Practical Data Integrity Protection in Network-Coded Cloud Storage

Size: px
Start display at page:

Download "Practical Data Integrity Protection in Network-Coded Cloud Storage"

Transcription

1 Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong

2 Outline Introduction FMSR in NCCloud FMSR-DIP Publications Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, and Yang Tang NCCloud: Applying Network Coding for the Storage Repair in a Cloud of-clouds Proceedings of the 10th USENIX Conference on File and Storage Technology (FAST 12) Henry C. H. Chen, and Patrick P. C. Lee Practical Data Integrity Protection in Regenerating-Coding-Based Storage To appear in the 31st International Symposium on Reliable Distributed Systems (SRDS 12)

3 Outline Introduction FMSR in NCCloud FMSR-DIP

4 Cloud Storage On-demand storage outsourcing Supports RESTful APIs: PUT, GET, DELETE, LIST

5 Problems in the Cloud

6 Data Integrity Protection Corruption detection Addressed in this work Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)

7 Data Integrity Protection Corruption detection Addressed in this work Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)

8 Data Integrity Protection Corruption detection Addressed in this work (FMSR-DIP) Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)

9 Related Work Single node, smart clouds PDP [Ateniese et al. 07] POR [Juels et al. 07] Multi-node, different storage schemes MR-PDP [Curtmola et al. 08] HAIL [Bowers et al. 09]

10 Our Work Build FMSR-DIP, a corruption detection scheme that allows byte-sampling Works on thin clouds Works on functional minimum storage regenerating (FMSR) code Targets on long-term archives

11 Outline Introduction FMSR in NCCloud FMSR-DIP

12 NCCloud Cloud 1 Users file upload file download Proxy Cloud 2 Cloud 3 Cloud 4

13 Contributions of NCCloud Propose an implementable design of functional minimum storage regenerating (FMSR) code Support basic read/write operations and the repair function on thin clouds Preserve storage requirements as in optimal erasure codes, while reducing repair traffic Implement and evaluate in real cloud storage

14 Repairing a Failed Cloud How to repair: Proxy Cloud 1 Cloud 2 Cloud 3 Cloud 4 Cloud 5 Repair traffic = + + Goal: minimize repair traffic

15 Reed-Solomon Codes Node 1 Node 2 A B A B File of size M Proxy Reed Solomon codes Repair traffic = M Node 3 Node 4 A+B A+2B B A+B A A Conventional repair: n = 4, k = 2 (n, k) MDS code: Any k out of n storage nodes (clouds) can rebuild original file. Reconstruct whole file and generate data in new node

16 FMSR in NCCloud Node 1 Node 2 P1 P2 P3 P4 A B C D File of size M Proxy F-MSR codes Repair traffic = 0.75M Node 3 Node 4 P5 P6 P7 P8 P3 P5 P7 P1 P2 P1 P2 n = 4, k = 2 Code chunk P i = linear combination of original native chunks Repair in FMSR: Download one code chunk from each surviving node Reconstruct new code chunks (via random linear combination) in new node

17 FMSR Property Proxy File partition k(n-k) chunks A B C D encode n(n-k) chunks P1 P2 P3 P4 P5 P6 P7 P8 distribute Storage nodes P1 P2 P3 P4 P5 P6 P7 P8 n=4, k=2

18 FMSR Property Proxy File partition k(n-k) chunks A B C D encode n(n-k) chunks P1 P2 P3 P4 P5 P6 P7 P8 distribute Storage nodes P1 P2 P3 P4 P5 P6 P7 P8 c 1,1 c 1,2 c 1,3 c 1,4... c 8,1 c 8,2 c 8,3 c 8,4 A B C D P1 P2 P3 P4 P5 P6 P7 P8 n=4, k=2 Encoding matrix rank = k(n-k) Native chunks Code chunks

19 NCCloud: Experiments Testbed environment Local cloud Openstack Swift proxy node connected to 15 storage nodes (LAN) NCCloud deployed on proxy node Commercial cloud Microsoft Azure Storage schemes (4,2)-Reed-Solomon vs. (4,2)-FMSR

20 Response time (s) REPAIR Response time (s) DOWNLOAD Response time (s) UPLOAD Response time: Local Cloud RAID-6 RS F-MSR FMSR File size (MB) RAID-6 RS F-MSR FMSR File size (MB) FMSR has higher response time due to encoding/decoding overhead FMSR has slightly less response time in repair, due to less data download RAID-6(native) RS chunk repair) RAID-6(parity) RS (code chunk repair) F-MSR FMSR File size (MB) 20

