Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability

Similar documents
How To Ensure Correctness Of Data In The Cloud

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

ADVANCE SECURITY TO CLOUD DATA STORAGE

Privacy preserving technique to secure cloud

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Ensuring Data Storage Security in Cloud Computing

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Cloud Server Storage Security Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Improving data integrity on cloud storage services

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Near Sheltered and Loyal storage Space Navigating in Cloud

Survey Paper on Integrity Auditing of Storage

Secure Way of Storing Data in Cloud Using Third Party Auditor

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

How To Design A Cloud Data Storage Service For A Cloud Computer System

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

How To Ensure Correctness Of Data In The Cloud

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Distributing, Ensuring and Recovery of Data Stored in Cloud

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Cryptographic Data Security over Cloud

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

A Secure and Dependable Cloud Storage Service in Cloud Computing

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

Data Storage Security in Cloud Computing

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Data Security in Cloud Using Elliptic Curve Crytography

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Enabling Public Auditing for Secured Data Storage in Cloud Computing

International Journal of Advanced Research in Computer Science and Software Engineering

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A survey on cost effective multi-cloud storage in cloud computing

Secure Privacy Preserving Public Auditing for Cloud storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Security in Data Storage and Transmission in Cloud Computing

Secure Distribution of File on Cloud

An Efficient Data Correctness Approach over Cloud Architectures

International Journal of Advanced Research in Computer Science and Software Engineering

Verifying Correctness of Trusted data in Clouds

Remote Data Integrity Checking in Cloud Computing

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

A Survey on Data Integrity of Cloud Storage in Cloud Computing

Data Integrity by Aes Algorithm ISSN

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Public Auditability and Privacy preserving in Cloud Storage

Cloud Data Storage Services Considering Public Audit for Security

Research Paper on Data Integrity Checking In Cloud Computing

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Analysis of Secure Cloud Data Sharing Within a Group

CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Data Integrity and Dynamic Storage Way in Cloud Computing

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Surveying Cloud Storage Correctness using TPA with BLS

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Trusted Public Auditing Process for Secure Cloud Storage

Data Grid Privacy and Secure Storage Service in Cloud Computing

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Transcription:

IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability Sivasankaran. S Senior Assistant Professor Department of Computer Applications IFET College of Engineering, Villupuram P. Karthik PG Student Department of Computer Applications IFET College of Engineering, Villupuram Abstract This paper focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. In addition, the potential for migration from a single cloud to a multi-cloud environment is examined and research related to security issues. Data mirroring refers to the realtime operation of copying data, as an exact copy, from one location to a local or remote storage medium. In computing, a mirror is an exact copy of a dataset. Most commonly, data mirroring is used when multiple exact copies of data are required in multiple locations. Similarly, a live mirror is an exact copy of a dataset when it is immediately changed as the original is change. Provide the solution of data security in cloud data storage, which is essentially a distributed storage system. To achieve the assurances of cloud data integrity and availability and enforce the quality of dependable cloud storage service for users, we propose an effective and flexible distributed scheme. Since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. Keywords: Maximum availability, Data storage, Dynamics, Auditability, Trusted party I. INTRODUCTION Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Flexible distributed storage verification scheme with explicit dynamic data support to ensure the correctness and availability of users data in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability against Byzantine servers, where a storage server may fail in arbitrary ways. This construction drastically reduces the communication and storage overhead as compared to the traditional replication-based file distribution Techniques. Although envisioned as a promising service platform for the Internet, this new data storage paradigm in Cloud brings about many challenging design issues which have profound influence on the security and performance of the overall system. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centers. II. OBJECTIVE The scope of the project is to data security in cloud data storage, which is essentially a distributed storage system. To achieve the assurances of cloud data integrity and availability and enforce the quality of dependable cloud storage service for users, We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model. Maximizing the availability of databases Monitoring systems that seek to provide services in cloud environment must be prepared to deal gracefully with huge data collection without compromising system performance. We believe data security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. III. PROBLEM STATEMENT Privacy data will be stolen by network. There are two possible attacks in existing system. Cloud computing System easily undergoes against Byzantine failure, malicious data modification attack, and even server colluding attacks Dependency is one of the major drawback of Cloud computing. Cloud providers should address privacy and security issues as a matter of high and urgent priority. Privacy data will be lost or stolen by anonymous server Dealing with single cloud providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious All rights reserved by www.ijste.org 36

