IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT



Similar documents
TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Improving data integrity on cloud storage services

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

How To Ensure Data Integrity In Clouds

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

February. ISSN:

Trusted Public Auditing Process for Secure Cloud Storage

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Energy Efficiency in Secure and Dynamic Cloud Storage

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Surveying Cloud Storage Correctness using TPA with BLS

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

ADVANCE SECURITY TO CLOUD DATA STORAGE

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Analysis of Secure Cloud Data Sharing Within a Group

A Survey on Secure Storage Services in Cloud Computing

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Verifying Correctness of Trusted data in Clouds

A Secure and Dependable Cloud Storage Service in Cloud Computing

Data Storage Security in Cloud Computing

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Secure Way of Storing Data in Cloud Using Third Party Auditor

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Public Auditability and Privacy preserving in Cloud Storage

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Identifying Data Integrity in the Cloud Storage

I. Introduction. A. Related Work

Near Sheltered and Loyal storage Space Navigating in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Secure Distribution of File on Cloud

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

How To Ensure Data Integrity In Cloud Computing

Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases

BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

How To Secure Cloud Data Storage

Enable Public Audit ability for Secure Cloud Storage

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Transcription:

IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT Mantesh Patil 1, S.Gayathri Devi 2 1 M.Tech Student, Dept of CSE, RRS College of Engineering & Technology, Muthangi (V), Patancheru (M), Hyderabad, T.S, India 2 Assistant Professor, Dept of CSE, RRS College of Engineering & Technology, Muthangi (V), Patancheru (M), Hyderabad, T.S, India ABSTRACT: Data robustness is considered as most important obligation for storage systems and there are numerous schemes of storing data above storage servers. In our work a cloud storage system was considered which consists of storage servers as well as key servers. Decentralized erasure code is erasure code that separately works out every codeword symbol for a message. An additional significant functionality in relation to cloud storage is function of reliability checking. A decentralized structural design for storage systems put forward superior scalability, since a storage server can connect or leave devoid of managing of a central ability. By means of threshold proxy re-encryption system, protected cloud storage system was put forward that provide protected data storage as well as protected data forwarding functionality in a decentralized construction. Even though for the most part of proxy re-encryption systems employ pairing procedures, there exist proxy re-encryption systems devoid of pairing. A protected cloud storage scheme involves that an unlawful user or else server cannot obtain substance of stored messages, and a storage server cannot produce re-encryption keys by himself. Proxy reencryption systems considerably diminish overhead of data forwarding function in protected storage system. We employ a threshold proxy re-encryption system through multiplicative homomorphic assets. Keywords: Data robustness, Erasure code, Proxy re-encryption, Cloud storage, Data storage, Homomorphic. 3699 P a g e

1. INTRODUCTION: protected Cloud Storage System projected threshold proxy re-encryption method and Cloud computing is a notion which erasure codes above exponents. The considers resources on Internet as a threshold proxy reencryption system combined entity, a cloud. To make available sustains encoding, forwarding, as well as well-built secrecy for messages within partial decryption operations in a dispersed storage servers, a user encrypts messages by means. By means of threshold proxy reencryption system, protected cloud storage means of cryptographic means earlier than applying an erasure code process to system was put forward that provide programme and stock up messages. As protected data storage as well as protected storing cryptographic keys in a particular data forwarding functionality in a device is unsafe, a user allocate decentralized construction. Each storage cryptographic key towards key servers that server autonomously carries out encoding as shall carry out cryptographic utility in aid of well as re-encryption and each key server user. The fixed incorporation of encoding, separately carries out partial decryption. encryption, as well as forwarding build storage system resourcefully meets up needs 2. METHODOLOGY: of data strength, data privacy, as well as data Data robustness is considered as most forwarding. Accomplishing incorporation important obligation for storage systems and with consideration of a dispersed there are numerous schemes of storing data construction is demanding. In our work we above storage servers. One means to make tackle difficulty of forwarding data to an available data toughness is to imitate a additional user by means of storage servers message such that every storage server unswervingly under command of data accumulates a copy of message. owner. System representation that consists Decentralized erasure code is erasure code of dispersed storage servers as well as key that separately works out every codeword servers was considered. In our work a cloud symbol for a message. Encoding procedure storage system was considered which for a message can be dividing into consists of storage servers as well as key analogous tasks of making codeword servers[1]. We put together a lately symbols. A decentralized erasure code is computation cost of each algorithm in 3700 P a g e

