SlideShare a Scribd company logo

E045026031

Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.

E045026031

1 of 6
Download to read offline
Research Inventy: International Journal of Engineering And Science
Vol.4, Issue 5 (May 2014), PP 26-31
Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com
26
Co-Operative Multiple Replica Provable Data Possession for
Integrity Verification in Multi-Cloud Storage
Mr.Susheel George Joseph M.C.A, M,Tech, M.Phil(CS)
(Assistant Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Changanassery,susheelgj@gmail.com)
ABSTRACT : Many storage systems rely on replication to increase the availability and durability of data on
untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of
the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the
data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica
provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a
file in a storage system to verify through a challenge-response protocol that each unique replica can be
produced at the time of the challenge and that the storage system uses t times the storage required to store a
single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a
client/server storage system.
KEYWORDS: Availability, Data Possession, Homomorphic, Integrity, Multi-Cloud, Multi-Replica,Zero-
Knowledge
I. INTRODUCTION
This is a study that combines the advantages of both CPDP (Co operative PDP) and MRPDP (Multiple
Replica PDP). The proposed paper manages user‟s data in multiple cloud storage by ensuring the integrity and
availability of user‟s data. To describe this we should have to describe both MRPDP and CPDP.Provable data
possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this scheme, we
address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of
service and data migration, in which we consider the existence of multiple cloud service providers to
cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on
homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on
multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-
knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in
particular present an efficient method for selecting optimal parameter values to minimize the computation costs
of clients and storage service providers. Our experiments show that our solution introduces lower computation
and communication overheads in comparison with non-cooperative approaches.
Using multiple-replica provable data possession(MR-PDP) to store t replicas is computationally much
more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting
each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on
demand, at little expense, when some of the existing replicas fail. The generation of replicas is on demand by
the user‟s request that is based on the security choice selected by the user at the time of file upload. The user can
choose three options Low, Medium, High at the time of file upload. The uploaded file is divided in to N blocks
of different sizes to achieve the efficiency in storage and is also used to improve security, here N represent the
number of clouds we are using. Low means the file is divided into N blocks (here 3), and each block is stored in
N different location of the single cloud. Medium means the file is divided into N blocks and each block is stored
in N different clouds which improves the security of data but reduce the availability. High means the file is
divided into N blocks and each N block is stored in N different clouds that are we are keeping the replicas of file
in N different clouds. The system maintains a download count to dynamically create the replicas in accordance
with the users demand.The system which consists of three users namely User who have the access rights to
upload, download and delete file, TPA (Third Party Auditor) who verifies the files that are uploaded by the
registered user and the user can download the file only after this verification, Admin who own the system and
who have the full access right, can create or delete TPAs and can view the uploaded files and details about the
uploads. A single cloud can have different TPA‟s and the work load is divided among by using the random
function to select the corresponding files from the cloud.
The creation and deletion of TPA is based on the work load and efficiency of TPA which is monitored by
the administrator. The data uploaded by the user is temporarily stored in an encrypted form by using the
Co-Operative Multiple Replica Provable…
27
homomorphic encryption algorithm. We can use any kind of encryption algorithms along with this applications
but it is better to choose a zero knowledge proof algorithm. This uses an encryption key which is automatically
supplied to the user at the time of file upload. The data is stored in cloud only after it is verified by TPA. The
actual storage of data is in an encrypted form called Meta Data, which ensures additional security measure for
the cloud data. The user gets the original file when he/she downloads the needed file from the cloud storage,
which ensures the integrity of data. The user is unaware of the background processes. This system reduces the
overload of admin by creating TPAs. The TPA can be of any number for each cloud depending on the number
of clouds we are using.
II. NEED FOR THE SYSTEM
The main objective of this paper is to provide an insight to build a system at low-cost, scalable, location
independent platform for managing clients‟ data, current cloud storage systems adopt several new distributed
file systems, for example, Apache Hadoop Distribution File System (HDFS), Google File System (GFS),
Amazon S3 File System, CloudStore etc. These file systems share some similar features: a single metadata
server provides centralized management by a global namespace; files are split into blocks or chunks and stored
on block servers; and the systems are comprised of interconnected clusters of block servers. Those features
enable cloud service providers to store and process large amounts of data. However, it is crucial to offer an
