Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage



Similar documents
Improving data integrity on cloud storage services

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Trusted Public Auditing Process for Secure Cloud Storage

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Near Sheltered and Loyal storage Space Navigating in Cloud

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

Enabling Public Auditing for Secured Data Storage in Cloud Computing

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Cloud Server Storage Security Using TPA

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

ADVANCE SECURITY TO CLOUD DATA STORAGE

Surveying Cloud Storage Correctness using TPA with BLS

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Secure Privacy Preserving Public Auditing for Cloud storage

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Data management using Virtualization in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Privacy preserving technique to secure cloud

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

I. Introduction. A. Related Work

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Data Grid Privacy and Secure Storage Service in Cloud Computing

A Survey on Secure Auditing and Deduplicating Data in Cloud

Replicated Data Integrity Verification in Cloud

Secure Way of Storing Data in Cloud Using Third Party Auditor

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

International Journal of Advance Research in Computer Science and Management Studies

Efficient Cloud Computing with Secure Data Storage using AES

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

How To Ensure Data Integrity In Cloud Computing

Cloud Data Storage Services Considering Public Audit for Security

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

How To Ensure Correctness Of Data In The Cloud

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Verifying Correctness of Trusted data in Clouds

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model:

Privacy Preservation and Secure Data Sharing in Cloud Storage

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Transcription:

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35, Tamilnadu, India 1 Assistant Professor, Department of CSE, SNS College of technology, Coimbatore-35, Tamilnadu, India 2 Dean, Department of CSE, SNS College of technology, Coimbatore-35, Tamilnadu, India 3 ABSTRACT: In cloud computing, information homeowners host their information on cloud servers and users (data consumers) will access the information from cloud servers. As a result of the information outsourcing, however, this new paradigm of knowledge hosting service additionally introduces new security challenges, which requires associate freelance auditing service to ascertain the information integrity within the cloud. Some existing remote integrity checking strategies can solely serve for static archive information and, thus, can't be applied to the auditing service since the information within the cloud are often dynamically updated. Thus, economical and secure dynamic auditing protocol is desired to convert information homeowners that the information area unit properly holds on in the cloud. Economical and privacy-preserving auditing protocol was proposed to provide data integrity. Then, this scheme extends the auditing protocol to support the information dynamic operations, that is economical and incontrovertibly secure in the random oracle model. Also auditing protocol supports batch auditing for each multiple homeowners and multiple clouds, without exploitation any sure organizer. The analysis and simulation results show that projected auditing protocols area unit secure and efficient, particularly it scale back the computation value of the auditor. I. INTRODUCTION Cloud Computing is the use of Internet for the tasks performed on the local machine, with the hardware and software demands maintained elsewhere. It represents a different way to architect and remotely manage computing resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite web and mobile applications. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Cloud computing is being driven by many which includes Google, Amazon and Yahoo as well as traditional vendors including IBM, Intel and Microsoft. Internet (CLOUD) Client Server at remote data centre Fig 1 General Representation of cloud Fig 1 shows the representation of client access the data on the cloud server with the help of internet. In this cloud computing paradigm data integrity is a big issue when storing data in the cloud. Because data owners store there data in the Copyright @ IJIRCCE www.ijircce.com 2340

cloud server but there is no assurance for data correctness. So there are some auditing protocols available to provide data integrity. The auditing protocol should have the following properties 1) Confidentiality. The auditing protocol should keep owner s data confidential against the auditor. 2) Dynamic auditing. The auditing protocol should support the dynamic updates of the data in the cloud. 3) Batch auditing. The auditing protocol should also be able to support the batch auditing for multiple owners and multiple clouds. Recently, several remote integrity checking protocols were proposed to allow the auditor to check the data integrity on the remote server. Fig 1.2 shows the simple auditing process between auditor and the cloud server. Request Logon Issues Server Challenge ccc Answer to server challenge Fig 2 Auditing Query via the Challenge-response Protocol II. EXISTING SYSTEM To solve the data privacy problem, existing method is to generate an encrypted proof with the challenge stamp by using the Bilinearity property of the bilinear pairing, such that the auditor cannot decrypt it but can verify the correctness of the proof. Without using the mask technique, this method does not require any trusted organizer during the batch auditing for multiple clouds. On the other hand, in this method, server computes the proof as an intermediate value of the verification, such that the auditor can directly use this intermediate value to verify the correctness of the proof. Therefore, existing method can greatly reduce the computing loads of the auditor by moving it to the cloud server. Fig 1.2 shows the overall work flow of the existing auditing protocol. To improve the performance of an auditing system, apply the data fragment technique and homomorphic verifiable tags in our method. The data fragment technique can reduce number of data tags, such that it can reduce the storage overhead and improve the system performance. By using the homomorphic verifiable tags, no matter how many data blocks are challenged, the server only responses the sum of data blocks and the product of tags to the auditor, whose size is constant and equal to only one data block. Thus, it reduces the communication cost. Copyright @ IJIRCCE www.ijircce.com 2341

