AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING



Similar documents
Erasure correcting to enhance data security in cloud data storage

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

February. ISSN:

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Secure Way of Storing Data in Cloud Using Third Party Auditor

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Secure Distribution of File on Cloud

How To Ensure Correctness Of Data In The Cloud

Data storage security in Cloud

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Data Storage Security in Cloud Computing

Data Security And Integrity Of Cloud Storage In Cloud Computing

Near Sheltered and Loyal storage Space Navigating in Cloud

Improving data integrity on cloud storage services

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Ensuring Data Integrity in Cloud Computing

How To Secure Cloud Data Storage

Dependable and Secure Storage Services in Cloud Computing

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing

How To Design A Cloud Data Storage Service For A Cloud Computer System

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

How To Ensure Data Storage Security In Cloud Computing

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Distributing, Ensuring and Recovery of Data Stored in Cloud

Ensuring Data Storage Security in Cloud Computing

Verifying Correctness of Trusted data in Clouds

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Analysis of Secure Cloud Data Sharing Within a Group

Ensuring Data Storage Security in Cloud Computing

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

ADVANCE SECURITY TO CLOUD DATA STORAGE

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Trusted Public Auditing Process for Secure Cloud Storage

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Keywords: Cloud Computing, Third Party Auditor, Integrity.

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Enable Public Audit ability for Secure Cloud Storage

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

An Efficient Data Correctness Approach over Cloud Architectures

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Ensure Correctness Of Data In The Cloud

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Identifying Data Integrity in the Cloud Storage

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Keywords Cloud Computing, Cloud computing Architecture, Intruder, Security Issues.

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

-

Transcription:

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept of CSE, VIF College of Engg & Tech, Moinabad, R.R Dist, A.P, India 2 Associate Professor, Dept of CSE, VIF College of Engg & Tech, Moinabad, R.R Dist, A.P, India 3 Assistant Professor, Dept of CSE, VIF College of Engg & Tech, Moinabad, R.R Dist, A.P, India ABSTRACT: For the past few years, the technology of cloud computing has the extreme growth sections in the field of infrastructure and permits the consumers to make usage of applications devoid of installation and by means of internet access the personal files. An effective and flexible scheme of distributed storage verification with precise dynamic data support to make sure the correctness and availability of users data within the cloud was introduced. The assimilation of storage appropriateness indemnity and data inaccuracy localization by making usage of the homomorphic token by means of disseminated confirmation of erasure-coded data is accomplished which predictably poses new safety risks towards the accuracy of the data in cloud. Keywords: Cloud computing, Distributed storage verification, Data accuracy, Homomorphic token. 1. INTRODUCTION: Cloud computing put up on established trends and offers a variety of services that can profit its customers, by means of providing quick access to their data, scalability, data storage, data recovery and guard against various hackers, and usage of the network and infrastructure conveniences. Even if the utilization of cloud computing has rapidly improved; the safety of cloud computing is still considered the most important issue in the environment of cloud 1935 P a g e

computing [4]. A cloud provider put forward numerous services that can possibly profit its customers, such as quick access to their data, scalability, pay-for-use, data storage, data recovery and defend against various hackers, on-demand protection controls, and usage of the network and infrastructure conveniences. Cloud service providers should make sure the protection of their customers data and should be accountable if any security risk affects their customers service infrastructure. The rising network bandwidth and dependable yet flexible network associations make it even likely that users can at the moment promise elevated superiority services from data in addition to software that exist exclusively on distant data centers [8]. Moving information into the cloud presents enormous convenience to users because they don t include caring concerning the complexities of direct hardware organization. In order to attain the assurance of integrity of cloud data and accessibility and enforce the excellence of cloud storage service, well-organized methods that facilitate on-demand data correctness confirmation on behalf of users of cloud have to be considered [1]. An effective and flexible scheme of distributed storage verification with precise dynamic data support to make sure the correctness and availability of users data within the cloud was introduced. To make available redundancies and assurance the data dependability against Byzantine servers, we rely on erasure correcting code within the preparation of file distribution preparation where a storage server may possibly not succeed in arbitrary ways [11]. This building drastically diminishes the communication and storage transparency as evaluated to the conventional techniques of replication-based file distribution. It is of serious importance to guarantee users that their information are being accurately accumulated and preserved as the users no longer hold their data nearby. The users have to be prepared by means of security means with the intention that they can build constant precision assertion of their stored information even devoid of the occurrence of local copies [3]. The storage accuracy insurance as well as data error localization is attained by the system by exploiting the homomorphic token by means of distributed confirmation of erasure-coded information that can approximately promise the instantaneous localization of data errors whenever data corruption has been renowned all the way through the storage accuracy confirmation [9]. The algebraic 1936 P a g e

property of our token working out and erasure-coded data is further searched in order to hit a good stability connecting error flexibility and data dynamics, and at the same time as maintaining the similar level of storage exactness assertion by representing how to economically hold up energetic function on data blocks. Fig1: An overview of Cloud storage service architecture 2. METHODOLOGY: A demonstrative structural design for cloud storage service consists of three different network objects as shown in fig1 such as user who an individual is having data to be deposited in the cloud and depend on the cloud for data storage and calculation [7]. It can be one or the other enterprise or individual customers. An object that is accomplished by cloud service provider to deliver data storage service and has important storing space and calculation resources is cloud server. A non-compulsory third party auditor who has expertise and competencies that users may not have is trustworthy to measure and interpretation of threat of services of cloud storage in support of the users upon demand [2]. It is reliable to measure and expose threat of services of cloud storage in support of the users upon demand. A user stores his data by means of a cloud service provider into a set of cloud servers in the storage of cloud data which runs in a synchronized, cooperated and dispersed method. The most common forms of these operations are block update, delete, insert and append. The identification of misbehaving server is achieved by fast data error localization as the auditing result in ensuring strong cloud storage precision assurance [12]. The assimilation of storage appropriateness indemnity and data inaccuracy localization by making usage of the homomorphic token by means of disseminated confirmation of erasure-coded data is accomplished which predictably poses new safety risks towards the accuracy of the data in cloud [5]. The erasurecorrecting code may possibly be used to put 1937 P a g e

