A Secure and Dependable Cloud Storage Service in Cloud Computing

Similar documents
How To Ensure Data Integrity In Cloud Computing

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

How To Design A Cloud Data Storage Service For A Cloud Computer System

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Data Storage Security in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Secure Way of Storing Data in Cloud Using Third Party Auditor

Improving data integrity on cloud storage services

Ensuring Data Storage Security in Cloud Computing

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

February. ISSN:

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

ADVANCE SECURITY TO CLOUD DATA STORAGE

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Verifying Correctness of Trusted data in Clouds

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Near Sheltered and Loyal storage Space Navigating in Cloud

Analysis of Secure Cloud Data Sharing Within a Group

Erasure correcting to enhance data security in cloud data storage

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Keywords Cloud Computing, Cloud computing Architecture, Intruder, Security Issues.

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Secure Distribution of File on Cloud

Data storage security in Cloud

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Privacy preserving technique to secure cloud

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Identifying Data Integrity in the Cloud Storage

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Dependable and Secure Storage Services in Cloud Computing

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Data Integrity and Dynamic Storage Way in Cloud Computing

Distributing, Ensuring and Recovery of Data Stored in Cloud

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Survey Paper on Integrity Auditing of Storage

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

How To Secure Cloud Data Storage

Cloud Data Storage Services Considering Public Audit for Security

Surveying Cloud Storage Correctness using TPA with BLS

Cryptographic Data Security over Cloud

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

A Survey on Secure Auditing and Deduplicating Data in Cloud

Security in Data Storage and Transmission in Cloud Computing

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

A Survey on Data Integrity of Cloud Storage in Cloud Computing

International Journal of Advance Research in Computer Science and Management Studies

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Cloud Server Storage Security Using TPA

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Transcription:

A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a co-located cloud computer service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Webbased content management systems. In this paper, we implement a Flexible Distributed Storage Integrity Auditing Mechanism Using Homomorphic Token Ensuring Security in Cloud. The implemented design enables users to audit the cloud storage with very low communication and computation cost. Taking into consideration that the cloud data are automatic in nature, this design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Urlam Sridhar Assistant Professor Department of CSE Sri Venkateswra College of Engineering & Technology Keywords: Cloud Storage, Cloud Computing, Authentication, Encryption, Cryptography, Security, Secure Storage System, Data Backup and Restore. Introduction: Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rack space, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. Cloud storage is based on highly virtualized infrastructure and is like broader cloud computing in Page 1660

terms of accessible interfaces, near-instant elasticity and scalability, multi-tenancy, and metered resources. Cloud storage services can be utilized from an offpremises service or deployed on-premises. Cloud storage typically refers to a hosted object storage service, but the term has broadened to include other types of data storage that are now available as a service, like block storage. Object storage services like Amazon S3 and Microsoft Azure Storage, object storage software like Openstack Swift, object storage systems like EMC Atmos and Hitachi Content Platform, and distributed storage research projects like OceanStore[5] and VISION Cloud [6] are all examples of storage that can be hosted and deployed with cloud storage characteristics. Cloud storage is: Made up of many distributed resources, but still acts as one - often referred to as federated storage clouds Highly fault tolerant through redundancy and distribution of data Highly durable through the creation of versioned copies Typically eventually consistent with regard to data replicas Existing System: From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. 1. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. 2. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance. Disadvantages of Existing System: These techniques, while can be useful to ensure the storage correctness without having users possessing data, cannot address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As an complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. Proposed System: In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users data in the cloud. We rely on erasure correcting code in the file Page 1661

distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication and storage overhead as compared to the traditional replicationbased file distribution techniques. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the storage correctness insurance as well as data error localization: whenever data corruption has been detected during the storage correctness verification, our scheme can almost guarantee the simultaneous localization of data errors, i.e., the identification of the misbehaving server(s). Advantages of Proposed System: 1. Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error. 2. Unlike most prior works for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 3. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Implementation Modules: System Model File Retrieval and Error Recovery Third Party Auditing Cloud Operations Modules Description: 1. System Model User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems. Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. 2. File Retrieval and Error Recovery Since our layout of file matrix is systematic, the user can reconstruct the original file by downloading the data vectors from the first m servers, assuming that they return the correct response values. Notice that our verification scheme is based on random spot-checking, so the storage correctness assurance is a probabilistic one. We can guarantee the successful file retrieval with high probability. On the other hand, whenever the data corruption is detected, the comparison of pre-computed tokens and received response values can guarantee the identification of misbehaving server(s). 3. Third Party Auditing As discussed in our architecture, in case the user does not have the time, feasibility or resources to perform the storage correctness verification, he can optionally delegate this task to an independent third party auditor, making the cloud storage publicly verifiable. However, as pointed out by the recent work, to securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy. Namely, TPA should not learn user s data content through the delegated data auditing. 4. Cloud Operations (1) Update Operation In cloud data storage, sometimes the user may need to modify some data block(s) stored in the cloud, we refer this operation as data update. In other words, for all the unused tokens, the user needs to exclude every Page 1662