efficient verification on the integrity and availability of stored data for detecting faults and automatic recovery.
Moreover, this verification is necessary to provide reliability by automatically maintaining multiple copies of
data and automatically redeploying processing logic in the event of failures.
Some of the Objectives can be summarized as
Usability aspect: A client should utilize the integrity check in the way of collaboration services. The scheme
should conceal the details of the storage to reduce the burden on clients.
Security aspect: The scheme should provide adequate security features to resist some existing attacks, such as
data leakage attack and tag forgery attack.
Performance aspect: The scheme should have the lower communication and computation overheads than non-
cooperative solution.
III. EXISTING ARCHITECTURE
There exist various tools and technologies for multicloud, such as Platform VM Orchestrator,
VMwarevSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform for
managing clients‟ data. However, if such an important platform is vulnerable to security attacks, it would bring
irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed
through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered
with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for
cloud service providers to provide security techniques for managing their storage services.More Moreover
another limitations of the existing system is that it is not suitable for multicloud storage services.To check the
availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches
called Provable Data Possession and Proofs of Retrievability. Ateniese et al. first proposed the PDP model for
ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that
achieves the communication cost.
They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge
the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function
and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses
due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in
advance and users cannot perform block insertions anywhere.
Co-Operative Multiple Replica Provable…
28
Fig 1. Existing Architecture
IV. PROPOSED ARCHITECTURE
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing.
In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the
scalability of service and data migration, in which we consider the existence of multiple cloud service providers
to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on
homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on
multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-
knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in
particular present an efficient method for selecting optimal parameter values to minimize the computation costs
of clients and storage service providers. Our experiments show that our solution introduces lower computation
and communication overheads in comparison with non-cooperative approaches.
Fig 2. Proposed Architecture
V. ARCHITECTURE DETAILS – MODULARIZATION
The modules are formed on the basis of the functionalities that are found in the proposed system. The
functionalities are performed by three users namely Admin, TPA, and registered User.
Cooperative accessing
We can access data from multiple clouds by using the CPDP scheme, it is based on homomorphic verifiable
response (HVR) and hash index hierarchy (HIH). We prove the security of our scheme based on multi-prover
zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge
properties.
Co-Operative Multiple Replica Provable…
29
Replica generation
The replica generation can be performed by the MR-PDP scheme. This scheme allows a client to stores t
replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can
be produced at the time of the challenge and that the storage system uses t times the storage required to store a
single replica.
Integrity verification
Integrity requires that authorized changes must be detected and tracked, and changes must be limited to a
specific scope. Due to the increased number of entities and access points in a cloud environment, authorization
is crucial in assuring that only authorized entities can interact with data. A cloud computing provider is trusted
to maintain data integrity and accuracy. To verify integrity, we must examine the net effects on the cloud data
related to data integrity. There will be a set of standards for monitoring the integrity of data. Integrity
monitoring is essential in cloud storage as data integrity is critical for any data centre. Here, we consider the
existence of multiple CSPs to collaboratively store and maintain the clients‟ data. The traditional cryptographic
primitives for data integrity and availability based on hashing and signature schemes are not applicable on the
outsourced data. Hence lots of new techniques have been found out for integrity verification. This technique
too doesn‟t guarantee the expected security in clouds. Here we use the CPDP scheme for integrity verification.
.
Fig 3 .Integrity Verification in Hybrid Cloud
File Division
The Cloud User who has a large amount of data to be stored in multiple clouds and has the permissions
to access and manipulate stored data. The User‟s Data is converted into data blocks of different sizes for
improving the efficiency of storage and as well as to improve the security of file.
Registration
The user can store the file into the cloud storage only if he/she is a registered owner of this web
application. The registration can be made as either free or a paid registration depending on the organization‟s
requirement.
File Upload
Not all files are directly stored in multiple clouds, but only the files that are verified by the trusted TPA
are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the
TPA. The File may be encrypted using the cryptographic key which is randomly generated.
File verification
Using the cryptographic key the file is encrypted and by using this key the file contents may be decrypted by
