• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Toward secure and dependable
 

Toward secure and dependable

on

  • 1,313 views

For further details contact: ...

For further details contact:

N.RAJASEKARAN B.E M.S 9841091117,9840103301.


IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.

Statistics

Views

Total Views
1,313
Views on SlideShare
1,313
Embed Views
0

Actions

Likes
3
Downloads
78
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Toward secure and dependable Toward secure and dependable Document Transcript

    • Toward Secure and Dependable Storage Services in Cloud ComputingAbstract—Cloud storage enables users to remotely store their data and enjoy the on-demandhigh quality cloud applications without the burden of local hardware and softwaremanagement. Though the benefits are clear, such a service is also relinquishingusers’ physical possession of their outsourced data, which inevitably poses newsecurity risks toward the correctness of the data in cloud. In order to address thisnew problem and further achieve a secure and dependable cloud storage service,we propose in this paper a flexible distributed storage integrity auditingmechanism, utilizing the homomorphic token and distributed erasure-coded data.The proposed design allows users to audit the cloud storage with very lightweightcommunication and computation cost. The auditing result not only ensures strongcloud storage correctness guarantee, but also simultaneously achieves fast dataerror localization, i.e., the identification of misbehaving server. Considering thecloud data are dynamic in nature, the proposed design further supports secure andefficient dynamic operations on outsourced data, including block modification,deletion, and append. Analysis shows the proposed scheme is highly efficient andresilient against Byzantine failure, malicious data modification attack, and evenserver colluding attacks.Reasons for the proposal :Moving data into the cloud offers great convenience to users since they don’t haveto care about the complexities of direct hardware management. While theseinternet-based online services eliminate the responsibility of local machines for
    • data maintenance at the same time. As a result, users are at the mercy of their cloudservice providers (CSP) for the availability and integrity of their data .To increase the profit margin by reducing cost, it is possible for CSP to discardrarely accessed data without being detected in a timely fashion. Similarly, CSPmay even attempt to hide data loss incidents so as to maintain a reputation. In orderto achieve the assurances of cloud data integrity and availability and enforce thequality of cloud storage service, efficient methods that enable on-demand datacorrectness verification on behalf of cloud users have to be designed.Existing system & Demerits:Recently, the importance of ensuring the remote data integrity has been highlightedby the following research works under different system and security models. Thesetechniques, while can be useful to ensure the storage correctness without havingusers possessing local data, are all focusing on single server scenario. They may beuseful for quality-of-service testing ,but does not guarantee the data availability incase of server failures. Although direct applying these techniques to distributedstorage (multiple servers) could be straightforward, the resulted storageverification overhead would be linear to the number of servers. As ancomplementary approach, researchers have also proposed distributed protocols forensuring storage correctness across multiple servers or peers.However, while providing efficient cross server storage verification and dataavailability insurance, these schemes are all focusing on static or archival data. Asa result, their capabilities of handling dynamic data remains unclear,whichinevitably limits their full applicability in cloud storage scenarios.Proposed system :
    • In this paper, we propose an effective and flexible distributed storage verificationscheme with explicit dynamic data support to ensure the correctness andavailability of users’ data in the cloud. We rely on erasure correcting code in thefile distribution preparation to provide redundancies and guarantee the datadependability against Byzantine servers , where a storage server may fail inarbitrary ways. This construction drastically reduces the communication andstorage overhead as compared to the traditional replication-based file distributiontechniques. By utilizing the homomorphic token with distributed verification oferasure-coded data, our scheme achieves the storage correctness insurance as wellas data error localization: whenever data corruption has been detected during thestorage correctness verification, our scheme can almost guarantee the simultaneouslocalization of data errors, i.e., the identification of the misbehaving server(s). Inorder to save the time, computation resources, and even the related online burdenof users, we also provide the extension of the proposed main scheme to supportthird-party auditing, where users can safely delegate the integrity checking tasks tothird-party auditors (TPA) and be worry-free to use the cloud storage services.Our contribution can be summarized as the following three aspects:1) Compared to many of its predecessors, which only provide binary results aboutthe storage status across the distributed servers, the proposed scheme achieves theintegration of storage correctness insurance and data error localization, i.e., theidentification of misbehaving server(s).2) Unlike most prior works for ensuring remote data integrity, the new schemefurther supports secure and efficient dynamic operations on data blocks, including:update, delete, and append.
    • Architecture diagram :