insiders in the single cloud. No or little insight in CSP contingency procedures. There is no proper mechanism was implemented to audit the data that are stored in cloud servers and so security is also very low. Due to the poor data auditing mechanism in existing system, customer of the company also is reduced in commercial area of business. IV. PROPOSED SOLUTION The proposed system supports both data dynamics and public auditing.multi-cloud strategy is the concomitant use of two or more cloud services to minimize the risk of widespread data loss or downtime due to a localized component failure in a cloud computing environment. Such failures can occur in hardware, software. A multi-cloud strategy can also improve overall enterprise performance. TPA audits the files as requested by data owner through a new mechanism called AES algorithm and so very high security also provided. And also, in proposed system, TPA can perform multiple auditing tasks simultaneously. In real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location. A. Ensuring Data Security Analysis: To achieve the assurances of cloud data integrity and availability and enforce the quality of dependable cloud storage service for users, we propose an effective and flexible distributed scheme with explicit dynamic data support, including update, delete, and insert. One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. Moreover, for efficiency consideration, the outsourced data themselves should not be required by the verifier for the verification purpose. B. Dynamic Auditing With Third Party: To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the data stored in the cloud., the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently with AES Encryption Algorithm. This shows the proposed scheme is highly efficient and data modification attack, and even server colluding attacks. Here Work is focuses on AES Encryption Algorithm for stored data in cloud. Resulted encrypted method is secure and easy to use. If both values are same means then it sends message to data owner that the data is in correct, consistent manner.if both values are different means then it sends message to data owner that the some data are lost from the original information. C. Maximum Availability Setup: Even though have never experienced a single outage, it is not an unreasonable request to ask for enhanced protection. A great analogy can be made to installing a security system in your protection brings a greater peace of mind. Our new cloud mirroring functionality does just that by copying our customer s entire data set to a secondary cloud provider they are brought to the highest level in data protection. At this point, a given file resides in minimum of 2 data centers spread out across multiple geographic regions. Think for a moment about how much it would cost to recreate that level of protection with traditional storage. The principal and mirror servers must be separate instances. Fast failover with minimal data loss the mirror database can reside either in the same data center to provide a high-availability solution, or in a remote data center to provide a disasterrecovery solution. Flexible distributed storage integrity auditing mechanism instance continuously sends a database's transaction log records to a copy of the database on another standby Server instance. Provide the solution of data security in cloud data storage, which is essentially a distributed storage system. The originating database and server have the role of principal, for storing and retrieve a data from server. The content of outsourced data can be verified by either client or TPA. This is done by challenging server by giving some file and block randomly. D. Multiple Data Centre Topology: Extending on the two data center topology in the multiple data center topology add a concept of Peer-to-Peer transactional merge replication is used to keep the databases in each site in sync and then using database mirroring for availability in each datacenter. It is worth noting advertising the same network in both datacenters is not load balancing and you should be prepared in this design for all traffic to be routed to one datacenter. In fact by removing an advertisement to a datacenter you can maintenance the entire datacenter. All rights reserved by www.ijste.org 37

V. SECURE CLOUD ARCHITECTURE MODEL Fig. 1: Cloud Computing Database Mirroring Architecture VI. DATA INTEGRITY VERIFICATION Data Integrity Validation allows you to verify the integrity of the data secured by the data protection operations. Data Integrity Validation can be employed to verify the integrity of the data stored in the cloud storage, as well as the data transferred over the network. The data integrity verification is done by third party auditor. The TPA challenges server for block level data verification at regular intervals by sending file name and block randomly. On challenge, the root hash code is computed by server. Backup operations can be retried and handled as configured Data Integrity Validation generated at the respective clients before the data transfer will be verified with the Data Integrity Validation generated at the Media Agent after the data transfer is complete, and vice versa. This option can be enabled during backup operations, principal and mirror server both. Operational follow structure will be given below table. Table -1: Data integrity verification VII. WORKING OF AES AES algorithm, also called Advanced Encryption Standard or the Rijndael algorithms comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. (Rijndael was designed to handle additional block sizes and key lengths, but the functionality was not All rights reserved by www.ijste.org 38

