Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry University, India. 3 Asst.Professor, Dept of EEE, RVS College of Engineering& Technology, Pondicherry University, India. Abstract- Today, there are more and more development for higher security process and benefit when using cloud computing services. Reducing cost, maintaining scale, and high availability are essential for the business to continuation for any techniques or technology.the discusses of the security and privacy data loss concerns are main aspects. This paper mainly focuses on the survey of privacy techniques that has been proposed for the data integrity like POR (Proof of Retrivability), Dynamic third Part Auditor (D-TPA), Cloud Economics etc in the cloud environment for the security. Keywords- Cloud Computing, Privacy, POR (Proof of Retrivability), and Data Security. I. INTRODUCTION Ramya Devi et.al [2] Cloud Computing is concerned with the sharing and coordinated use of diverse resources in distributed organizations cloud which is consisted of different organizes and systems. Cloud computing provides a facility that enable large-scale controlled sharing and interoperation among resources that are dispersedly owned and managed.security is consequently a major element in any cloud computing infrastructure,because it is necessary to ensure that only authorized access is permitted and secure behavior is accepted. All members in the cloud computing environment should be trusted by each other, and the members that have communication should be trusted by each other. Trust is the major concern of the consumer and provider of services that participate in a cloud computing environment. A. Service Modules of Cloud Computing Depending on the services provided by the cloud, it is divided into main three categories. B. Infrastructure as a Service (IaaS) J.Ruiter, M.Warnier et.al [5][6] IaaS is a service which provides an access to the hardware resources such as storage or computing hardware services. C. Software as a Service (SaaS) J.Ruiter, M.Warnier et.al [5][6] Saas provides a software services to the end user. Web based email and Google documents are best example of this service. End user gets access to this software service but he/she cannot modify this software utility.software is configured on cloud utility not installed on end user computer. D. Platform as a Service (PaaS) J.Ruiter et.al [5] This service provides a platform or an environment on which end user can develop his own application. User is transparent about the location of the platform whether it is hosted on cloud or (not).google App engine is an example of PaaS. SAAS PAAS IAAS HARDWARE Fig: 1 Cloud Architecture II. RELATED WORKS A. Proof Identify Process and Data Integrity A. Juels, J. Burton S et.al [7] The TPA first selects fewer bits of the entire file and preprocesses the data. This fewer bits constitute metadata. This meta data is encrypted and appended to the file and sent to the cloud. Then whenever the client needs to verify the data correctness and availability it challenges the cloud through TPA and the data it got is correct, then integrity is ensured. This scheme can be extended for data updation, deletion and insertion at the client side. This involves modification of fewer bits at the client side. There are two phases. One is Setup phase and the other is verification phase. Setup phase include generation of metadata and its encryption. Verification phase includes issuing a challenge to the third party auditor. 290
Deployment Models of Cloud Computing: Fig.2 Shows the types of cloud deployment models. There are describing in the following section. A. Public Cloud J.Ruiter, M.Warnier et.al [5] [6] In a public cloud the computing infrastructure is used by the organization or end user through clod service providers or venders. Public cloud are typically offered through virtualization and distributed among various physical machines.[5] [6] B. Private Clod In a private clod the computer infrastructure is dedicated to the particular organization and not shared with other organization. Private cloud are secure than public cloud. C. Hybrid Cloud J.Ruiter et.al [5] This is a Combination of the other two types of a cloud.in hybrid cloud organizations may host critical application on private clouds and applications which are having less security concerns hosted on public cloud.it is also known as cloud bursting.[5] D. Community Cloud It involves sharing of computing infrastructure in between organizations of the same community. As cloud is still at its ascent stage, privacy and security get more concern: Privacy is the fundamental right of the human being. Privacy of the user data and personal information can be provided by the cryptographic function and technology. As Cloud computing is the virtual environment in which the autonomous system are connected in a network and this will create the cloud.now this cloud will serve as a services basis, so user have to registered himself to the cloud server or to the third party which provide the cloud service. So the privacy of the data and security need to be considered. B. Cloud Economics Application Functional Transmission Fig: 3 Privacy- Peer layer Communication Virtual Scalable Efficient Flexible Fig: 2 Cloud Types III. PRIVACY A. Privacy Peer layer Communication Vijayaraghavan U et.al [1] Privacy and security are the burning issues of any technology, and environment is also not an exception. 291 i. Virtual: Fig: 4Cloud Economics Physical location and underlying infrastructure details transparent to user. ii. Scalable: Able to break complex workloads into pieces to be served across an incrementally expandable infrastructure. iii. Efficient: Services Oriented Architecture for dynamic provisioning of shared computer resources.