up with numerous failures in the systems of distributed storage. To disperse the data file E within the cloud data storage, we depend on this method redundantly across a set of distributed servers of u = w + y. An (w, y) Reed-Solomon erasure-correcting code is applied to generate y vectors of redundancy parity from w data vectors in such a means that the original w data vectors can be rebuild from any w out of the information of w + y in addition to parity vectors. By means of placing w + y vectors on other server, the file of original data can continue to subsist the failure of any y of the w + y servers devoid of any information loss, by means of a space transparency of y/w. To attain assurance of data storage accuracy and data error localization at the same time, our system relies on the pre-computed verification tokens [10]. The preparation of file distribution of our scheme is more resourceful since an added code of layer of error-correcting have to be proficient on the entire data and parity vectors right after the encoding of file distribution. Subsequent to token generation, the user has the alternative of sustaining the pre-computed tokens locally. Error localization is an important requirement for eliminating errors within storage systems and it is important to distinguish potential threats from external attacks [6]. Once the unpredictability among the storage has been effectively detected, we can depend on the tokens of pre-computed verification to additionally find out where the potential data error lies in. In view of the fact that our layout of file matrix is organized, the user can rebuild the original file by means of downloading the data vectors from the initial servers, believing that they return the accurate response values. By means of choosing system parameters properly and conducting sufficient times of verification, the successful retrieval of file with high probability can be achieved. Whenever the data corruption is noticed, the assessment of pre-computed tokens in addition to values of received response can possibly assure the identification of misbehaving servers. 3. RESULTS: 1938 P a g e

Fig. 2: An overview of Performance comparison between different parameters. From the figure it can be revealed that the preparation of file distribution of our scheme is more resourceful since an added layer of code of error-correcting have to be proficient on the entire data and parity vectors right after the encoding of file distribution. The structure of two-layer coding makes the explanation more appropriate for static information only, since any modification to the contents of file has to broadcast all the way through the twolayer code of error-correcting, which involves both elevated communication and computation difficulty. Owever in our scheme, the file update merely have an effect on the specific rows of the matrix of encoded file striking a superior balance among both error resilience as well as data dynamics. 4. CONCLUSION: Cloud computing construct on established trends for motivating the cost out of the delivery of services while growing the speed and agility with which services are deployed. In order to attain the assurance of integrity of cloud data and accessibility and enforce the excellence of cloud storage service, well-organized methods that facilitate on-demand data correctness confirmation on behalf of users of cloud have to be considered. Error localization is an important requirement for eliminating errors within storage systems and it is important to distinguish potential threats from external attacks. The preparation of file distribution of our scheme is more resourceful since an added layer of code of error-correcting have to be proficient on the entire data and parity vectors right after the encoding of file distribution. By means of choosing system parameters properly and conducting sufficient times of verification, the successful retrieval of file with high probability can be achieved. REFERENCES: [1] M. Arrington, Gmail disaster: Reports of mass email deletions, Online at http://www.techcrunch.com/2006/12/28/gmaildisasterreports-of-mass-email-deletions/, December 2006. [2] J. Hendricks, G. Ganger, and M. Reiter, Verifying distributed erasure-coded data, in Proc. of 26th ACM Symposium on Principles of Distributed Computing, 2007, pp. 139 146. [3] M. A. Shah, R. Swaminathan, and M. Baker, Privacy-preserving audit and extraction of digital contents, Cryptology eprint Archive, Report 2008/186, 2008, http://eprint.iacr.org/. 1939 P a g e

[4] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, Mr-pdp: Multiple-replica provable data possession, in Proc. of ICDCS 08.IEEE Computer Society, 2008, pp. 411 420. [5] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preservingpublic auditing for storage security in cloud computing, in Proc.of IEEE INFOCOM 10, San Diego, CA, USA, March 2010. [6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, Provable data possession at untrusted stores, in Proc. of CCS 07, Alexandria, VA, October 2007, pp. 598 609. Verlag, Sep. 2009, pp. 355 370. [11] Q. Wang, K. Ren, W. Lou, and Y. Zhang, Dependable and securesensor data storage with dynamic integrity assurance, in Proc. of IEEE INFOCOM 09, Rio de Janeiro, Brazil, Appril 2009. [12] Y. Dodis, S. Vadhan, and D. Wichs, Proofs of retrievability viahardness amplification, in Proc. of the 6th Theory of CryptographyConference (TCC 09), San Francisco, CA, USA, March 2009. [7] J. S. Plank, S. Simmerman, and C. D. Schuman, Jerasure: Alibrary in C/C++ facilitating erasure coding for storage applications- Version 1.2, University of Tennessee, Tech. Rep. CS-08-627, August 2008. [8] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, andm. Isard, Acooperative internet backup scheme, in Proc. of the 2003 USENIX Annual Technical Conference (General Track), 2003, pp. 29 41. [9] B. Krebs, Payment Processor Breach May Be Largest Ever, Onlineat http://voices.washingtonpost.com/securityfix/2009/01 /payment processor breach may b.html, Jan. 2009. [10] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling publicverifiability and data dynamics for storage security in cloud computing, in Proc. of ESORICS 09, volume 5789 of LNCS. Springer- 1940 P a g e