preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.



Similar documents
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Enable Public Audit ability for Secure Cloud Storage

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Cloud Data Storage Services Considering Public Audit for Security

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Privacy preserving technique to secure cloud

Cloud Server Storage Security Using TPA

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

How To Ensure Correctness Of Data In The Cloud

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

ADVANCE SECURITY TO CLOUD DATA STORAGE

Trusted Public Auditing Process for Secure Cloud Storage

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING

Near Sheltered and Loyal storage Space Navigating in Cloud

Improving data integrity on cloud storage services

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Detecting false users in Online Rating system & Securing Reputation

Secure cloud access system using JAR ABSTRACT:

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Secure Way of Storing Data in Cloud Using Third Party Auditor

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Data Grid Privacy and Secure Storage Service in Cloud Computing

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

An Efficient Data Correctness Approach over Cloud Architectures

CLOUD Computing has been envisioned as the nextgeneration

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Ensuring Data Storage Security in Cloud Computing

Dynamic Resource allocation in Cloud

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Verifying Correctness of Trusted data in Clouds

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Surveying Cloud Storage Correctness using TPA with BLS

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Data Integrity Check using Hash Functions in Cloud environment

Secure Privacy Preserving Public Auditing for Cloud storage

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

Monitoring Data Integrity while using TPA in Cloud Environment

Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm

International Journal of Advanced Research in Computer Science and Software Engineering

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

How To Design A Cloud Data Storage Service For A Cloud Computer System

SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

February. ISSN:

Cloud Cost Management for Customer Sensitive Data

CloudFTP: A free Storage Cloud

Data Storage Security in Cloud Computing

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

How To Ensure Data Integrity In Cloud Computing

Identifying Data Integrity in the Cloud Storage

Survey Paper on Integrity Auditing of Storage

A Secure and Dependable Cloud Storage Service in Cloud Computing

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Data Security in Cloud Using Elliptic Curve Crytography

Privacy-Preserving Public Auditing for Secure Cloud Storage

How To Ensure Correctness Of Data In The Cloud

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Transcription:

Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. EXISTING SYSTEM: In the Existing systems, the notion of public auditability has been proposed in the context of ensuring remotely stored data integrity under different system and security models. Public auditability allows an external party, in addition to the user himself, to verify the correctness of remotely stored data. However, most of these schemes do not consider the privacy protection of users data against external auditors. Indeed, they may potentially reveal user s data to auditors. This severe drawback greatly affects the security of these protocols in cloud computing. From the perspective of protecting data privacy, the users, who own the data and rely on TPA just for the storage security of their data, do not want this auditing process introducing new vulnerabilities of unauthorized information leakage toward their data security. DISADVANTAGES OF EXISTING SYSTEM: Although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity.

Second, there do exist various motivations for CSP to behave unfaithfully toward the cloud users regarding their outsourced data status. In particular, simply downloading all the data for its integrity verification is not a practical solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those unaccessed data and might be too late to recover the data loss or damage. Encryption does not completely solve the problem of protecting data privacy against third-party auditing but just reduces it to the complex key management domain. Unauthorized data leakage still remains possible due to the potential exposure of decryption keys. PROPOSED SYSTEM: In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed

schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. ADVANTAGES OF PROPOSED SYSTEM: 1. Public auditability: to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional online burden to the cloud users. 2. Storage correctness: to ensure that there exists no cheating cloud server that can pass the TPA s audit without indeed storing users data intact. 3. Privacy preserving: to ensure that the TPA cannot derive users data content from the information collected during the auditing process. 4. Batch auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously 5. Lightweight: to allow TPA to perform auditing with minimum communication and computation overhead.

SYSTEM ARCHITECTURE: MODULES: System Model Module TPA Module Privacy preserving Module Batch auditing MODULES DESCRIPTION: System Model Module

In this module, first we develop three entities: User, Cloud Service Provider and Third Party Auditor. User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. The user initializes the public and secret parameters of the system by executing KeyGen, and preprocesses the data file F by using SigGen to generate the verification metadata. The user then stores the data file F and the verification metadata at the cloud server, and deletes its local copy. As part of preprocessing, the user may alter the data file F by expanding it or including additional metadata to be stored at server. Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems. Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request.

TPA Module In this module, we develop TPA, Third Party Auditor, independent third party auditor, making the cloud storage publicly verifiable. However, as pointed out by the recent work, to securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy. Namely, TPA should not learn user s data content through the delegated data auditing. Privacy preserving Module In this module, we develop a secure cloud system where, we ensure that the TPA cannot derive users data content from the information collected during the auditing process. We motivate the public auditing system of data storage security in cloud computing and provide a privacy-preserving auditing protocol. Our scheme enables an external auditor to audit user s cloud data without learning the data content. To the best of our knowledge, our scheme is the first to support scalable and efficient privacy-preserving public storage auditing in cloud.

Batch auditing In this module, we develop Batch Auditing, to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously. Specifically, our scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed simultaneously by the TPA in a privacy-preserving manner. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:- Processor - Pentium IV Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA

SOFTWARE CONFIGURATION:- Operating System Programming Language Java Version Database : Windows XP : JAVA/J2EE : JDK 1.6 & above. : MYSQL