Fig 3 Framework of our privacy-preserving auditing protocol Advantage: 1. Auditing protocol ensures the data privacy by using cryptography method and the Bilinearity property of the bilinear pairing, instead of using the mask technique.this protocol incurs less communication cost between the auditor and the server. It also reduces the computing loads of the auditor by moving it to the server. 2. Also it supports data dynamic operations, which is efficient and provably secure in the random oracle model. 3. We further extend our auditing protocol to support batch auditing for not only multiple clouds but also multiple owners. multicloud batch auditing does not require any additional trusted organizer. The multiowner batch auditing can greatly improve the auditing performance, especially in large-scale. Disadvantage: 1. This protocol is not suitable when data loss occur during auditing process. Especially when sending encrypted challenge stamp to the auditor and to the cloud server. 2. Also it can t be solving the situation when multiple owners periodically updated. III. PROPOSED SYSTEM To improve the draw backs of existing system we introduce a modified dynamic auditing protocol, This protocol contains 1.Time stamp value to verify the validity of data 2.Index table for dynamic owner as well as data. This system includes 4 modules 1. Multi cloud storages 2. Modified dynamic auditing 3. Data Integrity and Third Party Auditor 4. Dynamic auditing Copyright @ IJIRCCE www.ijircce.com 2342

3.1 Multi cloud storage First we should create storage space for client to host there data in the cloud server. When storing the encrypted data in cloud server client fragment there data to reduce storage overhead. Fragmentation technique is the first process done by modified dynamic auditing protocol. During this fragmentation process we have to mention the fragmentation size of the data blocks. We further split the data blocks in to sectors. Sector size is restricted by the security parameter. Next step is to generate one data tag for each data block that consists of s sectors. 3.2 Modified Dynamic Auditing: Using key generation and tag generation algorithm we generate a computed data component. KeyGen (λ) (skh, skt, pkt). This key generation algorithm takes no input other than the implicit security parameter λ. It outputs a secret hash key skh and a pair of secret-public tag key (skt, pkt). TagGen(M, skt, skh) T. The tag generation algorithm takes as inputs an encrypted file M, the secret tag key skt and the secret hash key skh. For each data block mi, it computes a data tag ti based on skh and skt. It outputs a set of data tags T = {ti}i [1,n]. 3.3 Data integrity and third party auditing: Chall (Minfo) C. The challenge algorithm takes as input the abstract information of the data Minfo (e.g., file identity, total number of blocks, version number and timestamp etc.). It outputs a challenge C. Prove (M, T, C,T i ) P. The prove algorithm takes as inputs the file M, the tags T and the challenge from the auditor C. It outputs a proof P.when sending proof we should include the time stamp to verify the validity of the data. Verify (C, P, skh, pkt,minfo) 0/1. The verification algorithm takes as inputs the P from the server, the secret hash key skh, the public tag key pkt and the abstract information of the data Minfo. It outputs the auditing result as 0 or 1. 3.4 Dyanamic Auditing: Data update: There are three types of data update operation is takes place 1.modify 2.insert 3.update.We Propose an auditing protocol that include a time stamp field for each operation. Modify: The modification algorithm takes as inputs the new version of data,secret hash key sk h, secret tag key sk t.it generates new version number for the data and it again generate tag key. Insert: Insert (m i, skt, skh) (Msginsert, t i ). The insertion algorithm takes as inputs the new data block m i, the secret tag key skt and the secret hash key skh. It inserts a new data block m i before the ith position. It generates an original number B i,a new version number V i and a new timestamp T i. Then, it calls the TagGen to generate a new data tag t i for the new data block m i. It outputs the new tag t i and the update message Msginsert = (i, B i, V i, T i ). Then, it inserts the new pair of Data block and tag (m i, t i ) on the server and sends the update message Msginsert to the auditor. Delete (mi) Msgdelete. Copyright @ IJIRCCE www.ijircce.com 2343

