AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS



Similar documents
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Improving data integrity on cloud storage services

How To Ensure Data Integrity In Clouds

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Trusted Public Auditing Process for Secure Cloud Storage

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Near Sheltered and Loyal storage Space Navigating in Cloud

Surveying Cloud Storage Correctness using TPA with BLS

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Enable Public Audit ability for Secure Cloud Storage

Enabling Public Auditing for Secured Data Storage in Cloud Computing

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

ADVANCE SECURITY TO CLOUD DATA STORAGE

Data Grid Privacy and Secure Storage Service in Cloud Computing

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Cloud Server Storage Security Using TPA

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Verifying Correctness of Trusted data in Clouds

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Analysis of Secure Cloud Data Sharing Within a Group

How To Ensure Data Integrity In Cloud Computing

Secure Way of Storing Data in Cloud Using Third Party Auditor

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Data Storage Security in Cloud Computing

BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA

Preserving Data Privacy in Third Party Cloud Audit

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Privacy-Preserving Public Auditing for Secure Cloud Storage

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

A Secure and Dependable Cloud Storage Service in Cloud Computing

Secure Privacy Preserving Public Auditing for Cloud storage

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Auditing and Deduplicating Data in Cloud

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

Cryptographic Data Security over Cloud

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Data management using Virtualization in Cloud Computing

Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Efficient Cloud Computing with Secure Data Storage using AES

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Cloud Data Storage Services Considering Public Audit for Security

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Security of Data from Public - Using Cloud Storage

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

International Journal of Advanced Research in Computer Science and Software Engineering

Privacy preserving technique to secure cloud

Transcription:

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE, Jay Shriram Group of Institutions, Tirupur. mrajislm@gmail.com Abstract-Cloud-based outsourced storage relieves the client s burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security risks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services. In this paper, profiting from the interactive zero-knowledge proof system, we address the construction of an interactive PDP protocol to prevent the fraudulence of proverb (soundness property) and the leakage of verified data (zero knowledge property). We prove that our construction holds these properties based on the computation Diffie Hellman assumption and the rewind able black-box knowledge extractor. We also propose an efficient mechanism with respect to probabilistic queries and periodic verification to reduce the audit costs per verification and implement abnormal detection timely. In addition, we present an efficient method for selecting an optimal parameter value to minimize computational overheads of cloud audit services. Our experimental results demonstrate the effectiveness of our approach. Index Terms Cloud computing, PDP, black box, extrato. I.INTRODUCTION Cloud computing, or something being in the cloud, is an expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet. In science, cloud computing is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time. The phrase is also more commonly used to refer to network-based services which appear to be provided by real server hardware, which in fact are served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up (or down) on the fly without affecting the end user arguably, rather like a cloud. The popularity of the term can be attributed to its use in marketing to sell hosted services in the sense of application service provisioning that run client server software on a remote location. 194 A. Outsourcing Fig.1 Architecture of Cloud Computing Cloud-based outsourced storage relieves the client s burden for storage management and maintenance by providing a comparably low-cost, scalable, locationindependent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security risks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services. B. Provable data possession In this paper, profiting from the interactive zeroknowledge proof system, we address the construction of an interactive PDP protocol to prevent the fraudulence of proved (soundness property) and the leakage of verified data (zero knowledge property). We prove that our construction holds these properties based on the computation Diffie Hellman assumption and the rewind able black-box knowledge extractor. We also propose an efficient mechanism with respect to probabilistic queries and periodic verification to reduce the audit costs per verification and implement abnormal detection timely. In addition, we present an efficient method for selecting an optimal parameter value to minimize computational overheads of cloud audit services. Our experimental results demonstrate the effectiveness of our approach.