21 Response time (s) REPAIR Response time (s) DOWNLOAD Response time (s) UPLOAD Response time: Commercial Cloud 6 RAID-6 RS 4 F-MSR FMSR File size (MB) RAID-6 RS F-MSR FMSR File size (MB) No distinct response time difference, as network fluctuations play a bigger role in actual response time RAID-6(native) RS chunk repair) RAID-6(parity) RS (code chunk repair) F-MSR FMSR File size (MB) 21

22 Outline Introduction FMSR in NCCloud FMSR-DIP

23 FMSR-DIP: Design Goals Preserves advantage of FMSR Works on thin clouds Supports sampling to minimize cost Works against a Byzantine, mobile adversary Exhibits arbitrary behaviors Corrupts different subsets of servers over time

24 FMSR-DIP: Overview Cloud 1 Users file upload file download Proxy FMSR- DIP Cloud 2 Cloud 3 Cloud 4 Four operations: Upload, Check, Download and Repair

25 FMSR-DIP: Upload 8 FMSR code chunks, 3 bytes each

26 FMSR-DIP: Upload Apply error-correcting code (ECC) to each chunk individually

27 FMSR-DIP: Upload XOR each byte with a pseudorandom value

28 FMSR-DIP: Upload For each chunk, calculate the MAC of the first 3 bytes

29 FMSR-DIP: Upload Upload the chunks to clouds Encrypt the metadata from NCCloud (which contains the encoding matrix) Append all MACs to metadata Replicate metadata on all nodes

30 FMSR-DIP: Check Pick a row to check

31 FMSR-DIP: Check XOR with the previous pseudorandom values, and check their consistency

32 Recall: FMSR Encoding c 1,1 c 1,2 c 1,3 c 1,4 P 1 c 2,1 c 2,2 c 2,3 c 2,4 c 3,1 c 3,2 c 3,3 c 3,4 A P 2 P 3 c 4,1 c 4,2 c 4,3 c 4,4 B P 4 c 5,1 c 5,2 c 5,3 c 5,4 C P 5 c 6,1 c 6,2 c 6,3 c 6,4 D P 6 c 7,1 c 7,2 c 7,3 c 7,4 c 8,1 c 8,2 c 8,3 c 8,4 Encoding matrix rank = k(n-k) Native chunks P 7 P 8 Code chunks

33 FMSR-DIP: Download Download chunks from any 2 nodes and verify with their MACs

34 FMSR-DIP: Download Remove pseudorandom values and pass to NCCloud for decoding

35 FMSR-DIP: Repair

36 FMSR-DIP: Repair Download 1 chunk from all other nodes and verify with their MACs

37 FMSR-DIP: Repair Remove pseudorandom values and pass to NCCloud

38 FMSR-DIP: Repair NCCloud generates new chunks

39 FMSR-DIP: Repair Process the newly generated chunks as before

40 FMSR-DIP: Repair Upload chunks and update metadata on all nodes

41 FMSR-DIP: Experiments Testbed environment Openstack Swift proxy node connected to 15 storage nodes (LAN) NCCloud and FMSR-DIP deployed on proxy node NCCloud uses RAMDisk as storage Storage scheme (4,2)-FMSR

42 REPAIR Time taken(s) DOWNLOAD Time taken(s) UPLOAD Time taken (s) Running Time vs. File Size 100MB 50MB 20MB 10MB 5MB 1MB Transfer-Up DIP-Encode FMSR File size Transfer-Down DIP-Decode FMSR FMSR-DIP overhead comparable to network transfer time in a LAN environment MB 50MB 20MB 10MB 5MB 1MB 100MB 50MB 20MB 10MB 5MB 1MB File size Transfer-Up Transfer-Down DIP-Encode DIP-Decode FMSR File size

43 Time taken (s) Time taken (s) The Check Operation % check 256B 1KB 4KB 7KB 25KB 256KB Misc. Transfer-Down Rank Checking PRF Download block size Bottleneck in network transfer KB download block size Misc. Transfer-Down Rank Checking PRF 0 100% 75% 50% 25% 10% 5% 1% Checking percentage

44 Conclusions Propose a design for efficient data integrity protection using FMSR on thin clouds Implement and evaluate the efficiency of the design Source code: NCCloud FMSRDIP

45 Thank You!

46 Error Localization Assume each byte is correct in turn

47 Error Localization Form a system with bytes from k other nodes

48 Error Localization Mark all involved bytes as correct if system is consistent

49 Error Localization Try all subsets

50 Error Localization Try all subsets

51 Error Localization And so on

52 Cloud Storage Pricing S3 Rackspace Azure Storage (per GB) $0.125 $0.15 $0.125 Data transfer in (per GB) free free Free Data transfer out (per GB) $0.12 $0.18 $0.12 PUT (per 10,000 requests) $0.10 free $0.01 GET (per 10,000 requests) $0.01 free $0.01 Pricing in US dollars, as of May, 2012

NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds

NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds 1 NCCloud: Network-Coding-ased Storage System in a Cloud-of-Clouds Henry C. H. Chen, Yuchong Hu, Patrick P. C. Lee, and Yang Tang bstract To provide fault tolerance for cloud storage, recent studies propose

More information

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam,

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds

NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds NCCloud: pplying Network Coding for the Storage Repair in a Cloud-of-Clouds Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, Yang Tang The Chinese University of Hong Kong, Columbia University [email protected],

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Security of Data from Public - Using Cloud Storage

Security of Data from Public - Using Cloud Storage Security of Data from Public - Using Cloud Storage T.Gopika #1, J.Haripriya #2, R.Ilakiyashri #3, S.Praveenkumar #4 UG Student, Dept. of CSE, Anand Institute of Higher Technology, Chennai, Tamil Nadu,

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

Data storage security in Cloud

Data storage security in Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

How To Encrypt Data With A Power Of N On A K Disk

How To Encrypt Data With A Power Of N On A K Disk Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Data Corruption In Storage Stack - Review

Data Corruption In Storage Stack - Review Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum

More information

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology

More information

HAIL: A High-Availability and Integrity Layer for Cloud Storage

HAIL: A High-Availability and Integrity Layer for Cloud Storage HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers RSA Laboratories [email protected] Ari Juels RSA Laboratories [email protected] Alina Oprea RSA Laboratories [email protected] Abstract

More information

Auditing for Distributed Storage Systems

Auditing for Distributed Storage Systems Auditing for Distributed Storage Systems 1 Anh Le, Member, IEEE Athina Markopoulou, Senior Member, IEEE and Alexandros G. Dimakis, Member, IEEE arxiv:1203.1730v5 [cs.cr] 12 May 2014 Abstract Distributed

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Remote Data Checking for Network Coding-based Distributed Storage Systems

Remote Data Checking for Network Coding-based Distributed Storage Systems Remote Data Checking for Network Coding-based Distributed Storage Systems Bo Chen, Reza Curtmola Department of Computer Science New Jersey Institute of Technology {bc47,crix}@njit.edu Giuseppe Ateniese,

More information

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Currency and Correctness of Content in Object Storage Networks

Currency and Correctness of Content in Object Storage Networks Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

Reliability and Fault Tolerance in Storage

Reliability and Fault Tolerance in Storage Reliability and Fault Tolerance in Storage Dalit Naor/ Dima Sotnikov IBM Haifa Research Storage Systems 1 Advanced Topics on Storage Systems - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Cloud storage with Apache jclouds

Cloud storage with Apache jclouds Cloud storage with Apache jclouds Andrew Gaul 19 November 2014 http://jclouds.apache.org/ http://gaul.org/ 1 / 29 Overview What is Apache jclouds What is object storage Basic concepts How to put and get

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...

More information

Energy Efficiency in Secure and Dynamic Cloud Storage

Energy Efficiency in Secure and Dynamic Cloud Storage Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing IOSR Journal of Engineering e-issn: 2250-3021, p-issn: 2278-8719, Vol. 2, Issue 12 (Dec. 2012) V2 PP 17-21 Ensuring Data Storage Security in Cloud Computing Rampal Singh, Sawan Kumar, Shani Kumar Agrahari

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

PORs: Proofs of Retrievability for Large Files

PORs: Proofs of Retrievability for Large Files PORs: Proofs of Retrievability for Large Files Ari Juels RSA Laboratories Burt Kaliski EMC Innovation Network ACM CCS Conference, 2007 presented by Serkan Uzunbaz Source: www.rsa.com/rsalabs/node.asp?id=3357

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

TECHNICAL WHITE PAPER: ELASTIC CLOUD STORAGE SOFTWARE ARCHITECTURE

TECHNICAL WHITE PAPER: ELASTIC CLOUD STORAGE SOFTWARE ARCHITECTURE TECHNICAL WHITE PAPER: ELASTIC CLOUD STORAGE SOFTWARE ARCHITECTURE Deploy a modern hyperscale storage platform on commodity infrastructure ABSTRACT This document provides a detailed overview of the EMC

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

Magnus: Peer to Peer Backup System

Magnus: Peer to Peer Backup System Magnus: Peer to Peer Backup System Naveen Gattu, Richard Huang, John Lynn, Huaxia Xia Department of Computer Science University of California, San Diego Abstract Magnus is a peer-to-peer backup system