iv. Flexible: It can serve a variety of work load types both consumer and commercial. C. Cloud Economics & Management i. Reduced Cost: Fig: 5 Cloud Computing Reduced Cost Cloud Computing leverage virtualization, Standardization and automation to free up operational budget for new investment. ii. Optimized Business: 1. Cost Containment. 2. Cost Model is modified as a pay-as-you-go service. 3. Transfer of cost from capital to maintenance. 4. Reduction of operating costs. D. Flexibility: Faster set-up, easier transition, remote implementation, access to latest technology. E. Availability: I. Cloud designed from the bottom up for maximum network performance. II. Greater flexibility and availability of shared information enables collaboration from anywhere in the world on the internet. F. Resiliency: No single point of failure & failure one cloud node will have minimal or no impact. IV. EXPERIMENTAL MODEL PROCESS A. Benefits and Challenges There are many advantages of cloud like reduced cost, increase storage, flexibility, scalability, maintenance, reliability, mobile accessibility etc. Fig: 6 Cloud Computing- Optimized Business Cloud Computing allowing the optimized new investments for direct business benefits. D. Potential Benefits of applying Cloud Computing for IR Scalability: A. Unconstrained capacity allows for more agile enterprises that are scalable, flexible and responsive to charge. B. Agencies however need to be aware that when transitioning from legacy systems, data migration and change management can slow down the On demand adoption of cloud computing. C. Efficiency Reallocation of IT op activities offers opportunity to focus on R&D, new solution, prototyping, decouple application from IT. B. Challenges for Cloud Computing Security and privacy, lack of standards, continuously evolving, compliance concerns, data recovery and availability, management capabilities etc. Eg: Error Identify, Error Correction and Update File. C. Dynamic Third Party Auditor Process Public Cloud are owned and operated by the third parties: Superior Economies. Infrastructure Costs. Client an attractive low-cost. Security Protections. D. Service level Agreement SLA (Violations) Qos (Quality of Services) needed to be met for cloud computing environment.qos is determined in the form of SLA (Service Level Agreement), Which is determined either by minimum throughput or maximizes response time. This can differ from system to system for our studies, we consider SLA violation as shown in fig (7) 292
V. EXPERIMENTAL CHART 6 5 4 3 2 1 0 Series 1 Series 2 Series 3 Fig: 7 Service Level Agreement-SLA (Violations) E. Third Party Auditor-TPA Cong Wang et.al [4] suggests in order saving the time, computation resources, and even the related online burden of users, we also provide the extension of the proposed main scheme to support third-party auditing, where users can safely delegate the integrity checking tasks to thirdparty auditors (TPA) and are worry-free to use the cloud storage services. Fig: 9 Service level Agreement Process 15 10 Series 3 5 Series 2 0 Series 1 Fig: 10 Service level Agreement Propose Process SLA= (Error identify)- (Error Correction) Fig: 8 Error Recovery Cloud Computing Process. (Update File) 293