the TPA for the verification process. He can view the file contents by the decryption process and can verify the
files.
File download
Only the verified Files can be downloaded by the File Owner. If the user wants to download their files, the
data stored in multi-cloud is integrated and downloaded. Here the downloading count is saved for generating the
replicas of the file by ensuring the demand of file. The user could get acknowledgement about the server which
the file is saved, it is also an additional provision which is depends on the client‟s requirement. We can increase
the security of downloading by verifying the key along with downloading process. One problem can arise is in
the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be
considered as an optional module along with file downloading and deletion modules.
Co-Operative Multiple Replica Provable…
30
File Deletion
The Uploaded file can be deleted by the File Owner. The security can be increased if we are making
key verification along with the deletion process. One problem can arise is in the case of key remembrance. But
this can be solved if we are using Grid Security along with it. It can be considered as an optional module along
with file downloading and deletion.
File Storage
Verified File is stored in the cloud in an Encrypted format using the Cryptographic key. So file security
is ensured and no one can decrypt or hack the file. The Verified File can be stored in three Clouds. The uploaded
file is split in to different blocks based on the number of clouds we are using. When user uploads the file there is
a choice of file security-Low, Medium, High. If the security is „Low‟ then it is stored in Cloud1 and it is of
„Medium‟ then the encrypted file blocks are saved in each cloud individually. If the security option is „High‟
then the same file blocks are saved in each Clouds independently.
TPA Creation and deletion
TPA is one of the users in this application. TPA is used to verify the files that are uploaded by the
User. The User file is uploaded to the cloud storage by the TPA only after the verification process. TPA can
view the file content without downloading; he can decrypt the information by using the corresponding encrypted
key. TPA creation is done by the Administrator for reducing the overhead in managing each cloud user. The
deletion task can be used if the TPA is no longer needed for the particular cloud.
View All Files
All the Files in the web including verified and not-verified are viewed by the Administrator
View File Owners
Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file
owners and can monitor the storage space used by the file owners.
VI. CONCLUSION
The aim of this article entitled “Co-Operative Provable Data Possession For Integrity Verification In
Multi-Cloud Storage” was to demonstrate the combined effect of two efficient and well known concepts CPDP
and MR-PDP. This could achieve the user‟s requirements in the multi cloud environment such as availability
and security of data. These are the two major concerns in a distributed environment.As we are using multi cloud,
so there are multiple cloud service provider‟s for multiple clouds. As we want to store block in each cloud so the
request has to go from each Cloud Service Provider, so to reduce the complexity we can use the Centralized
Cloud Service Provider. Therefore, every request is managed by centralized Cloud Service Provider. This
research can be treated as a new technique for data integrity verification in data possession. As part of future
enhancement, I would like extend my work to explore more effective MR-CPDP constructions. Finally, it is still
a challenging problem for the generation of tags with the length irrelevant to the size of data blocks and various
file formats.
VII. ACKNOWLEDGEMENT
I would like to thank GOD Almighty for the valuable support throughout this research phase to
complete this paper successfully. I would like to express my sincere thanks to my Guide for his valuable
suggestions. I also like to thank my family members and my college authorities as well as co-workers for their
consistence support and motivation.
REFERENCES
[1] O. Rahamathunisa Begam,, T. Manjula,, T. Bharath Manohar,, B. Susrutha, “Cooperative Schedule Data Possession for
Integrity Verification in Multi-Cloud Storage” in International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5,
Sep - Oct. 2013, pp.2726-2741.
[2] Yan Zhu ,Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China; Hongxin Hu ; Gail-Joon Ahn ; Mengyang
Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage” in Parallel and Distributed Systems,
IEEE Transactions on (Volume:23 , Issue: 12 ), Dec. 2012,pp.2231 – 2244.
[3] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech.
Rep., Feb 2009.
Co-Operative Multiple Replica Provable…
31
[5] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology (CRYPTO‟2001), vol.
2139 of LNCS, 2001, pp. 213–229.
[6] Megha Patil , Prof. G.R.Rao, “Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession ” in
Megha Patil et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp.982-
985
[7] Vaibhav Bharati and M R Patil., “Advanced Cooperative Provable Data Possession based Data Integrity Verification for Multi-
Cloud Storage” in International Journal of Computer Applications, Foundation of Computer Science, New York, USA, ,November
2013,pp.25-28
[8] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[9] A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for Large files,” in ACM Conference on Computer and Communications
Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
[10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in Communication networks, SecureComm, 2008, pp. 1–10.
B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster,“Virtual infrastructure management in private and hybrid Clouds,”
IEEE Internet Computing, vol. 13, no. 5,2009, pp. 14–22.
[11] K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on
Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.
Ad

