Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant Professor(2) bhagyashrialhat@gmail.com, amar.buchade@gmail.com A B S T R A C T Using Cloud storage, user can upload the data without the burden of software and hardware management. To achieve security in data storage, data is stored in a distributed manner at different servers. While storing a data file onto cloud with unique identification it is divided into blocks each kept at different servers for which tokens are generated. These tokens are used in error detection and recovery mechanism. We implemented this system with token generation and replaced token by hash value and the comparative study was done which says Secured Hash Algorithm (SHA1) is better to achieve more security. Analysis shows that proposed system is more efficient against database attacks and server crash events. Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations I. INTRODUCTION Users can remotely store their data in cloud storage without having physical possession of the outsourced data. This encounters security risks in integrity and availability of the data. In distributed storage, data is divided into blocks and these blocks are kept at different servers. While storing these blocks they are assigned with some token to achieve security. In this paper, we propose a system which replaces these tokens with hash values. Analysis shows that it is more efficient than token generation. The system supports dynamic operations on outsourced data such as block modification and deletion. Cloud storage provides high quality applications and services due to improvement in network bandwidth and reliable and flexible network connections. It is more convenient for users to store data remotely since they need not to take care of hardware. Though, various cloud service providers provide more reliable and powerful cloud infrastructure, it also introduces the internal and external threats as users no longer have physical possession of outsourced data. Also it may happen, to increase the profit, the cloud service provider may hide data loss incidents or they may delete the rarely accessed data. To handle such type of threats and to provide secure and reliable cloud service, researchers have provided number of systems [2]-[8] with which one can assure the data integrity and dependability. But these systems consider only static data but when data is going to be changed with insertion and deletion operations, these systems will not work, hence to address this problem; the research work [27] was carried out with dynamic data consideration. We implemented this system [27] with extension of data recovery mechanism by using token generation algorithm and by replacing token generation algorithm with Secured Hash Algorithm(SHA), with which the whole data can be easily recovered when any server get crashed or failed and also in database hack events. II. LITERATURE SURVEY To remotely store any data at cloud, the cloud service provider should give assurance about data integrity, data security and dependability [25]-[26] as user is not having physical possession of the outsourced data. Recent research works address this issue of security by providing some enhanced 14 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
technique to be used for data security and integrity [4]-[20]. These techniques ensure the data security and integrity but all these are focusing on single server storage. And as we talk about cloud storage it is distributed storage with multiple servers [29]-[30]. Also, these systems work with static data or archival data [28]. Hence, their ability to handle dynamic or changing data is unclear. So, these systems are not fully applicable to cloud storage applications. To address these issues a new enhanced system was introduced in [27] which is capable to handle dynamic data, that means after storing data at cloud servers, users can append, delete or update that outsourced data which deals with dynamic block operations [31]. Also, Public auditability and private auditability solve the data integrity problem [21]-[22]. Private auditability provides greater efficiency while public verifiability allows any one, not just the client to challenge the cloud server for correctness of the data storage while keeping no private information. In public auditability [28], the client delivers the generated public key to the third party auditor (TPA). The TPA monitors the stored file in the remote server and informs the client about the stored file security [1]. Using this method the server computation time is much reduced and can be applied to variable size file blocks. Though it is providing more security it handles only static or archival data. When user wants to update or modify the outsourced data, these systems remains unclear to handle dynamic data. Since users no longer having physical possession of data, it prohibits the direct adoption of traditional cryptographic primitives for data integrity protection [1][24]. Hence, verification of cloud storage correctness should be done without knowledge of whole data files [12]-[14]. Hence this dynamic feature should be adapted by the cloud storage correctness assurance which makes the system design more difficult. Also the deployment of cloud computing is powered by data centers running in distributed manner. It is more advantageous for individual user to store data redundantly across multiple servers as it reduces data integrity