SlideShare a Scribd company logo
1 of 11
Download to read offline
HYBRID
CLOUDS
EFFICIENT PROVABLE
DATA POSSESSION
FOR
YAN ZHU1,2, HUAIXI WANG3, ZEXING HU1, GAIL-JOON AHN4, HONGXIN HU4, STEPHEN S. YAU4
1INSTITUTE OF COMPUTER SCIENCE AND TECHNOLOGY, PEKING UNIVERSITY, BEIJING 100871,
CHINA 2KEY LABORATORY OF NETWORK AND SOFTWARE SECURITY ASSURANCE (PEKING
UNIVERSITY), MINISTRY OF EDUCATION 3SCHOOL OF MATHEMATICAL SCIENCES, PEKING
UNIVERSITY, BEIJING 100871, CHINA 4ARIZONA STATE UNIVERSITY, TEMPE, AZ 85287, USA
{YAN.ZHU,WANGHX,HUZX}@PKU.EDU.CN, {GAHN,HXHU,YAU}@ASU.EDU
CYBER
SECURITY
CONTENT
01
02
03
04
05
06
WHAT IS HYBRID CLOUD ?
COMPONENTS IN HYBRID CLOUD STORAGE
CONSTRUCTION OF PDP SCHEMES IN HYBRID CLOUDS
HASH INDEX HIERARCHY
WHAT IS CPDP MODEL ?
FRAGMENT STRUCTURE OF CPDP
WHAT IS HYBRID
CLOUD ?
Hybrid cloud storage architecture
is a combination of public and
private cloud storage
architectures. It is designed to
provide organizations with the
flexibility and scalability of public
clouds while ensuring the security
and privacy of private clouds. In a
hybrid cloud storage architecture,
data is stored and accessed from
both public and private cloud
storage infrastructures, allowing
organizations to leverage the
benefits of both environments.
COMPONENTS IN HYBRID
CLOUD STORAGE
Private cloud storage: The private cloud storage component provides a secure, dedicated storage
infrastructure within an organization's data center or on-premises environment. It is typically used to
store sensitive or confidential data that needs to be protected from external threats.
Public cloud storage: The public cloud storage component provides a scalable, cost-effective storage
infrastructure that can be accessed over the Internet. It is typically used to store less sensitive data
that needs to be accessed from anywhere and by anyone.
Hybrid cloud storage gateway: The hybrid cloud storage gateway is a software or hardware appliance
that connects the private and public cloud storage components. It provides a unified view of the entire
storage infrastructure and allows data to be seamlessly moved between the two environments.
Data migration tools: Data migration tools are used to move data between the private and public cloud
storage components. They ensure that data is securely transferred between the two environments and
that data integrity is maintained throughout the migration process.
Security and compliance tools: Security and compliance tools are used to ensure that data stored in
the hybrid cloud storage architecture is protected from unauthorized access, theft, or loss. They also
help organizations comply with industry and government regulations related to data privacy and
security.
Data backup and disaster recovery: Data backup and disaster recovery are critical components of a
hybrid cloud storage architecture. Organizations need to ensure that their data is backed up regularly
and that they have a disaster recovery plan in place in case of a catastrophic event.
CONSTRUCTION OF PDP
SCHEMES IN HYBRID CLOUDS
Provable Data Possession (PDP) schemes are cryptographic techniques used to
ensure that a remote storage server has not tampered with or lost any data that has
been entrusted to it by a client. Hybrid clouds, on the other hand, are cloud
computing environments that combine both private and public clouds. PDP schemes
can be constructed in hybrid clouds to provide a secure and reliable method for
storing and retrieving data.
There are several techniques that can be used to construct PDP schemes in hybrid
clouds like, Replication-based, Encryption-based, and Erasure-coded PDP schemes.
In all of these techniques, the PDP scheme is constructed in such a way that the data
owner can verify the integrity and availability of their data without having to
download the entire data from the remote server. This makes PDP schemes in hybrid
clouds efficient, scalable, and secure, allowing for the reliable storage and retrieval of
data in cloud computing environments.
HASH INDEX HIERARCHY
Hash index hierarchy is a data structure used in computer science to organize and access
large amounts of data efficiently. It is a hierarchical structure that uses hash functions to
map keys to specific locations in memory, allowing for fast retrieval of data.