Recommended

Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...dbpublications
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedNinad Samel
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
 
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...IJCERT JOURNAL
 

More Related Content

What's hot

Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...IRJET Journal
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storageKhaja Moiz Uddin
 
Data Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvementsData Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvementsUmair Amjad
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...ijcsit
 
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"Guy K. Kloss
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 

What's hot (17)

Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
Assigment 2
Assigment 2Assigment 2
Assigment 2
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
Data Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvementsData Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvements
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
 
IT6701-Information management question bank
IT6701-Information management question bankIT6701-Information management question bank
IT6701-Information management question bank
 
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 

Similar to E045026031

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Rishikesh Pathak
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsPvrtechnologies Nellore
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDijsptm
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession forIMPULSE_TECHNOLOGY
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 

Similar to E045026031 (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 

Recently uploaded

Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education pptsafnarafeek2002
 
My sample product research idea for you!
My sample product research idea for you!My sample product research idea for you!
My sample product research idea for you!KivenRaySarsaba
 
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!XfilesPro
 
Power of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfPower of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfkatalinjordans1
 
M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____Aathiraju
 
Q1 Memory Fabric Forum: SMART CXL Product Lineup
Q1 Memory Fabric Forum: SMART CXL Product LineupQ1 Memory Fabric Forum: SMART CXL Product Lineup
Q1 Memory Fabric Forum: SMART CXL Product LineupMemory Fabric Forum
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfLLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfThomas Poetter
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersThousandEyes
 
Curtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfCurtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfDomotica daVinci
 
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFE
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFEDNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFE
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFEandreiandasan
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?GleecusTechlabs1
 
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMING
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMINGAUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMING
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMINGLiveplex
 
Put a flag on it. A busy developer's guide to feature toggles.
Put a flag on it. A busy developer's guide to feature toggles.Put a flag on it. A busy developer's guide to feature toggles.
Put a flag on it. A busy developer's guide to feature toggles.Mateusz Kwasniewski
 
Bringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxBringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxMaarten Balliauw
 
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxEvolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxKyle Willson
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingSoracom Global, Inc.
 
Microsoft Azure News - Feb 2024
Microsoft Azure News - Feb 2024Microsoft Azure News - Feb 2024
Microsoft Azure News - Feb 2024Daniel Toomey
 
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-CManual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-CDomotica daVinci
 
Bit N Build Poland
Bit N Build PolandBit N Build Poland
Bit N Build PolandGDSC PJATK
 

Recently uploaded (20)

Importance of magazines in education ppt
Importance of magazines in education pptImportance of magazines in education ppt
Importance of magazines in education ppt
 
My sample product research idea for you!
My sample product research idea for you!My sample product research idea for you!
My sample product research idea for you!
 
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
5 Things You Shouldn’t Do at Salesforce World Tour Sydney 2024!
 
COE AI Lab Universities
COE AI Lab UniversitiesCOE AI Lab Universities
COE AI Lab Universities
 
Power of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfPower of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdf
 
M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____M.Aathiraju Self Intro.docx-AD21001_____
M.Aathiraju Self Intro.docx-AD21001_____
 
Q1 Memory Fabric Forum: SMART CXL Product Lineup
Q1 Memory Fabric Forum: SMART CXL Product LineupQ1 Memory Fabric Forum: SMART CXL Product Lineup
Q1 Memory Fabric Forum: SMART CXL Product Lineup
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdfLLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI.pdf
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
Curtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdfCurtain Module Manual Zigbee Neo CS01-1C.pdf
Curtain Module Manual Zigbee Neo CS01-1C.pdf
 
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFE
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFEDNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFE
DNA LIGASE BIOTECHNOLOGY BIOLOGY STUDY OF LIFE
 
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
Unlocking the Cloud's True Potential: Why Multitenancy Is The Key?
 