and availability threats. With the proposed system using Secured Hash Generation we can achieve data integrity and availability. When data corruption is detected while storage correctness verification, the system guarantees the localization of data errors i.e. identification of misbehaving servers. We also provide support of third party auditing where user can safely assign integrity checking task to third party auditor. Our scheme ensures remote data integrity and supports secure and efficient dynamic operations on data blocks such as update delete and append. Security analysis shows that the system is highly efficient against database attack and server crash events as compared to token generation. III. IMPLEMENTATION DETAILS Implementation includes the three different network entities as follows, 1. User, who has data to be stored in the cloud and relies on the cloud for data storage and computation, can be either enterprise or individual customers. 2. Cloud service provider (CSP), to provide data storage service and has significant storage space and computation resources. 3. Third Party Auditor (TPA), an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running in a simultaneous, cooperated and distributed manner. Data redundancy can be handled with technique of erasure correcting code to tolerate server crash events. For application purposes, the user interacts with the cloud servers via CSP to access or retrieve his data. In some cases, the user may need to perform block level operations on his data. The most general forms of these operations we are considering are block update, delete, insert and append. Hence, we put more focus on the support of file oriented cloud applications other than non-file application data. As users no longer possess their data, it is important to 15 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
ensure users that their data are being correctly stored and maintained. Also, users should be assured with security of their stored data even without backup of data. In case those users do not necessarily have the time, feasibility or resources to monitor their data online, they can hand over the data auditing tasks to an optional trusted TPA of their own choice. However, to securely introduce such a TPA, any possible leakage of user s outsourced data towards TPA through the auditing protocol should be prohibited. In our model, we assume that the point-to-point communication channels between each cloud server and the user is authenticated and reliable. Figure 1 shows the class diagram of the proposed system. Figure 1. Class diagram showing file upload mechanism User sought to upload the data to cloud, sends the file to CSP which will be assigned with unique identification. CSP then divide the uploaded file into three blocks. Then each data block is converted into hash digest and kept each at different server. Remaining of the implementation will be same as described in [31]. The Algorithm for the proposed system is as follows, Algorithm: File upload with ComputeHash() 1. Pad the data to be uploaded with zeroes until the final block has 448 bits. 2. Append the size of original data as an unsigned 64-bit integer. 3. Initialize the five hash blocks (h 0,h 1,h 2, h 3,h 4) to the specific constants defined in the SHA1 standard. 16 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
4. Calculate hash for each 512-bit block. 5. Allocate an array of 80 words. 6. Form the first 16 words to 512-bit block 7. Generate the rest of words as, word[i-3] XOR word[i-8] XOR word [i-14] XOR word [i-16] and rotate 1-bit to the left. 8. for( i=0;i<80;i++) { Calculate SHA function() and the constant k based on the current round number. e=d d=c c=b b=a a=a(rotated left 5) + SHA Function() + e + k +word[i] } 9. Add a, b, c, d and e to get the hash output. Output will be the concatenation of h 0,h 1,h 2, h 3,h 4,which will be the data converted into another form i.e. corresponding hash value. IV. RESULTS AND ANALYSIS The system was initially implemented with token generation i.e. data blocks are uploaded to cloud by computing token and assigning that token to each data block which will help to recover data in case of server crash and database hack events. The enhancement was made by applying Secured Hash Algorithm replacing token generation algorithm. The following data set is obtained by applying both these algorithms. Table 1. Data set obtained with Token Generation and Hash generation File Size in KB File Uploading Time using Token Generation File Uploading Time using Hash Generation 200 0.7644 0.5621 300 0.8052 0.6042 400 0.9801 0.7608 500 1.0004 0.8471 600 1.5461 0.9821 Figure 2 and 3 show the graphs of comparison of Token Generation and Secured Hash Algorithm SHA1. It implies that SHA1 takes lesser time than token generation. 17 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
Figure 2. Uploading Time comparison between Token Generation and SHA-1 Figure 3. Auditing Time comparison between Token Generation and SHA-1 V. CONCLUSION AND FUTURE SCOPE With the proposed system it became possible to recover the data in less time as compared to token generation. The system is highly efficient against server crash and database hack events. We implemented this system as an extension to the distributed storage system for secure and dependable cloud storage in which dynamic data is considered which is more efficient than the previous existing systems which were designed by considering static data only. Though the system is implemented with dynamic data support the cloud data is not expected to be rapidly changing like social networking data. In future the system can be enhanced with non file data and rapidly changing data also. Also, the newer versions of SHA i.e. SHA2, SHA3 can be applied to enhance the system. VI. REFERENCES [1] Cong Wang, Sherman S.M.Chow, Q. Wang, K. Ren, and W. Lou Privacy-Preserving Public Auditing for Secure Cloud Storage, in Proc. of IWQoS 2013,February 2013 18 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