adopted in AES.) Symmetric or secret-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must know and use the same secret key. All key lengths are deemed sufficient to protect classified information up to the "Secret" level with "Top Secret" information requiring either 192- or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys -- a round consists of several processing steps that include substitution, transposition and mixing of the input plaintext and transform it into the final output of cipher text. Even with a single bit difference between two passwords ( a and b ), the key is entirely different. In this implementation, the initial block holds the nonce in the first 8 bytes, and the block count in the second 8 bytes. Since JavaScript can represent integers up to 253, this allows a message size up to 257 (c. 1017) bytes. a (U+0061): pwbytes = 61 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 84 dd 49 14 7b 5d 05 7a e3 f8 81 b9 0e e7 dd b (U+0062): pwbytes = 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 1a 83 4f da 4b aa 41 76 62 be d6 2c 66 83 6d (U+263a): pwbytes = e2 98 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 d1 0c cd fd 44 45 54 ef 59 aa f8 dc 78 8e 9a 7c The simplest mode of operation ( electronic codebook ) encrypts a text block-by-block but since the same block of plaintext will always generate the same block of cipher text, this can leave too many clues for attackers. Rijndael algorithm is based on arithmetic on a finite field, or Galois field (after the mathematician). Regular arithmetic works on an infinite range of numbers keep doubling a number and it will get ever bigger. Arithmetic in a finite field is limited to numbers within that field. The Rijndael algorithm works in GF(28), in which arithmetic results can always be stored within one byte which is pretty convenient for computers. I can t begin to understand the maths (considering that addition and subtraction are the same thing an XOR operation and multiplication is performed modulo an irreducible polynomial : doubling 0x80 in GF(28) gives 0x1b). Implementation would be invoked as follows: var password = 'L0ck it up saf3'; var plaintext = 'pssst... đon t tell anyøne!'; var ciphertext = Aes.Ctr.encrypt(plaintext, password, 256); var origtext = Aes.Ctr.decrypt(ciphertext, password, 256); The key in this script is obtained by applying the Cipher routine to encrypt the first 16/24/32 characters of the password (for 128-/192-/256-bit keys) to make the key. This is a convenient way to obtain a secure key within an entirely self-contained script (in a production environment, as opposed to this essentially tutorial code, the key might be generated as a hash, e.g. simply Sha256 (password)). In more detail, the supplied password is converted to UTF-8 (to be byte-safe), then the first 16/24/32 characters are converted to bytes. The resulting pwbytes is used as a seed for the Aes.keyExpansion () which is then used as the key to encrypt pwbytes with Aes.cipher(). Examples of keys generated in this way from (unrealistically) simple passwords. VIII. CONCLUSION In this paper, we explored the problem of providing simultaneous public verifiability and data dynamics for remote data integrity check in Cloud Computing auditing mechanism instance continuously sends a database's transaction log records to a copy of the database on another standby Server instance major concern is how to construct verification protocols that can accommodate dynamic data files is critical to enable a third party auditor (TPA) to evaluate the service quality from an objective and independent perspective. Public verifiability also allows clients to delegate the integrity verification tasks to TPA while they themselves can be unreliable or not be able to commit necessary computation resources performing continuous verifications. Through detailed security and performance analysis, we show that our scheme is highly efficient and resilient to Byzantine failure, malicious data modification attack, and even server colluding attacks. Maximizing the availability of databases Monitoring systems that seek to provide services in cloud environment must be prepared to deal gracefully with huge data collection without compromising system performance. Along with our research on dynamic cloud data storage, we also plan to consider data execution integrity, with which we can ensure the cloud servers have indeed performed the data operation as requested by the user. REFERENCES [1] Q. Wang, Student Member, IEEE, Cong Wang, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing Student Member, IEEE, Kui Ren, Member, IEEE, Wenjing Lou, Senior Member, IEEE, and Jin Li [2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proc. of ESORICS 09. Saint Malo, France: Springer-Verlag, pp. 355 370. [3] Miss. Nupoor M. Yawale Prof. V. B. Gadichha Third Party Auditing (TPA) for Data Storage Security in Cloud with RC5 Algorithm IJARCSSE Vol 3, Issue 11, November 2013 [4] Qian Wang1, Cong Wang1, Jin Li1, Kui Ren1, and Wenjing Lou2 Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing Illinois Institute of Technology, Chicago IL 60616, USA. All rights reserved by www.ijste.org 39

[5] Cong Wang, Sherman S.M.Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy Preserving Public Auditing for Secure Cloud Storage, IEEE, Vol.62, No. 2,February 2013. [6] Prof.R.Dheenadayalu, M.Sowparnika, Improving Data Integrity on Cloud Storage Services, IJESI, Vol.2,Issue 2, February 2013. [7] Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li Enabling Public Auditability And Data Dynamics For Storage Security in Cloud Computing in IEEE transactions on parallel and distributed systems, 2011, vol. 22, no. 5. [8] Yashaswi Singh, Farah Kandah, Weiyi Zhang A Secured Cost-effective Multi-Cloud Storage in Cloud Computing, IEEE International Conference on Computer Communication, 2011. [9] Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, Digital Object Identifier 10.1109/TPDS.2012.278 1045-9219/12/$31.00 2012 IEEE. [10] S. Sivachitralakshmi,T. Judgi, A Flexible Distributed Storage Integrity AuditingMechanism in Cloud Computing, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012. All rights reserved by www.ijste.org 40