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMING
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMINGAUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMING
AUGMENTED REALITY (AR) IN DAILY LIFE: EXPANDING BEYOND GAMING
 
Put a flag on it. A busy developer's guide to feature toggles.
Put a flag on it. A busy developer's guide to feature toggles.Put a flag on it. A busy developer's guide to feature toggles.
Put a flag on it. A busy developer's guide to feature toggles.
 
Bringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptxBringing nullability into existing code - dammit is not the answer.pptx
Bringing nullability into existing code - dammit is not the answer.pptx
 
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptxEvolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
Evolution of Chatbots: From Custom AI Chatbots and AI Chatbots for Websites.pptx
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Microsoft Azure News - Feb 2024
Microsoft Azure News - Feb 2024Microsoft Azure News - Feb 2024
Microsoft Azure News - Feb 2024
 
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-CManual  sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
Manual sensor Zigbee 3.0 MOES ZSS-X-PIRL-C
 
Bit N Build Poland
Bit N Build PolandBit N Build Poland
Bit N Build Poland
 

E045026031

  • 1. Research Inventy: International Journal of Engineering And Science Vol.4, Issue 5 (May 2014), PP 26-31 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com 26 Co-Operative Multiple Replica Provable Data Possession for Integrity Verification in Multi-Cloud Storage Mr.Susheel George Joseph M.C.A, M,Tech, M.Phil(CS) (Assistant Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology, Changanassery,susheelgj@gmail.com) ABSTRACT : Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can be produced at the time of the challenge and that the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system. KEYWORDS: Availability, Data Possession, Homomorphic, Integrity, Multi-Cloud, Multi-Replica,Zero- Knowledge I. INTRODUCTION This is a study that combines the advantages of both CPDP (Co operative PDP) and MRPDP (Multiple Replica PDP). The proposed paper manages user‟s data in multiple cloud storage by ensuring the integrity and availability of user‟s data. To describe this we should have to describe both MRPDP and CPDP.Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this scheme, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero- knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches. Using multiple-replica provable data possession(MR-PDP) to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail. The generation of replicas is on demand by the user‟s request that is based on the security choice selected by the user at the time of file upload. The user can choose three options Low, Medium, High at the time of file upload. The uploaded file is divided in to N blocks of different sizes to achieve the efficiency in storage and is also used to improve security, here N represent the number of clouds we are using. Low means the file is divided into N blocks (here 3), and each block is stored in N different location of the single cloud. Medium means the file is divided into N blocks and each block is stored in N different clouds which improves the security of data but reduce the availability. High means the file is divided into N blocks and each N block is stored in N different clouds that are we are keeping the replicas of file in N different clouds. The system maintains a download count to dynamically create the replicas in accordance with the users demand.The system which consists of three users namely User who have the access rights to upload, download and delete file, TPA (Third Party Auditor) who verifies the files that are uploaded by the registered user and the user can download the file only after this verification, Admin who own the system and who have the full access right, can create or delete TPAs and can view the uploaded files and details about the uploads. A single cloud can have different TPA‟s and the work load is divided among by using the random function to select the corresponding files from the cloud. The creation and deletion of TPA is based on the work load and efficiency of TPA which is monitored by the administrator. The data uploaded by the user is temporarily stored in an encrypted form by using the
  • 2. Co-Operative Multiple Replica Provable… 27 homomorphic encryption algorithm. We can use any kind of encryption algorithms along with this applications but it is better to choose a zero knowledge proof algorithm. This uses an encryption key which is automatically supplied to the user at the time of file upload. The data is stored in cloud only after it is verified by TPA. The actual storage of data is in an encrypted form called Meta Data, which ensures additional security measure for the cloud data. The user gets the original file when he/she downloads the needed file from the cloud storage, which ensures the integrity of data. The user is unaware of the background processes. This system reduces the overload of admin by creating TPAs. The TPA can be of any number for each cloud depending on the number of clouds we are using. II. NEED FOR THE SYSTEM The main objective of this paper is to provide an insight to build a system at low-cost, scalable, location independent platform for managing clients‟ data, current cloud storage systems adopt several new distributed file systems, for example, Apache Hadoop Distribution File System (HDFS), Google