Here's a brief explanation of each layer of the Hash Index Hierarchy:
First Layer (Express Layer): This layer provides an abstract representation of the stored
resources. It is responsible for handling metadata and other non-data aspects of storage.
The express layer typically consists of a database or index that allows for efficient
searching and organization of stored data.
Second Layer (Service Layer): The service layer promptly offers and manages cloud
storage services. It serves as a bridge between the express and storage layers, providing a
standardized interface for clients to interact with the storage system. The service layer is
responsible for managing user authentication, access control, and resource allocation.
Third Layer (Storage Layer): The storage layer directly realizes data storage on many
physical devices. It consists of the physical infrastructure, including servers, storage
devices, and network components, that stores and manages the data. The storage layer is
responsible for data replication, backup, and recovery, ensuring that data is always
available and protected.
WHAT IS CPDP MODEL ?
The Cooperative Provable Data Possession (CPDP) model is a method of ensuring the
integrity and availability of data stored in a remote server or cloud storage. It is designed
to address security concerns that arise when individuals or organizations store their data
on remote servers that are not under their direct control.
The data owner generates a set of cryptographic keys that are used to create a proof of
possession (PoP) for each block of data that is stored on the remote server. The PoP is a
small piece of data that can be used to verify that the corresponding block of data has not
been tampered with or deleted.
The data owner requests that the server provides a set of challenges that require the
server to provide PoPs for random blocks of data stored on the server. The server must
provide the correct PoP for each block in order to prove that the data has not been
tampered with or deleted. If the server fails to provide the correct PoP for any block, the
data owner can assume that the data has been tampered with and take appropriate action.
The CPDP model provides a way for data owners to ensure that their data remains secure
and available even when it is stored on remote servers or cloud storage.
FRAGMENT STRUCTURE OF
CPDP
The fragment structure of the Cooperative Provable Data Possession (CPDP) model is a way of dividing
the data into smaller, manageable pieces to allow for efficient processing and storage.
In the CPDP model, the data is divided into fixed-size blocks or fragments, which are typically a few
kilobytes in size. Each fragment is associated with a unique identifier, known as a fragment ID, which is
used to track and verify the fragment's integrity.
The data owner generates a set of cryptographic keys, including a set of secret keys and a set of
public keys, which are used to generate the proofs of possession (PoPs) for each fragment. The secret
keys are kept secret by the data owner, while the public keys are provided to the server for verification
To store the data on the remote server, each fragment is first encrypted using a symmetric encryption
algorithm, such as Advanced Encryption Standard (AES), with a unique key. The unique key for each
fragment is then encrypted using a public key encryption algorithm, such as RSA, with the server's
public key, and stored on the server along with the encrypted fragment.
When the data owner requests a set of challenges, the server selects a random set of fragments and
sends their corresponding fragment IDs to the data owner. The data owner uses their secret key to
compute the PoP for each selected fragment and sends them back to the server for verification. The
server then uses the corresponding public key to verify the PoP for each fragment and sends the result
back to the data owner.
If the server fails to provide the correct PoP for any fragment, the data owner can assume that the
corresponding fragment has been tampered with or deleted, and take appropriate action to ensure the
integrity and availability of their data.
Made by :
Hardikkumar P. Patel (21BT04141)
Janak M. Radadiya (21BT04094)
Preet H. Prajapati (21BT04094)
THANK YOU
CYBER
SECURITY