[2] C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing, in Proc. of IWQoS 09, July 2009, pp.1 9. [3] Sun Microsystems, Inc., Building customer trust in cloud computingwith transparent security, Online at https://www.sun.com/offers/details/sun transparency.xml, November 2009. [4] A. Juels and J. Burton S. Kaliski, Pors: Proofs of retrievability for large files, in Proc. of CCS 07, Alexandria, VA, October 2007, pp.584 597. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, Provable data possession at untrusted stores, in Proc. of CCS 07, Alexandria, VA, October 2007, pp. 598 609. [6] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest, in Proc. of HotOS 07.Berkeley, CA, USA: USENIX Association, 2007, pp.1 6. [7] M. A. Shah, R. Swaminathan, and M. Baker, Privacy-preservingaudit and extraction of digital contents, Cryptology eprint Archive, Report 2008/186, 2008, http://eprint.iacr.org/. [8] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proc. of SecureComm 08,2008, pp. 1 10. [9] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proc. of ESORICS 09, volume 5789 of LNCS. Springer- Verlag, Sep. 2009, pp. 355 370. [10] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proc. of CCS 09, 2009, pp. 213 222. [11] H. Shacham and B. Waters, Compact proofs of retrievability, in Proc. of Asiacrypt 08, volume 5350 of LNCS, 2008, pp. 90 107. [12] K. D. Bowers, A. Juels, and A. Oprea, Proofs of retrievability:theory and implementation, in Proc. of ACM workshop on Cloud Computing security (CCSW 09), 2009, pp. 43 54. [13] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, Mr-pdp: Multiple-replica provable data possession, in Proc. of ICDCS 08.IEEE Computer Society, 2008, pp. 411 420. [14] K. D. Bowers, A. Juels, and A. Oprea, Hail: A high-availability and integrity layer for cloud storage, in Proc. of CCS 09, 2009, pp. 187 198 [15] T. Schwarz and E. L. Miller, Store, forget, and check: Using algebraic signatures to check remotely administered storage, in Proc. of ICDCS 06, 2006, pp. 12 12. [16] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, A cooperative internet backup scheme, in Proc. of the 2003 USENIX Annual Technical Conference (General Track), 2003, pp. 29 41. [17] M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transaction on Computer Systems, vol. 20, no. 4, pp. 398 461, 2002. [18] J. Hendricks, G. Ganger, and M. Reiter, Verifying distributed erasure-coded data, in Proc. of 26th ACM Symposium on Principles of Distributed Computing, 2007, pp. 139 146. 19 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org
[19] J. S. Plank and Y. Ding, Note: Correction to the 1997 tutorial on reed-solomon coding, University of Tennessee, Tech. Rep. CS-03 504, April 2003. [20] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public auditing for storage security in cloud computing, in Proc.of IEEE INFOCOM 10, San Diego, CA, USA, March 2010. [21] C. Wang, K. Ren, W. Lou, and J. Li, Towards publicly auditable secure cloud data storage services, IEEE Network Magazine, vol. 24, no. 4, pp. 19 24, 2010. [22] Q. Wang, K. Ren, W. Lou, and Y. Zhang, Dependable and secure sensor data storage with dynamic integrity assurance, in Proc. Of IEEE INFOCOM 09, Rio de Janeiro, Brazil, April 09. [23] J. S. Plank, S. Simmerman, and C. D. Schuman, Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2, University of Tennessee, Tech. Rep. CS-08-627, August 2008. [24] M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, in Proc. Of CRYPTO 94, volume 839 of LNCS. Springer-Verlag, 1994, pp. 216 233. [25] D. L. G. Filho and P. S. L. M. Barreto, Demonstrating data possession and uncheatable data transfer, Cryptology eprint Archive, Report 2006/150, 2006, http://eprint.iacr.org/. [26] Yang Tang, PatrikP.C.Lee, John C.S.Lui, Radia Perlman, Secure Overlay Cloud Storage with Access Control And Assured Deletion,IEEE Transactions on dependable and Secure computing,vol 9, No.6, November/December 2012 [27] C. Wang, Q. Wang, K. Ren, Ning Cao and W. Lou, Towards secure and dependable storage services in cloud computing, in Proc.of IEEE IWQoS 09, published in IEEE transactions in March 2012. [28] M.Venkatesh, M.R.Sumalatha, Mr.C.Selva Kumar, Improving Public Auditability, Data Possession indata Storage Security for Cloud Computing, in Proc.of IEEE ICRTIT-2012, ISBN: 978-1-4673-1601-9/12/$31.00 2012 IEEE [29] Michael Miller, Cloud computing- Web based Applications That change the way you work and collaborate online, Pearson Education, ISBN: 978-81-317-2533-7 [30] Barrie Sosinsky, Cloud Computing Bible, Wiley India Edition, ISBN : 978-81-265-2980-3 [31] Alhat Bhagyashree, Amar Buchade, Secure Cloud Storage with Efficient Data Recovery Mechanism, published in International J. of Multidispl.Research & Advcs. in Engg.(IJMRAE), ISSN 0975-7074, Vol. 7, No. I (January 2015), pp. 105-116 20 2015, IJAFRSE All Rights`` Reserved www.ijafrse.org