File System (GFS), Amazon S3 File System, CloudStore etc. These file systems share some similar features: a single metadata server provides centralized management by a global namespace; files are split into blocks or chunks and stored on block servers; and the systems are comprised of interconnected clusters of block servers. Those features enable cloud service providers to store and process large amounts of data. However, it is crucial to offer an efficient verification on the integrity and availability of stored data for detecting faults and automatic recovery. Moreover, this verification is necessary to provide reliability by automatically maintaining multiple copies of data and automatically redeploying processing logic in the event of failures. Some of the Objectives can be summarized as Usability aspect: A client should utilize the integrity check in the way of collaboration services. The scheme should conceal the details of the storage to reduce the burden on clients. Security aspect: The scheme should provide adequate security features to resist some existing attacks, such as data leakage attack and tag forgery attack. Performance aspect: The scheme should have the lower communication and computation overheads than non- cooperative solution. III. EXISTING ARCHITECTURE There exist various tools and technologies for multicloud, such as Platform VM Orchestrator, VMwarevSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform for managing clients‟ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers to provide security techniques for managing their storage services.More Moreover another limitations of the existing system is that it is not suitable for multicloud storage services.To check the availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession and Proofs of Retrievability. Ateniese et al. first proposed the PDP model for ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that achieves the communication cost. They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in advance and users cannot perform block insertions anywhere.
  • 3. Co-Operative Multiple Replica Provable… 28 Fig 1. Existing Architecture IV. PROPOSED ARCHITECTURE Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero- knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches. Fig 2. Proposed Architecture V. ARCHITECTURE DETAILS – MODULARIZATION The modules are formed on the basis of the functionalities that are found in the proposed system. The functionalities are performed by three users namely Admin, TPA, and registered User. Cooperative accessing We can access data from multiple clouds by using the CPDP scheme, it is based on homomorphic verifiable response (HVR) and hash index hierarchy (HIH). We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties.
  • 4. Co-Operative Multiple Replica Provable… 29 Replica generation The replica generation can be performed by the MR-PDP scheme. This scheme allows a client to stores t replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can be produced at the time of the challenge and that the storage system uses t times the storage required to store a single replica. Integrity verification Integrity requires that authorized changes must be detected and tracked, and changes must be limited to a specific scope. Due to the increased number of entities and access points in a cloud environment, authorization is crucial in assuring that only authorized entities can interact with data. A cloud computing provider is trusted to maintain data integrity and accuracy. To verify integrity, we must examine the net effects on the cloud data related to data integrity. There will be a set of standards for monitoring the integrity of data. Integrity monitoring is essential in cloud storage as data integrity is critical for any data centre. Here, we consider the existence of multiple CSPs to collaboratively store and maintain the clients‟ data. The traditional cryptographic primitives for data integrity and availability based on hashing and signature schemes are not applicable on the outsourced data. Hence lots of new techniques have been found out for integrity verification. This technique too doesn‟t guarantee the expected security in clouds. Here we use the CPDP scheme for integrity verification. . Fig 3 .Integrity Verification in Hybrid Cloud File Division The Cloud User who has a large amount of data to be stored in multiple clouds and has the permissions to access and manipulate stored data. The User‟s Data is converted into data blocks of different sizes for improving the efficiency of storage and as well as to improve the security of file. Registration The user can store the file into the cloud storage only if he/she is a registered owner of this web application. The registration can be made as either free or a paid registration depending on the organization‟s requirement. File Upload Not all files are directly stored in multiple clouds, but only the files that are verified by the trusted TPA are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the TPA. The File may be encrypted using the cryptographic key which is randomly generated. File verification Using the cryptographic key the file is encrypted and by using this key the file contents may be decrypted by the TPA for the verification process. He can view the file contents by the decryption process and can verify the files. File download Only the verified Files can be downloaded by the File Owner. If the user wants to download their files, the data stored in multi-cloud is integrated and downloaded. Here the downloading count is saved for generating the replicas of the file by ensuring the demand of file. The user could get acknowledgement about the server which the file is saved, it is also an additional provision which is depends on the client‟s requirement. We can increase the security of downloading by verifying the key along with downloading process. One problem can arise is in the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be considered as an optional module along with file downloading and deletion modules.