II.OBJECTIVE A. Advantages Objective of the project is to verify the integrity of data without retrieving it at an untrusted server and can be used to realize audit services and to achieve a privacypreserving public auditing system for cloud data storage security and Make TPA to perform multiple auditing tasks simultaneously.we also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. III. EXISTING SYSTEM Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. With proven security relied on number theoretic assumptions are more desirable, whenever the user is not perfectly happy with trusting the security of the VM or the honesty of the technical staff. The challenging problem is how to effectively share encrypted data. The existing method is a new technique, which is based on tree structure in providing keys to the files. Each leaf node file has a secret key for decrypting that ciphertext class of that file. And the parent nodes also have a secret key. If the key is granted to receiver for the leaf node, that particular file only decrypted. And if the key is granted for the parent node, then the receiver have rights to decrypt the parent node and the leaf nodes which are under that parent node. The remaining node remains same. B. Disadvantages The disadvantages of existing system are 1. Not a full secure, because TPA (Third Party Audit) knows the all the details. That reason only the user privacy is affected. 2. TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user The advantages of proposed system are 1. Using cryptographic technique (PDP). 2. It with random mask technique to achieve aprivacypreserving public auditing system for cloud data storage security while keeping all above requirements in mind. 3. Security and performance is high. 4. Highly efficient. 5. Bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. B. Data Flow Diagram User request Audit outsourcing service system Monitoring TPA (Third party Audit) Secure and performance analysis 3. The third party auditing process should bring in no new vulnerabilities towards user data privacy IV.PROPOSED SYSTEM The proposed method called public Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server; can be used to realize audit services. It with random mask technique to achieve a privacypreserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient Handling of multiple auditing tasks, we further explore he technique of bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. 195 yes Yes No Fig.2Data Flow Diagram of efficient Audit Outsourcing System If validated User? Get Access Closed Not allow to access

C. System Architecture 4. Granted applications (GA) Who have the right to access and manipulate stored data. These Applications can be either inside clouds or outside clouds according to the Specific requirements. 2. Audit Outsourcing Service System: In this module the client (data owner) uses the secret key to preprocess the file, which consists of a collection of blocks, generates a set of public verification information that is stored in TPA, transmits the file and some verification tags to Cloud service provider CSP, and may delete its local copy.at a later time, using a protocol of proof of irretrievability, TPA (as an audit agent of clients) issues a challenge to audit (or check) the integrity and availability of the outsourced data in terms of the public verification information. It is necessary to give an alarm for abnormal events. 3. Secure and Performance Analysis: In this module, we considered to secure the data and give performance to the following: Fig.3 System Architecture of efficient Audit outsourcing system V. MODULE DESCRIPTION The following modules are used in proposed system 1. Audit Service System 2. Data Storage Service System 3. Audit Outsourcing Service System 4. Secure and Performance Analysis 5. Implementing KAE method in TPA: 1.Audit Service System: In this module we provide an efficient and secure cryptographic interactive audit scheme for public audit ability. We provide an efficient and secure Cryptographic interactive retains the soundness property and zero-knowledge property of proof systems. These two properties ensure that our scheme can not only prevent the deception and forgery of cloud storage providers, but also prevent the leakage of outsourced data in the process of verification. Data Storage Service System: In this module, we considered FOUR entities to store the data in secure, 1. Data owner (DO) Who has a large amount of data to be stored in the cloud. 2. Cloud service provider (CSP) Who provides data storage service and has enough storage spaces and Computation resources. 3. Third party auditor (TPA) Who has capabilities to manage or monitor outsourced data under the delegation of data owner. Audit-without-downloading To allow TPA (or other clients with the help of TPA) to verify the correctness of cloud data on demand without retrieving a copy of whole data or introducing additional on-line burden to the cloud users. Verification-correctness To ensure there exists no cheating CSP that can pass the audit from TPA without indeed storing users data intact. Privacy-preserving To ensure that there exists no way for TPA to derive users data from then information collected during the auditing process. High-performance To allow TPA to perform auditing with minimum overheads in storage, Communication and computation, and to support statistical audit sampling and Optimized audit schedule with a long enough period of time. 4. Implementing KAE method in TPA: A key-aggregate encryption scheme consists of five polynomial-time algorithms as follows. The data owner establishes the public system parameter via Setup and generates a public/mastersecretkeypair via KeyGen. Messages can be encrypted via Encrypt by anyone who also decides what cipher text class is associated with the plaintext message to be encrypted. The data owner can use the master-secret to generate an aggregate decryption key for a set of cipher text classes via Extract. The generated keys can be passed to delegates securely (via secure e-mails or secure devices) finally; any user with an aggregate key can 196

