SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING



Similar documents
How To Create A Backup And Backup Algorithm In Cloud (Cloud)

Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption

Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing

Data Recovery in Cloud Environment Using Seed Block Algorithm

REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR

How To Backup A Cloud Server With Seed Block Algorithm

241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud

A Review on Data Back-up Techniques for Cloud Computing

Intelligent Cloud Back-Up System

Keywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT;

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding

A smart data backup technique for cloud computing using seed block algorithm strategy

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Near Sheltered and Loyal storage Space Navigating in Cloud

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Cryptographic Data Security over Cloud

Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Identifying Data Integrity in the Cloud Storage

Dynamic Query Updation for User Authentication in cloud Environment

Secure Way of Storing Data in Cloud Using Third Party Auditor

Improving data integrity on cloud storage services

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Disaster Recovery in Cloud Computing

Distributed Framework for Data Mining As a Service on Private Cloud

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Data Storage Security in Cloud Computing

February. ISSN:

Ranked Keyword Search Using RSE over Outsourced Cloud Data

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

How To Ensure Correctness Of Data In The Cloud

Data Integrity by Aes Algorithm ISSN

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Secure Hybrid Cloud Architecture for cloud computing

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

A Road Map on Security Deliverables for Mobile Cloud Application

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

An Efficient Data Correctness Approach over Cloud Architectures

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Review On Incremental Encrypted Backup For Cloud

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Cloud Data Storage Services Considering Public Audit for Security

Enhance data security of private cloud using encryption scheme with RBAC

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

A Proxy-Based Data Security Solution in Mobile Cloud

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Verifying Correctness of Trusted data in Clouds

Security Model for VM in Cloud

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

A Quality Model for E-Learning as a Service in Cloud Computing Framework

A Study on Cloud Computing Disaster Recovery

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Efficient Backingup Data for Migrating Cloud to Cloud

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

An Open MPI-based Cloud Computing Service Architecture

Distributing, Ensuring and Recovery of Data Stored in Cloud

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Transcription:

SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING Vijayalaxmi V Kadlimatti 1, Ramesh Kumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering, STJIT, Ranebennur, Karnataka, (India) ABSTRACT In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The objective of proposed algorithm is twofold; first it help the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. The time related issues are also being solved by proposed SBA such that it will take minimum time for the recovery process. Proposed SBA also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques. Keywords: Central Repository; Remote Repository; Parity Cloud Service; Seed Block I. INTRODUCTION Today, Cloud Computing is itself a gigantic technology which is surpassing all the previous technology of computing (like cluster, grid, distributed etc.) of this competitive and challenging IT world. The need of cloud computing is increasing day by day as its advantages overcome the disadvantage of various early computing techniques. Cloud storage provides online storage where data stored in form of virtualized pool that is usually hosted by third parties. The hosting company operates large data on large data center and according to the requirements of the customer these data center virtualized the resources and expose them as the storage pools that help user to store files or data objects. As number of user shares the storage and other resources, it is possible that other customers can access your data. Either the human error, faulty equipment s, network connectivity, a bug or any criminal intent may put our cloud storage on the risk and danger. And changes in the cloud are also made very frequently; we can term it as data dynamics. The data dynamics is supported by various operations such as insertion, deletion and block modification. Since services are not limited for archiving and taking backup of data; remote data integrity is also needed. Because the data integrity always focuses on the validity and fidelity of the complete state of the server that takes care of the heavily generated data which remains unchanged during storing at main cloud remote server and transmission. Integrity plays an important role in back-up and recovery services. 363 P a g e

II. BACKGROUND The recent back-up and recovery techniques that have been developed in cloud computing Domain such as HSDRT,PCS, ERGOT, Linux Box, Cold/Hot backup strategy etc. Detail review shows that none of these techniques are able to provide best performances under all uncontrolled circumstances such as cost, security, low implementation complexity, redundancy and recovery in short span time. III. RELATED WORK Our proposed SBA is twofold; first SBA helps the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. The recent back-up and recovery techniques lagging behind some critical issues like implementation complexity, low cost, security and time related issues. To cater this issues, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). IV. SCOPE OF THE PAPER The objective of proposed algorithm is twofold. First it helps the users to collect information from any remote location in the absence of network connectivity. Second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. Due to high acceptability of back up process in the companies, the role of a remote data backup server is very crucial and hot research topic. Fig1: Remote Data Backup Server and its Architecture The Remote backup services should cover the following issues: Data Integrity Data security Data Confidentiality Trustworthiness Cost efficiency 364 P a g e

4.1 Data Integrity It is concerned with complete state and the whole structure of the server. It verifies that data such that it remains unaltered during transmission and reception. It is the measure of the validity and fidelity of the data present in the server. 4.2 Data Security Giving full protection to the client s data is also the utmost priority for the remote server. And either intentionally or unintentionally, it should be not able to access by third party or any other users/client s. 4.3 Data Confidentiality Sometimes client s data files should be kept confidential such that if number of users simultaneously accessing the cloud, then data files that are personal to only particular client must be able to hide from other clients on the cloud during accessing of file. 4.4 Trustworthiness The remote cloud must possess the Trustworthiness characteristic. Because the user/client stores their private data; therefore the cloud and remote backup cloud must plays a trustworthy role. 4.5 Cost Efficiency The cost of process of data recovery should be efficient so that maximum number of company/clients can take advantage of back-up and recovery service. V. PROPOSED METHODOLOGY Seed Block Algorithm works to provide the simple Back-up and recovery process. Its architecture is shown in Fig-2 consists of the Main Cloud and its clients and the Remote Server. Here, first we set a random number in the cloud and unique client id for every client. Second, whenever the client id is being register in the main cloud; then client id and random number is getting EXORed ( ) with each other to generate seed block for the particular client. The generated seed block corresponds to each client is stored at remote server. Fig 2: Seed Block Algorithm Architecture 365 P a g e

