Data Grid Privacy and Secure Storage Service in Cloud Computing

Similar documents
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Secure Cloud StorageForPrivacy-Preserving Public Audit

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Trusted Public Auditing Process for Secure Cloud Storage

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

Improving data integrity on cloud storage services

Enable Public Audit ability for Secure Cloud Storage

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

ADVANCE SECURITY TO CLOUD DATA STORAGE

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Cloud Data Storage Services Considering Public Audit for Security

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Hey! Cross Check on Computation in Cloud

Privacy-Preserving Public Auditing for Secure Cloud Storage

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Near Sheltered and Loyal storage Space Navigating in Cloud

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Verifying Correctness of Trusted data in Clouds

Selective dependable storage services for providing security in cloud computing

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Improving Audit Service in Cloud for Outsourced Storage Dynamically

Cloud Server Storage Security Using TPA

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Efficient Cloud Computing with Secure Data Storage using AES

SECURED DATA STORAGE IN CLOUD

Cloud Data Storage Security and Public Auditing

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

An Efficient Data Correctness Approach over Cloud Architectures

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Secure Privacy Preserving Public Auditing for Cloud storage

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

Public Auditing for Shared Data in the Cloud by Using AES

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage

Dynamic Data Storage for Trustworthy Cloud

Secure Way of Storing Data in Cloud Using Third Party Auditor

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

Data Security in Cloud Using Elliptic Curve Crytography

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

Research Paper on Data Integrity Checking In Cloud Computing

How To Ensure Data Integrity In Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing

CRYPTOGRAPHY IN NETWORK SECURITY

Identifying Data Integrity in the Cloud Storage

Surveying Cloud Storage Correctness using TPA with BLS

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Dynamic Resource Allocation and Data Security for Cloud

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

A Proxy-Based Data Security Solution in Mobile Cloud

International Journal of Advance Research in Computer Science and Management Studies

BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN:

Towards a compliance audit of SLAs for data replication in Cloud storage

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Data Storage Security in Cloud Computing

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

An Integrated Approach of Data storage and Security in Cloud Computing

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Public Auditability and Privacy preserving in Cloud Storage

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage

An Empirical Model of Data Monitoring Service over cloud

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Software Tool for Implementing RSA Algorithm

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Remote Data Integrity Checking in Cloud Computing

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme

Data Integrity and Dynamic Storage Way in Cloud Computing

Transcription:

Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai 2 Assistant Professor, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University, Chennai ABSTRACT Email: reddy.revathi24@gmail.com In cloud storage, user s needs the data integrity protection in cloud computing task, especially for users with constrained computing resources. Thus, enabling public audit ability for cloud storage is of critical importance so that users can report to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free.the data owner can share the space where his data are stored with other trusted people. Thus, users set the access rights with whom he/she wants to share the cloud space and that information will be forwarded to the TPA.[1] So, TPA on authentication or receiving the file access request, checks the user whether he is the real data owner or the user who has the rights to access the data. TPA lets these users to directly view the file and denies other users who try to access the file and pass the log report to the data owner. We use cryptographic techniques to securely store the data. We further have integrated RSA and TRIPLE DES algorithms for providing more security to the data. Thus the main objective we focused in this paper is providing privacy to the users and security to the data uploaded and stored by users in the cloud. [I] INTRODUCTION In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet, similar to utility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. Network-based services, which appear to be provided by real server hardware and are in fact served up by virtual hardware simulated by software running on one or more real machines, are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object. In common usage, the term "the cloud" is essentially a meaph or for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service. Typically, the seller has actual energyconsuming servers which host products and services from a remote location. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those accessed data and might be too late to recovery. [II]RELATED WORK Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources.[2] While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both enterprises and individuals with high service-level requirements. In order to facilitate rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable on-demand data correctness verification on behalf of cloud data owners have to be designed. In this article we propose that publicly auditable cloud data storage is Integrated Intelligent Research (IIR) 1039

able to help this nascent cloud economy become fully established. With public auditability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality. Data vaulting systems are increasingly being used to store off-site copies or backups of critical data (for example, financial, government, or sensor data). If backup data stored in the data vault become corrupted without knowledge of the data owner (the data vault customer), no backup recovery is possible in case of loss of the primary critical data.[3] Using a remote data possession checking protocol, the data vault customer might be able to periodically verify that the data vault provider is storing a current and complete copy or backup of the critical files. Any corruption will be noticed by the data owner who will be able to take immediate action (such as making another backup or using another data vault provider). Remote data possession checking is an important component of intrusion detection systems (IDS) used to detect server corruption. However, if the application is a different service than the backup itself and the server can be corrupted/malicious, a remote data possession checking protocol alone is not enough: the server could back up original files and access them to properly run the protocol while using the corrupted versions to provide the service. In the Dependable Intrusion Tolerance architecture (DIT), integrity check is just one among the various building blocks used to detect corruption of remote data. [III]METHODOLOGY [1] RSA- algorithm: RSA is a cryptosystem, which is known as one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard AdlemanA user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem Cryptographic methods cannot be proven secure.[4] Instead, the only test is to see if someone can figure out how to decipher a message without having direct knowledge of the decryption key. The RSA method's security rests on the fact that it is extremely difficult to factor very large numbers. If 100 digit numbers are used for p and q, the resulting n will be approximately 200 digits. The fastest known factoring algorithm would take far too long for an attacker to ever break the code. Other methods for determining d without factoring n are equally as difficult. Any cryptographic technique which can resist a concerted attack is regarded as secure. At this point in time, the RSA algorithm is considered secure. [2] Key generation RSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. The keys for the RSA algorithm are generated the following way: 1) Choose two distinct prime numbers p and q. For security purposes, the integers p and q should be chosen at random, and should be of similar bitlength. Prime integers can be efficiently found using a primarily test. 2) Compute n = pq. n is used as the modulus for both the public and private keys. Its length, Integrated Intelligent Research (IIR) 1040