decrypt any cipher text provided that the cipher text s class is contained in the aggregate key via Decrypt. VI.SCREENSHOTS A.Home Screen To registration Fig.4 Home Screen To Registration B. New user Registration Fig.5New user Registration C.Existing User upload the files Fig.6upload file 197 Fig.7successful upload VII.CONCLUSION AND FUTURE WORK In this paper, we addressed the construction of an efficient audit service for data integrity in clouds. Profiting from the standard interactive proof system, we proposed an interactive audit protocol to implement the audit service based on a third party auditor. In this audit service, the third party auditor, known as an agent of data owners, can issue a periodic verification to monitor the change of outsourced data by providing an optimized schedule. To realize the audit model, we only need to maintain the security of the third party auditor and deploy a lightweight daemon to execute the verification protocol. Hence, our technology can be easily adopted in a cloud computing environment to replace the traditional Hashbased solution. More importantly, we proposed and quantified a new audit approach based on probabilistic queries and periodic verification, as well as an optimization method of parameters of cloud audit services. This approach greatly reduces the workload on the storage servers, while still achieves the detection of servers misbehavior with a high probability. Our experiments clearly showed that our approach could minimize computation and communication overheads. In the future work, we can implement some more additional features in the same application.in future work, we utilize the public Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server; can be used to realize audit services. It with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient Handling of multiple auditing tasks, we further explore he technique of bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly

efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. VIII.REFERENCES [1] S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M.Yiu, SPICE - Simple Privacy-Preserving Identity- Management for Cloud Envi-ronment, in Applied Cryptography and Network Security ACNS 2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526 543. [2] L. Hardesty, Secure computers aren t so secure, MIT press, 2009, http://www.physorg.com/news176107396.html. [3] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, Privacy- Preserving Public Auditing for Secure Cloud Storage, IEEE Trans. Computers, vol. 62, no. 2, pp. 362 375, 2013. [7] M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, 2009. [8] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records, in Proceedings of ACM Workshop on Cloud Computing Security (CCSW 09). ACM, 2009, pp. 103 114. [9] F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedings of Informa- tion Security and Cryptology (Inscrypt 07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384 398. [4] B. Wang, S. S. M. Chow, M. Li, and H. Li, Storing Shared Data on the Cloud via Security-Mediator, in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013. [5] S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, Dynamic Secure Cloud Storage with Provenance, in Cryptog-raphy and Security: From Theory to Applications - Essays Dedicated to Jean- Jacques Quisquater on the Occasion of His 65th Birthday, ser. LNCS, vol. 6805. Springer, 2012, pp. 442 464. [6] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, in Proceedings of Advances in Cryptology - EUROCRYPT 03, ser. LNCS, vol. 2656. Springer, 2003, pp. 416 432. AUTHORS BIOGRAPHY K.Saranya received her B.E degree in Tamil Nadu college of Engineering, Coimbatore India and currently pursuing M.E degree in Jay Shriram Group of Institutions, Tiruppur, India. Her research interests include Cloud Computing, Data mining and Networking. System Dr.S. Rajalakshmi received her B.E. degree in Periyar University, Salem, India and M.E. degree n Anna University, Chennai, India and Ph.D. in Data mining in Anna University, India. Currently she is working as an Associate Professor in Jay Shriram Group of Institutions, Tirupur, India. Her research interests include Data mining, Cloud Computing and Big Data. 198