Whenever client creates the file in cloud first time, it is stored at the main cloud. When it is stored in main server, the main file of client is being EXORed with the Seed Block of the particular client. And that EXORed file is stored at the remote server in the form of file. If either unfortunately file in main cloud crashed / damaged or file is been deleted mistakenly, then the user will get the original file by EXORing file with the seed block of the corresponding client to produce the original file and return the resulted file i.e. original file back to the requested client. The architecture representation of the Seed Block Algorithm is shown in the Fig.2 5.1 Seed Block Algorithm Initialization: Main Cloud: M c ; Remote Server: R s ; Clients of Main Cloud: C 1 ; Files: a 1 and aʹ; Seed block: S i ; Random Number: r; Client s ID: Client_Id i Input: a1 created by C i ; r is generated at M c ; Output: Recovered file a 1 after deletion at M c. Given: Authenticated clients could allow uploading, downloading and do modification on its own the files only. Step 1: Generate a random number. int r = rand( ); Step 2: Create a seed Block S i for each C i and Store at R s. S i = r XOR Client Id i (Repeat step 2 for all clients) Step 3: If C i Admin creates/modifies a a 1 stores at M c, then a 1 create as aʹ1 = a 1 XOR S i Step 4: Store aʹ at Rs. Step 5: If server crashes a 1 deleted from M c, then, we do EXOR to retrieve the original as: a 1 = aʹ1 XOR Si Step 6: Return a 1 to S i. Step 7: END. VI. RESULTS The Fig-3 shows the experimentation result of proposed SBA. As fig-3 (a) shows the original file which is uploaded by the client on main cloud. Fig-3 (b) shows the EXORed file which is stored on the remote server. This file contains the secured EXORed content of original file and seed block content of the corresponding client. Fig-3 (c) shows the recovered file; which indirectly sent to client in the absence of network connectivity and in case of the file deletion or if the cloud gets destroyed due to any reason. Fig.3 Sample Output Image of SBA Algorithm 366 P a g e

VII. CONCLUSION Here we presented detail design of proposed SBA algorithm. Proposed SBA is robust in helping the users to collect information from any remote location in the absence of network connectivity and also to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. Experimentation and result analysis shows that proposed SBA also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques. The time related issues are also being solved by proposed SBA such that it will take minimum time for the recovery process. VII. ACKNOWLEDGEMENT I consider it is a privilege to express my gratitude and respect to all those who guiding me in the progress of my paper. I wish my grateful thanks to Mr. Rameshkumar H K M.Tech, project guide, for his invaluable support and guidance. VIJAYALAXMI V KADLIMATTI REFERENCES [1] Yoichiro Ueno, Noriharu Miyaho, Shuichi Suzuki,Muzai Gakuendai, Inzai-shi, Chiba,Kazuo Ichihara, 2010, Performance Evaluation of a Disaster Recovery System and Practical Network System Applications, Fifth International Conference on Systems and Networks Communications,pp 256-259. [2] Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service, International Joint Conference of IEEE TrustCom- 11/IEEE ICESS-11/FCST-11. [3] Y.Ueno, N.Miyaho, and S.Suzuki,, 2009, Disaster Recovery Mechanism using Widely Distributed Networking and Secure Metadata Handling Technology, Proceedings of the 4th edition of the UPGRADE-CN workshop, pp. 45-48. [4] Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. [5] Vijaykumar Javaraiah Brocade Advanced Networks and Telecommunication Systems (ANTS), 2011, Backup for Cloud and Disaster Recovery for Consumers and SMBs, IEEE 5th International Conference, 2011. [6] Lili Sun, Jianwei An, Yang Yang, Ming Zeng, 2011, Recovery Strategies for Service Composition in Dynamic Network, International Conference on Cloud and Service Computing. [7] Xi Zhou, Junshuai Shi, Yingxiao Xu, Yinsheng Li and Weiwei Sun, 2008, "A backup restoration algorithm of service composition in MANETs," Communication Technology ICCT 11th IEEE International Conference, pp. 588-591. [8] M. Armbrust et al, Above the clouds: A berkeley view of cloud computing, http://www.eecs.berkeley.edu/pubs/techrpts/2009//eec S-2009-28.pdf. 367 P a g e

[9] F.BKashani, C.Chen,C.Shahabi.WSPDS, 2004, Web Services Peerto- Peer Discovery Service, ICOMP. [10] Eleni Palkopoulouy, Dominic A. Schupke, Thomas Bauscherty, 2011, Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture, IEEE ICC. BIOGRAPHY Vijayalaxmi V Kadlimatti is a student pursuing her Master degree in Computer Science and Engineering department at STJ Institute of Technology, Ranebennur, Karnataka, India. Her research interests are Computer Science related aspects such as cloud computing technology, Java programming language and web 2.0. Rameshkumar H K, is assistant professor in the department of Computer Science and Engineering at STJ Institute of Technology, Ranebennur, Karnataka, India. He received his Master degree in Computer Networks. His research interests are related to computer networks. 368 P a g e