occurrence of the old data block and replace it with the new one. DFD Client: (2) Delete Operation Sometimes, after being stored in the cloud, certain data blocks may need to be deleted. The delete operation we are considering is a general one, in which user replaces the data block with zero or some special reserved data symbol. From this point of view, the delete operation is actually a special case of the data update operation, where the original data blocks can be replaced with zeros or some predetermined special blocks. (3) Append Operation In some cases, the user may want to increase the size of his stored data by adding blocks at the end of the data file, which we refer as data append. We anticipate that the most frequent append operation in cloud data storage is bulk append, in which the user needs to upload a large number of blocks (not a single block) at one time. Architecture: Activity Diagram An activity diagram is characterized by states that denote various operations. Transition from one state to the other is triggered by completion of the operation. The purpose of an activity is symbolized by round box, comprising the name of the operation. An operation symbol indicates the execution of that operation. This activity diagram depicts the internal state of an object. System Design Data Flow Diagram / Use Case Diagram / Flow Diagram The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to represent a system in terms of the input data to the system, various processing carried out on these data, and the output data is generated by the system. Fig. Activity Diagram Page 1663

Conclusion: To summarize, cloud provides many options for everyday computer user as well as large and small business. It opens up the world of computing broader range of uses and increase the ease of used by giving access through internet connection. However, with this increase ease also come drawback. In this paper we implemented an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., whenever data corruption has been detected during the storage correctness verification across the distributed servers, we can almost guarantee the simultaneous identification of the misbehaving server(s)if you are considering using cloud, be certain that you identify what information you will be putting out in cloud, who will have access the information and what you will you need to make sure it is protected. In future, we will extend our research by deploying an application in own cloud and also by providing security and backup to justify our concepts of security for cloud computing. References: [1] Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, Towards Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Cloud Computing, Volume: 5, Issue: 2, April-June 2012 [2] Suresh Arangi & Jayanthi Rao Madina, Flexible and lightweight Storage Auditing Mechanism in Cloud Computing for dynamic operations, IJMETMR, http://www.ijmetmr.com/olfebruary2015/suresharang i-jayanthiraomadina-28.pdf, Volume No: 2(2015), Issue No: 2 (February) [3] C. Wang, Q. Wang, K. Ren, and W. Lou, Towards Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220 232, 2011. [4] Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and S. Chen, Dynamic Audit Services for Outsourced Storage in Clouds, IEEE Transactions on Services Computing, accepted. [5] S. Marium, Q. Nazir, A. Ahmed, S. Ahthasham and Aamir M. Mirza, Implementation of EAP with RSA for Enhancing The Security of Cloud Computig, International Journal of Basic and Applied Science, vol 1, no. 3, pp. 177-183, 2012 [6] Balkrishnan. S, Saranya. G, Shobana. S and Karthikeyan.S, Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud, International Journal of computer science and Technology, vol. 2, no. 2, ISSN 2229-4333 (Print) ISSN: 0976-8491(Online), June 2012 [7] K. Kiran Kumar, K. Padmaja, P. Radha Krishna, Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN: 2229-4333 (Print), March 2012 [8] Jachak K. B., Korde S. K., Ghorpade P. P. and Gagare G. J., Homomorphic Authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing, Bioinfo Security Informatics, vol. 2, no. 2, pp. 49-52, ISSN. 2249-9423, 12 April 2012 [9] J. Yuan and S. Yu, Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud, in Proceedings of ACM ASIACCS- SCC 13, 2013 [10] H. Shacham and B. Waters, Compact Proofs of Retrievability, in the Proceedings of ASIACRYPT 2008. SpringerVerlag,2008,pp.90 107. [11] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, Provable Data Possession at Untrusted Stores, in the Proceedings of ACM CCS 2007, 2007, pp. 598 610. Page 1664