address the small corruption problem for dynamic RDC We propose RDC-NC, a novel remote data checking scheme for network coding-based distributed storage systems Thank you! 8
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationRemote Data Checking for Network Coding-based Distributed Storage Systems
Remote Data Checking for Network Coding-based Distributed Storage Systems Bo Chen, Reza Curtmola Department of Computer Science New Jersey Institute of Technology {bc47,crix}@njit.edu Giuseppe Ateniese,
More informationOVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
More informationEnsuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationPractical Data Integrity Protection in Network-Coded Cloud Storage
Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong Outline Introduction FMSR in NCCloud
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationSecuring Cloud Data Storage
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationFebruary. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
More informationErasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University
More informationIndex Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationSecure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationInternational Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
More informationAnalysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
More informationEnhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
More informationTowards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
More informationTo Assure Factual Information Storage Security in Cloud Computing
To Assure Factual Information Storage Security in Cloud Computing Archana M, Shirisha K, Bhavani V Abstract Abstract-Cloud computing has evolved from virtualization, utility computing and client-server
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationReview On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2
Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India
More informationData storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationPerformance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationSurvey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage
Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage Ankita A. Lande 1, Dr.P.K.Deshmukh 2 1[Department Of Computer Engineering, JSPM s RSCOE, Pune ] 2[Department Of Computer
More informationAn Integrated Approach of Data storage and Security in Cloud Computing
An Integrated Approach of Data storage and Security in Cloud Computing K.SHIRISHA REDDY 1, Dr.M.BALARAJU 2 1 Associate Professor, CSE, VIGNAN BHARATHI INSTITUTE OF TECHNOLOGY, Hyderabad, Andhra Pradesh,
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationStorage Systems Autumn 2009
Storage Systems Autumn 2009 Chapter 5: Securely Auditing André Brinkmann Sources Different Publications Slides from Randal Burns, Johns Hopkins University, USA Awkward for large data What s wrong with
More informationSecurity of Data from Public - Using Cloud Storage
Security of Data from Public - Using Cloud Storage T.Gopika #1, J.Haripriya #2, R.Ilakiyashri #3, S.Praveenkumar #4 UG Student, Dept. of CSE, Anand Institute of Higher Technology, Chennai, Tamil Nadu,
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationAustralian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Secure and Efficient Dynamic Data Operations in Cloud Computing 1 S.K. Mouleeswaran, 2
More informationA Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
More informationA Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,
More informationTo Provide Security & Integrity for Storage Services in Cloud Computing
To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper
More informationNC-Audit: Auditing for Network Coding Storage Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu
NC-Audit: Auditing for Network Coding Storage Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract Network coding-based storage has recently received a lot of attention
More informationPRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
More informationCurrency and Correctness of Content in Object Storage Networks
Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering
More informationCloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationSHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
More informationPrivacy-Preserving Public Auditing For Secure Cloud Storage
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve
More informationA Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
More informationA Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationData Security And Integrity Of Cloud Storage In Cloud Computing
Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,
More informationAN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
More informationTowards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds Bo Chen, Reza Curtmola Department of Computer Science New Jersey Institute of Technology {bc47,crix}@njit.edu ABSTRACT Distributed
More informationDependable and Secure Storage Services in Cloud Computing
Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.
More informationA Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
More informationKeywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationHow To Check If A Data File Is Safe In A Cloud Archive
Evaluate the Performance of Data Integrity Proofs in Cloud Storage 1 D. Hari Krishna, 2 R. Pushpa Latha, 3 J. Srinivasa Rao 1,2,3 Dept. of CSE, NOVA College of Engineering & Tech., Vijayawada, AP, India
More informationEnergy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationHow To Secure Cloud Data Storage
Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,
More informationHow To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationAuditable Version Control Systems
Auditable Version Control Systems Bo Chen Reza Curtmola Department of Computer Science New Jersey Institute of Technology bc47@njit.edu crix@njit.edu Abstract Version control provides the ability to track
More informationSurvey of Data Storage Security in Cloud Computing
Survey of Data Storage Security in Cloud Computing Mr. Kiran Nagargoje, Patel College of Science & Technology Ralamandal Indore, India Abstract: Mr.Niranjan Mahanwar Patel College of Science & Technology
More informationDistributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationVerification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
More informationKeywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationEfficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
More informationIdentifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
More informationEnsuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationCloud Data Storage Security and Public Auditing
A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department
More informationDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,
More informationHow To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
More informationHAIL: A High-Availability and Integrity Layer for Cloud Storage
HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers RSA Laboratories kbowers@rsa.com Ari Juels RSA Laboratories ajuels@rsa.com Alina Oprea RSA Laboratories aoprea@rsa.com Abstract
More informationHow To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.
More informationLINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System Shams Zawoad, Ragib Hasan, and John Grimes University of Alabama at Birmingham, Alabama, USA SECuRE and Trustworthy computing
More informationCONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
More informationI. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationSecure Cloud StorageForPrivacy-Preserving Public Audit
RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely
More informationPrivacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com
More informationKeywords: CSV module, Third Party Auditors, SOAP protocol, ERP system, blowfish cryptography. Introduction
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Cloud Storage Security And Providing Integrity Proof Prof. Avinash C Taskar*, Prof. Mangesh T Nikam * Computer Engineering Department,Sandip
More informationInternational Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Privacy Preservation and Auditing in Public Cloud: A Review Nitesh Kumar Namdeo 1*
More informationIndex Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
More informationEnsuring Data Integrity in Cloud Computing
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Ensuring Data Integrity in Cloud Computing Venkatesa Kumar V Asst.Professor, Dept of Computer Science and
More informationHAIL: A High-Availability and Integrity Layer for Cloud Storage
HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers RSA Laboratories Cambridge, MA, USA kbowers@rsa.com Ari Juels RSA Laboratories Cambridge, MA, USA ajuels@rsa.com Alina Oprea
More informationData Dynamics for Storage Security and Public Auditability in Cloud Computing
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-1, February 10, 2012 Data Dynamics for Storage Security and Public Auditability in Cloud Computing Kayalvizhi S M.E - Software
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationSecure Cloud Storage Meets with Secure Network Coding
Secure Cloud Storage Meets with Secure Network Coding Fei Chen Department of Computer Science and Engineering, Chinese University of Hong Kong, N.T., Hong Kong fchen@cse.cuhk.edu.hk Tao Xiang College of
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationEnabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services
Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationHow To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
More informationComments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
More informationRemote Data Checking Using Provable Data Possession
Remote Data Checking Using Provable Data Possession GIUSEPPE ATENIESE and RANDAL BURNS, The Johns Hopkins University REZA CURTMOLA, New Jersey Institute of Technology JOSEPH HERRING and OSAMA KHAN, The
More information