  • 5. Co-Operative Multiple Replica Provable… 30 File Deletion The Uploaded file can be deleted by the File Owner. The security can be increased if we are making key verification along with the deletion process. One problem can arise is in the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be considered as an optional module along with file downloading and deletion. File Storage Verified File is stored in the cloud in an Encrypted format using the Cryptographic key. So file security is ensured and no one can decrypt or hack the file. The Verified File can be stored in three Clouds. The uploaded file is split in to different blocks based on the number of clouds we are using. When user uploads the file there is a choice of file security-Low, Medium, High. If the security is „Low‟ then it is stored in Cloud1 and it is of „Medium‟ then the encrypted file blocks are saved in each cloud individually. If the security option is „High‟ then the same file blocks are saved in each Clouds independently. TPA Creation and deletion TPA is one of the users in this application. TPA is used to verify the files that are uploaded by the User. The User file is uploaded to the cloud storage by the TPA only after the verification process. TPA can view the file content without downloading; he can decrypt the information by using the corresponding encrypted key. TPA creation is done by the Administrator for reducing the overhead in managing each cloud user. The deletion task can be used if the TPA is no longer needed for the particular cloud. View All Files All the Files in the web including verified and not-verified are viewed by the Administrator View File Owners Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file owners and can monitor the storage space used by the file owners. VI. CONCLUSION The aim of this article entitled “Co-Operative Provable Data Possession For Integrity Verification In Multi-Cloud Storage” was to demonstrate the combined effect of two efficient and well known concepts CPDP and MR-PDP. This could achieve the user‟s requirements in the multi cloud environment such as availability and security of data. These are the two major concerns in a distributed environment.As we are using multi cloud, so there are multiple cloud service provider‟s for multiple clouds. As we want to store block in each cloud so the request has to go from each Cloud Service Provider, so to reduce the complexity we can use the Centralized Cloud Service Provider. Therefore, every request is managed by centralized Cloud Service Provider. This research can be treated as a new technique for data integrity verification in data possession. As part of future enhancement, I would like extend my work to explore more effective MR-CPDP constructions. Finally, it is still a challenging problem for the generation of tags with the length irrelevant to the size of data blocks and various file formats. VII. ACKNOWLEDGEMENT I would like to thank GOD Almighty for the valuable support throughout this research phase to complete this paper successfully. I would like to express my sincere thanks to my Guide for his valuable suggestions. I also like to thank my family members and my college authorities as well as co-workers for their consistence support and motivation. REFERENCES [1] O. Rahamathunisa Begam,, T. Manjula,, T. Bharath Manohar,, B. Susrutha, “Cooperative Schedule Data Possession for Integrity Verification in Multi-Cloud Storage” in International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013, pp.2726-2741. [2] Yan Zhu ,Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China; Hongxin Hu ; Gail-Joon Ahn ; Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage” in Parallel and Distributed Systems, IEEE Transactions on (Volume:23 , Issue: 12 ), Dec. 2012,pp.2231 – 2244. [3] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep., Feb 2009.
  • 6. Co-Operative Multiple Replica Provable… 31 [5] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology (CRYPTO‟2001), vol. 2139 of LNCS, 2001, pp. 213–229. [6] Megha Patil , Prof. G.R.Rao, “Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession ” in Megha Patil et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp.982- 985 [7] Vaibhav Bharati and M R Patil., “Advanced Cooperative Provable Data Possession based Data Integrity Verification for Multi- Cloud Storage” in International Journal of Computer Applications, Foundation of Computer Science, New York, USA, ,November 2013,pp.25-28 [8] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [9] A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for Large files,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597. [10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in Communication networks, SecureComm, 2008, pp. 1–10. B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster,“Virtual infrastructure management in private and hybrid Clouds,” IEEE Internet Computing, vol. 13, no. 5,2009, pp. 14–22. [11] K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.