Acknowledgements I wish to express my warmest, sincerest thanks and deepest gratitude to my Research advisor, Prof.Dr.R.KANTHAVEL,M.E.,Ph.D., Department of Electronics and Communication Engineering, Velammal Engineering College, Chennai., for her impeccable guidance, numerous opportunities and valuable suggestion for my research work. I would like to thank Assit.Professor Dr.A.RAJARAM,M.E.,Ph.D., Department of Electronics and Communication Engineering, Karphagam College of Engineering, Coimbatore., for his valuable suggestions in my scientific endeavors. I would like to thank my Prof.Dr.V.Arumugham, M.Tech., Ph.D., Principal, RVS College of Engineering and Technology, Karaikal. VI. CONCLUSION AND FUTURE WORK Privacy and security are the burning issues of any technology. As cloud is mainly used for the storage of data, data integrity, error correction is the main issue of the client.after uploading data to the server; client will lost the control of the data. So at the time, data can be modified or updated or sometimes (Error File) deleted by the unauthorized access or server (Cloud).According that TPA techniques are very useful for the integrity checking.tpa supports fully dynamic operation so it is possible to verify data in case of modification or deletion.this techniques can be manipulated to reduce the security overhead of the client as well as to minimize the computational of the storage server. New techniques can be invented to minimize the size of the proof of data integrity as well as to reduce the network bandwidth consumption. REFERENCES [1] Vijayaraghavan U, Madonna Arieth, R and R.Anand Babu A Survey of the Research on Future an Error Identify and Error Correction International Journal of Advanced Information Science and Technology (IJAIST) Vol.12.No.12, ISSN: 2319-2682. [2] Ramya Devi M,Balamurugan P.S and Thanushkodi K The Trusted Computing exemplary with Astonishing security for cloud computing :IJCSNS,Vol.11.No.1 January 2011. [3] Riddhi.K.Pandy and Kamal K,Sutaria An Analysis of privacy Techniques for Data integrity in the cloud computing Vloume - 4 Number,ppt,169-174,ISSN 0975,4202(IJCEE)2012. [4] Cong Wang,Qian Wang,Kui REn,Ning Caw and Wenjing Toward Security and Dependable storage service in cloud computing IEEE (2012). [5] J.Ruiter and M.Warnier,Privacy regulation for cloud computing,compliance and implementation in theory and Pratice,article. [6] P.Metri and G.Sarote Privacy Issues and Challenges in cloud computing,international Journal of Advanced Engineering Science and Technology,5,Issue No.1,001-006. [7] A. Juels and J. Burton S. Kaliski, PORs: Proofs of Retrievability for Large Files, Proc. of CCS 07, pp. 584 597,2007. 294 AUTHOR S PROFILE Mr.U.Vijayaraghavan received the B.Tech degree in information &Technology from the Lord Venkateshwarra Engineering College, Kanchipuram (Anna University Chennai), Tamil nadu, South India. He earned M.E (Computer Science &Engineering) in Academic Campus Anna University, Coimbatore, India. He is a member of IAENG. He delivered his papers in three national conferences and in one international conference. He delivered his paper in IJAIST. He was worked as Lecturer in Dept of Information Technology, Lord Venkateshwaraa Engineering College Kanchipuram. Currently he is working as an Assistant Professor in the Department of Computer Science and Engineering, RVS College of Engineering & Technology, karaikal, Puducherry, India. His Research area of interest is Cloud Computing, Grid Computing and Optical Networks. Mrs.R.Madonna Arieth received the M.Sc degree in Information & Technology from Bhrathidasan University,.She earned M.Tech (Computer Science & Engineering) in Prist University, Thanjavur, India. She is working as Asst.Professor in RVS College of Engineering &Technology, Karaikal, Puducherry, India. Her area of research area of interest Cloud Computing and Computer networks. She delivered her papers in four national conferences. She delivered her paper in IJAIST. K. Geethanjali received M.Sc. Electronics Science from Bhrathidasan University. She Obtained M.Tech (Appiled Electronics) degree in Prist University, Thanjavur, India. She is working as a Asst.Professor in RVS College of Engineering &Technology, Karaikal, Puducherry, India.