More Related Content

Similar to CYBER SECURITY.pdf

Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformredpel dot com
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemeEditor IJMTER
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 

Similar to CYBER SECURITY.pdf (20)

E045026031
E045026031E045026031
E045026031
 
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
50120130405028
5012013040502850120130405028
50120130405028
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 

Recently uploaded

An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryCeline George
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTraininfosec train
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxSanjay Shekar
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff17thcssbs2
 

Recently uploaded (20)

An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 

CYBER SECURITY.pdf

  • 1. HYBRID CLOUDS EFFICIENT PROVABLE DATA POSSESSION FOR YAN ZHU1,2, HUAIXI WANG3, ZEXING HU1, GAIL-JOON AHN4, HONGXIN HU4, STEPHEN S. YAU4 1INSTITUTE OF COMPUTER SCIENCE AND TECHNOLOGY, PEKING UNIVERSITY, BEIJING 100871, CHINA 2KEY LABORATORY OF NETWORK AND SOFTWARE SECURITY ASSURANCE (PEKING UNIVERSITY), MINISTRY OF EDUCATION 3SCHOOL OF MATHEMATICAL SCIENCES, PEKING UNIVERSITY, BEIJING 100871, CHINA 4ARIZONA STATE UNIVERSITY, TEMPE, AZ 85287, USA {YAN.ZHU,WANGHX,HUZX}@PKU.EDU.CN, {GAHN,HXHU,YAU}@ASU.EDU CYBER SECURITY
  • 2. CONTENT 01 02 03 04 05 06 WHAT IS HYBRID CLOUD ? COMPONENTS IN HYBRID CLOUD STORAGE CONSTRUCTION OF PDP SCHEMES IN HYBRID CLOUDS HASH INDEX HIERARCHY WHAT IS CPDP MODEL ? FRAGMENT STRUCTURE OF CPDP
  • 3. WHAT IS HYBRID CLOUD ? Hybrid cloud storage architecture is a combination of public and private cloud storage architectures. It is designed to provide organizations with the flexibility and scalability of public clouds while ensuring the security and privacy of private clouds. In a hybrid cloud storage architecture, data is stored and accessed from both public and private cloud storage infrastructures, allowing organizations to leverage the benefits of both environments.
  • 4. COMPONENTS IN HYBRID CLOUD STORAGE Private cloud storage: The private cloud storage component provides a secure, dedicated storage infrastructure within an organization's data center or on-premises environment. It is typically used to store sensitive or confidential data that needs to be protected from external threats. Public cloud storage: The public cloud storage component provides a scalable, cost-effective storage infrastructure that can be accessed over the Internet. It is typically used to store less sensitive data that needs to be accessed from anywhere and by anyone. Hybrid cloud storage gateway: The hybrid cloud storage gateway is a software or hardware appliance that connects the private and public cloud storage components. It provides a unified view of the entire storage infrastructure and allows data to be seamlessly moved between the two environments.
  • 5. Data migration tools: Data migration tools are used to move data between the private and public cloud storage components. They ensure that data is securely transferred between the two environments and that data integrity is maintained throughout the migration process. Security and compliance tools: Security and compliance tools are used to ensure that data stored in the hybrid cloud storage architecture is protected from unauthorized access, theft, or loss. They also help organizations comply with industry and government regulations related to data privacy and security. Data backup and disaster recovery: Data backup and disaster recovery are critical components of a hybrid cloud storage architecture. Organizations need to ensure that their data is backed up regularly and that they have a disaster recovery plan in place in case of a catastrophic event.
  • 6. CONSTRUCTION OF PDP SCHEMES IN HYBRID CLOUDS Provable Data Possession (PDP) schemes are cryptographic techniques used to ensure that a remote storage server has not tampered with or lost any data that has been entrusted to it by a client. Hybrid clouds, on the other hand, are cloud computing environments that combine both private and public clouds. PDP schemes can be constructed in hybrid clouds to provide a secure and reliable method for storing and retrieving data. There are several techniques that can be used to construct PDP schemes in hybrid clouds like, Replication-based, Encryption-based, and Erasure-coded PDP schemes. In all of these techniques, the PDP scheme is constructed in such a way that the data owner can verify the integrity and availability of their data without having to download the entire data from the remote server. This makes PDP schemes in hybrid clouds efficient, scalable, and secure, allowing for the reliable storage and retrieval of data in cloud computing environments.