The deletion algorithm takes as input the data block mi. It outputs the update message Msgdelete = (i, Bi, Vi, Ti). It then deletes the pair of data block and its tag (mi, ti) from the server and sends the update message Msgdelete to the auditor. Fig 4 System model for dynamic storage auditing IV. CONCLUSION Cloud-based mechanisms are required to ensure data security and privacy, and to fulfill the regulatory and audit requirements of enterprises. Economical and inherently secure dynamic auditing protocol is proposed which protects the information privacy against the auditor and data loss by combining the cryptography method with the additive property of bilinear paring with time stamp, rather than using simple bilinear pairing without timestamp value. Thus, multicloud batch auditing protocol does not need any extra organizer. Batch auditing protocol can even support the batch auditing for multiple owners. Also, it reduces the computation time compared to the previous auditing scheme. It uses the best fragmentation technique so that the data tag generation is reduced. Thus, the storage space is preserved. In this technique, even the auditor is not aware about the actual form of data that is stored in the cloud. REFERENCES 1. Kang Yang, (2013) An Efficient and secure dynamic auditing protocol for data storage in cloud computing, vol.24,no9. 2. Armbrust.M, Fox.A, Griffith.R, Joseph A.D, Katz R.H, Konwinski.A, Lee.G, Patterson D.A, Rabkin.A, Stoica.I, and Zaharia.M,(2010) A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp. 50-58. 3. Ateniese.G, Pietro R.D, Mancini.L, and Tsudik.G,(2008) Scalable and Efficient Provable Data Possession, IACR Cryptology eprint Archive, vol. 2008, pp. 114. 4. Bairavasundaram L.N,Goodson, Pasupathy.S, and J. Schindler,(2007) An Analysis of Latent Sector Errors in Disk Drives, Proc. ACM SIGMETRICS Int l Conf. Measurement and Modeling of Computer Systems, Golubchik.L, Ammar L.N., and Harchol- Balter L.N, eds, pp. 289-300. 5. C. Wang, Q. Wang, K. Ren, and W. Lou,(2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp. 525-533. 6. Kher.V and Kim.Y,(2005), Securing Distributed Storage: Challenges, Techniques, and Systems, Proc. ACM Workshop Storage Security and Survivability (StorageSS), pp. 9-25. 7. Li.J, Krohn M.N, Mazieres.D, and Shasha.D,(2004) Secure Untrusted Data Repository (SUNDR), Proc. Sixth Conf. Symp. Operating Systems Design Implementation, pxp. 121-136, 8. Lillibridge.M, Elnikety.S Birrell.A, M. Burrows, and Isard.M,(2003) A Cooperative Internet Backup Scheme, Proc. USENIX Ann. Technical Conf., pp. 29-41. 9. Schroeder.B and Gibson G.A,(2007), Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You? Proc. USENIX Conf. File and Storage Technologies, pp. 1-16. 10. Sebe.F, Domingo-Ferrer.J, Martı nez-balleste.a, Deswarte.Y, and Quisquater.J,(2008) Efficient Remote Data Possession Checking in Critical Information Infrastructures, IEEE Trans. Knowledge Data Eng., vol. 20, no. 8, pp. 1034-1038.. Copyright @ IJIRCCE www.ijircce.com 2344

11. Shah.A, Baker.B, MogulJ.C, and Swaminathan.R,(2007) Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS), G.C. Hunt, ed. 12. Velte.T, Velte.V, and Elsenpeter.R,(2010), Cloud Computing: A Practical Approach, first ed., ch. 7. McGraw-Hill. 13. Wang C., Ren.K, W. Lou, and J. Li,(July/Aug2010), Toward Publicly Auditable Secure Cloud Data Storage Services, IEEE Network, vol. 24, no. 4, pp. 19-24. 14. Yang.K and Jia.,(2010) Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities, World Wide Web, vol. 15, no. 4, pp. 409-428. Copyright @ IJIRCCE www.ijircce.com 2345