appropriate for employment in dispersed storage system. Subsequent to the message front-end layer for instance established file system interface. symbols are sending towards storage servers, every storage server autonomously works out a codeword symbol for received 3. AN OVERVIEW OF PROXY RE- ENCRYPTION SYSTEM: message symbols and accumulates it. A decentralized structural design for storage Towards fitting distributed arrangement of systems put forward superior scalability, systems, we necessitate that servers since a storage server can connect or leave separately carry out all operations[2][3]. We devoid of managing of a central ability. To put forward a novel threshold proxy reencryption system and put together it by make available toughness against server failures, an easy means is to build replicas of means of a secure decentralized code to every message and accumulates them in outline a protected dispersed storage system. dissimilar servers. An additional significant The encryption system supports encoding functionality in relation to cloud storage is process above encrypted messages as well as function of reliability checking. Subsequent forwarding operations above encrypted as to a user accumulates data into storage well as encoded messages. An overview of system, he no longer acquire data at hand. storage model was shown in fig1. Our The conception of verifiable data possession storage scheme as well as several recently as well as conception of proof of storage is projected content addressable file schemes is projected. In proxy re-encryption scheme, a extremely attuned. Storage servers executes server transmits a cipher text in unrestricted as nodes within content addressable scheme key towards a new one under an additional for accumulating content addressable public key by means of re-encryption key. blocks. By threshold proxy re-encryption Type-based proxy re-encryption systems system, protected cloud storage system was projected make available a superior put forward that provide protected data granularity on approved right of areencryption key. Even though for the most storage as well as protected data forwarding functionality in a decentralized part of proxy re-encryption systems employ construction[4]. Our key servers take action pairing procedures, there exist proxy reencryption systems devoid of pairing. A as access nodes in support of offering a 3701 P a g e

protected cloud storage scheme involves that an unlawful user or else server cannot obtain substance of stored messages, and a storage server cannot produce re-encryption keys by himself. Proxy re-encryption systems can considerably reduce communication as well as computation cost of possessor. In a proxy re-encryption scheme, possessor conveys a re-encryption key towards storage servers with the intention that servers achieve encryption process for him. The communication expenditure of owner is autonomous of extent of forwarded message and computation expenditure of reencryption is taken concern by storage servers. Proxy re-encryption systems considerably diminish overhead of data forwarding function in protected storage system. We employ a threshold proxy reencryption system through multiplicative homomorphic assets[5]. An encryption system is multiplicative homomorphic if it maintains a group procedure ʘ on encrypted plaintexts devoid of decryption hence a multiplicative homomorphic encryption system hold up encoding operation above encrypted messages. We subsequently transfer a proxy re-encryption system by means of multiplicative homomorphic property into a threshold version. The data privacy of cloud storage system is assured even if the entire storage servers, nontarget users are compromised by means of attacker[6]. Fig1: An overview of storage model. 4. CONCLUSION: The fixed incorporation of encoding, encryption, as well as forwarding build storage system resourcefully meets up needs of data strength, data privacy, as well as data forwarding. In our work we tackle difficulty of forwarding data to an additional user by means of storage servers unswervingly under command of data owner. Decentralized erasure code is erasure code that separately works out every codeword symbol for a message. A decentralized structural design for storage systems put forward superior scalability, since a storage server can connect or leave devoid of managing of a central ability. The threshold proxy reencryption system sustains encoding, forwarding, as well as partial decryption operations in a dispersed means. 3702 P a g e

We put forward a novel threshold proxy reencryption system and put together it by means of a secure decentralized code to outline a protected dispersed storage system. Our storage scheme as well as several recently projected content addressable file schemes is extremely attuned. System representation that consists of dispersed storage servers as well as key servers was considered. In proxy re-encryption scheme, a server transmits a cipher text in unrestricted key towards a new one under an additional public key by means of reencryption key. A protected cloud storage scheme involves that an unlawful user or else server cannot obtain substance of stored messages, and a storage server cannot produce re-encryption keys by himself. The data privacy of cloud storage system is assured even if the entire storage servers, non-target users are compromised by means of attacker. [3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS), pp. 598-609, 2007. [4] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, Proc. Fourth Int l Conf. Security and Privacy in Comm. Netowrks (SecureComm), pp. 1-10, 2008. [5] H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. 14th Int l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 90-107, 2008. [6] G. Ateniese, S. Kamara, and J. Katz, Proofs of Storage from Homomorphic Identification Protocols, Proc. 15th Int l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 319-333, 2009. REFERENCES [1] G. Ateniese, K. Benson, and S. Hohenberger, Key-Private Proxy Re-Encryption, Proc. Topics in Cryptology (CT-RSA), pp. 279-294, 2009. [2] J. Shao and Z. Cao, CCA-Secure Proxy Re- Encryption without Pairings, Proc. 12th Int l Conf. Practice and Theory in Public Key Cryptography (PKC), pp. 357-376, 2009. 3703 P a g e