  • 7. HASH INDEX HIERARCHY Hash index hierarchy is a data structure used in computer science to organize and access large amounts of data efficiently. It is a hierarchical structure that uses hash functions to map keys to specific locations in memory, allowing for fast retrieval of data. Here's a brief explanation of each layer of the Hash Index Hierarchy: First Layer (Express Layer): This layer provides an abstract representation of the stored resources. It is responsible for handling metadata and other non-data aspects of storage. The express layer typically consists of a database or index that allows for efficient searching and organization of stored data. Second Layer (Service Layer): The service layer promptly offers and manages cloud storage services. It serves as a bridge between the express and storage layers, providing a standardized interface for clients to interact with the storage system. The service layer is responsible for managing user authentication, access control, and resource allocation. Third Layer (Storage Layer): The storage layer directly realizes data storage on many physical devices. It consists of the physical infrastructure, including servers, storage devices, and network components, that stores and manages the data. The storage layer is responsible for data replication, backup, and recovery, ensuring that data is always available and protected.
  • 8. WHAT IS CPDP MODEL ? The Cooperative Provable Data Possession (CPDP) model is a method of ensuring the integrity and availability of data stored in a remote server or cloud storage. It is designed to address security concerns that arise when individuals or organizations store their data on remote servers that are not under their direct control. The data owner generates a set of cryptographic keys that are used to create a proof of possession (PoP) for each block of data that is stored on the remote server. The PoP is a small piece of data that can be used to verify that the corresponding block of data has not been tampered with or deleted. The data owner requests that the server provides a set of challenges that require the server to provide PoPs for random blocks of data stored on the server. The server must provide the correct PoP for each block in order to prove that the data has not been tampered with or deleted. If the server fails to provide the correct PoP for any block, the data owner can assume that the data has been tampered with and take appropriate action. The CPDP model provides a way for data owners to ensure that their data remains secure and available even when it is stored on remote servers or cloud storage.
  • 9. FRAGMENT STRUCTURE OF CPDP The fragment structure of the Cooperative Provable Data Possession (CPDP) model is a way of dividing the data into smaller, manageable pieces to allow for efficient processing and storage. In the CPDP model, the data is divided into fixed-size blocks or fragments, which are typically a few kilobytes in size. Each fragment is associated with a unique identifier, known as a fragment ID, which is used to track and verify the fragment's integrity. The data owner generates a set of cryptographic keys, including a set of secret keys and a set of public keys, which are used to generate the proofs of possession (PoPs) for each fragment. The secret keys are kept secret by the data owner, while the public keys are provided to the server for verification To store the data on the remote server, each fragment is first encrypted using a symmetric encryption algorithm, such as Advanced Encryption Standard (AES), with a unique key. The unique key for each fragment is then encrypted using a public key encryption algorithm, such as RSA, with the server's public key, and stored on the server along with the encrypted fragment.
  • 10. When the data owner requests a set of challenges, the server selects a random set of fragments and sends their corresponding fragment IDs to the data owner. The data owner uses their secret key to compute the PoP for each selected fragment and sends them back to the server for verification. The server then uses the corresponding public key to verify the PoP for each fragment and sends the result back to the data owner. If the server fails to provide the correct PoP for any fragment, the data owner can assume that the corresponding fragment has been tampered with or deleted, and take appropriate action to ensure the integrity and availability of their data.
  • 11. Made by : Hardikkumar P. Patel (21BT04141) Janak M. Radadiya (21BT04094) Preet H. Prajapati (21BT04094) THANK YOU CYBER SECURITY