usually expressed in bits, is the key length. 3) Compute φ (n) = φ(p)φ(q) = (p 1)(q 1), where φ is Euler's totient function. 4)Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are co prime. e is released as the public key exponent. e having a short bit-length and small Hamming weight results in more efficient encryption most commonly 2 16 + 1 = 65,537. However, much smaller values of e (such as 3) have been shown to be less secure in some settings. [5] 5)Determine d as d e 1 (mod φ(n)); i.e., d is the multiplicative inverse of e (modulo φ(n)). This is more clearly stated as: solve for d given d e 1 (mod φ(n)) This is often computed using the extended Euclidean algorithm. Using the pseudocode in the Modular integers section, inputs a and n correspond to e and φ(n), respectively. d is kept as the private key exponent. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculate d. The standards define three keying options: Keying option 1: All three keys are independent. Keying option 2: K 1 and K 2 are independent, and K 3 = K 1. Keying option 3: All three keys are identical, i.e. K 1 = K 2 = K 3 [3] Triple DES In cryptography, Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) symmetrickey block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.the original DES cipher's key size of 56 bits was generally sufficient when that algorithm was designed, but the availability of increasing computational power made brute-force attacks feasible. Triple DES provides a relatively simple method of increasing the key size of DES to protect against such attacks, without the need to design a completely new block cipher algorithm. DES (the Data Encryption Standard) is a symmetric block cipher developed by IBM. The algorithm uses a 56-bit key to encipher/decipher a 64-bit block of data. The key is always presented as a 64-bit block, every 8th bit of which is ignored. However, it is usual to set each 8th bit so that each group of 8 bits has an odd number of bits set to 1. [IV] DISCUSSION OF RESULT [A]ORIGINAL DATA [B]SINGLE ENCRYPTED AND DECRYPTED DATA [C]DOUBLE ENCRYPTED AND DECRYPTED DATA Integrated Intelligent Research (IIR) 1041

CLOUD SPACE SHARING: In this module, we let the users to share their data with other trusted users. Users can give the access rights to other users so that the users who are not the real data owners can also view the file with the authorization rights provided by real data owners. Users also let the TPA to know about this authorization. Thus the data space is being shared with other users such that the cloud space is used effectively. One or more users can view the data with the full authentication. [V]CONCLUSION AND FUTURE ENHANCEMENT In this paper, we propose a privacy-preserving public auditing system for data storage security in cloud computing. We utilize the homomorphic linear authenticator and random masking to guarantee that the TPA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users fear of their outsourced data leakage. Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we further extend our privacy-preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. Extensive analysis shows that our schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of our design on both the cloud and the auditor side. We leave the full-fledged implementation of the mechanism on commercial public cloud as an important future extension, which is expected to robustly cope with very large scale data and thus encourage users to adopt cloud storage services more confidently. FUTURE ENHANCEMENT Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we further extend our privacy-preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. Extensive analysis shows that our schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of our design on both the cloud and the auditor side. We leave the full-fledged implementation of the mechanism on commercial public cloud as an important future extension, which is expected to robustly cope with very large scale data and thus encourage users to adopt cloud storage services more confidently. [VI]REFERANCES [1] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proc. IEEE INFOCOM 10, Mar. 2010. [2]. C. Wang, K. Ren, W. Lou, and J. Li, Towards Publicly Auditable Secure Cloud Data Storage Services, IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, july/aug. 2010. [3] F. Sebe, J. Domingo-Ferrer, A. Martı nez- Balleste, Y. Deswarte, and J.-J. Quisquater, Efficient Remote Data Possession Checking in Critical Information Infrastructures, IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008. [4]A. Juels and B. S. K. Jr., Pors: proofs of irretrievability for large files, in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, [5] J. Kincaid, MediaMax/TheLinkup Closes Its Doors./, July 2008. [6] Amazon.com, Amazon s3 Availability Event: July 20, 2008, Integrated Intelligent Research (IIR) 1042

http://status.aws.amazon.com/s320080720.htm l, July 2008. [7] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011. [8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), pp. 598-609, 2007. Integrated Intelligent Research (IIR) 1043