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is

More information

Distributing, Ensuring and Recovery of Data Stored in Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Today s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4

Today s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4 EECS 262a Advanced Topics in Computer Systems Lecture 4 Filesystems (Con t) September 15 th, 2014 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley Today

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Secure Storage Services and Erasure Code Implementation in Cloud Servers Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,

More information

Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers

Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers Anwitaman Datta Joint work with Frédérique Oggier (SPMS) School of Computer Engineering Nanyang Technological University

More information

Data Protection Technologies: What comes after RAID? Vladimir Sapunenko, INFN-CNAF HEPiX Spring 2012 Workshop

Data Protection Technologies: What comes after RAID? Vladimir Sapunenko, INFN-CNAF HEPiX Spring 2012 Workshop Data Protection Technologies: What comes after RAID? Vladimir Sapunenko, INFN-CNAF HEPiX Spring 2012 Workshop Arguments to be discussed Scaling storage for clouds Is RAID dead? Erasure coding as RAID replacement

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Enhance Data Security in Cloud Computing using Layered Interleaving Approach Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.

More information

Load Re-Balancing for Distributed File. System with Replication Strategies in Cloud

Load Re-Balancing for Distributed File. System with Replication Strategies in Cloud Contemporary Engineering Sciences, Vol. 8, 2015, no. 10, 447-451 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5263 Load Re-Balancing for Distributed File System with Replication Strategies

More information

Service Description Cloud Storage Openstack Swift

Service Description Cloud Storage Openstack Swift Service Description Cloud Storage Openstack Swift Table of Contents Overview iomart Cloud Storage... 3 iomart Cloud Storage Features... 3 Technical Features... 3 Proxy... 3 Storage Servers... 4 Consistency

More information

Exercise 2 : checksums, RAID and erasure coding

Exercise 2 : checksums, RAID and erasure coding Exercise 2 : checksums, RAID and erasure coding Sébastien Ponce May 22, 2015 1 Goals of the exercise Play with checksums and compare efficiency and robustness Use hand written version of RAID systems and

More information

Data Security And Integrity Of Cloud Storage In Cloud Computing

Data Security And Integrity Of Cloud Storage In Cloud Computing Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,

More information

How To Check If A Data File Is Safe In A Cloud Archive

How To Check If A Data File Is Safe In A Cloud Archive Evaluate the Performance of Data Integrity Proofs in Cloud Storage 1 D. Hari Krishna, 2 R. Pushpa Latha, 3 J. Srinivasa Rao 1,2,3 Dept. of CSE, NOVA College of Engineering & Tech., Vijayawada, AP, India

More information

www.basho.com Technical Overview Simple, Scalable, Object Storage Software

www.basho.com Technical Overview Simple, Scalable, Object Storage Software www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...

More information

CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT

CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT SS Data & Storage CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT HEPiX Fall 2012 Workshop October 15-19, 2012 Institute of High Energy Physics, Beijing, China SS Outline

More information

ESPRESSO: An Encryption as a Service for Cloud Storage Systems

ESPRESSO: An Encryption as a Service for Cloud Storage Systems 8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014 Outline Introduction and

More information

A Secure Cloud Backup System with Assured Deletion and Version Control

A Secure Cloud Backup System with Assured Deletion and Version Control A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong

More information

A Survey on Secure Auditing and Deduplicating Data in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])

More information

Distributed Storage Networks and Computer Forensics

Distributed Storage Networks and Computer Forensics Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,

More information

Building Storage Clouds for Online Applications A Case for Optimized Object Storage

Building Storage Clouds for Online Applications A Case for Optimized Object Storage Building Storage Clouds for Online Applications A Case for Optimized Object Storage Agenda Introduction: storage facts and trends Call for more online storage! AmpliStor: Optimized Object Storage Cost

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant

More information

Aspera Direct-to-Cloud Storage WHITE PAPER

Aspera Direct-to-Cloud Storage WHITE PAPER Transport Direct-to-Cloud Storage and Support for Third Party April 2014 WHITE PAPER TABLE OF CONTENTS OVERVIEW 3 1 - THE PROBLEM 3 2 - A FUNDAMENTAL SOLUTION - ASPERA DIRECT-TO-CLOUD TRANSPORT 5 3 - VALIDATION

More information

Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage

Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage Ankita A. Lande 1, Dr.P.K.Deshmukh 2 1[Department Of Computer Engineering, JSPM s RSCOE, Pune ] 2[Department Of Computer

More information