This document outlines a presentation on public auditing for secure cloud storage. It discusses the objective of developing a system to allow cloud users to ensure their data is secure and not corrupted. It covers topics like introduction to cloud computing, literature review on existing methods, problem description, the proposed method, applications, discussion of base paper, execution tools, and conclusions. The proposed method aims to enable public auditing of cloud storage without requiring local data copies, providing privacy and efficiency.
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
The ATM detail security using image Steganography is an application through which the confidential information related to the details of the ATM is maintained. This application will involve 3 steps authentication that will be done with great ease through the use of this application.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
The ATM detail security using image Steganography is an application through which the confidential information related to the details of the ATM is maintained. This application will involve 3 steps authentication that will be done with great ease through the use of this application.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
These slides use concepts from my (Jeff Funk) course entitled Biz Models for Hi-Tech Products to analyze the business model for Singapore Telecom’s Cloud Storage System Service. Storing recorded videos from a cable TV service on the cloud can provide users with more value than can storing them on a set-top box. Users can access them from any device and they don’t need to purchase an expensive set-top box. Storing the recording videos in the cloud also provides advertisers with more value because data on when and how often users access the videos can be made available to advertisers. These slides describe the specific value proposition for viewers and advertisers and other aspects of the business model such as the method of value capture, scope of activities, and method of strategic control.
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
Securing the digital landscape is paramount in our interconnected world. This abstract delves into the fundamentals of cyber security, exploring its vital role in safeguarding individuals, organizations, and nations against the pervasive threat of cybercrime. It examines the evolving challenges posed by cyber threats, from sophisticated attacks to emerging vulnerabilities, while elucidating practical strategies to mitigate risks and fortify defenses. Through an exploration of cybercrime's multifaceted nature, coupled with insights into the latest antivirus and firewall technologies, this abstract equips readers with essential knowledge to navigate the digital realm safely and responsibly.
In today's interconnected world, the protection of digital assets is paramount. This abstract serves as a deep dive into the foundational principles and advanced strategies of cyber security, illuminating its indispensable role in safeguarding individuals, organizations, and nations against the ever-looming specter of cybercrime. Beginning with an exploration of cyber security's core tenets, including confidentiality, integrity, and availability, readers are introduced to the fundamental principles that underpin effective defense strategies. Through insightful analysis and real-world examples, the abstract highlights the critical importance of maintaining these principles in the face of evolving cyber threats.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
The cloud user can remotely access software, services, application whenever they require over the
internet. The user can put their data remotely to the cloud storage. So, It is necessary that the cloud must have to
ensure data integrity and privacy of data of user.
The security is the major issue about cloud computing. The user may feel insecure for storing the data in
cloud storage. To overcome this issue, here we are giving public auditing mechanism for cloud storage. For this,
we studied Oruta system that providing public auditing mechanism. Revocation is all about the problems with
security occur in system. And we are revoked these many problems from the system. We are also revoking
existing members and adding new members in a group. In this way, we overcome the problem of static group. In
this system, TPA is Third Party Auditor which maintains all the log credentials of user and it verifies the proof of
data integrity and identity privacy of user. So, TPA plays a very important role in our system. Here we defining
statement of our model as,“Privacy Preserving using PAM in Cloud Computing ”.
.Keywords: Cloud Service Provider, Provable Data Possesion, Third Part Auditor, Public Auditing, Identity
Privacy, Shared Data, Cloud Computing.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
Similar to PUBLIC AUDITING FOR SECURE CLOUD STORAGE (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
1. PUBLIC AUDITING
FOR SECURE CLOUD STORAGE
Anand K Menon[MTALECS004 ]
Bharath Chandran Nair[MTALECS015]
Godwin C Antony[MTALECS025]
Eighth semester B.Tech CSE, Department of Computer Science,
Met’s School of Engineering,Mala,
Under the Guidance of
Miss.Asha S
Assistant Professor, Dept. of CSE,
Met’s School of Engineering,Mala
2. OUTLINE OF THE PRESENTATION
o OBJECTIVE
o INTRODUCTION
o LITERATURE SURVEY
o EXISTING METHOD
o PROBLEM DESCRIPTION
o BLOCK DIAGRAM
o PROPOSED METHOD
o APPLICATIONS
o RESULT AND DISCUSSION OF BASE PAPER
o EXECUTION TOOLS
o CONCLUSION
o REFERENCES
3. OBJECTIVE
The objective of the system is to develop a system
that would enable the cloud users to have control
over their data so that they can ensure that their
data is secured and not corrupted.
It provides security to the users data by encrypting
the data and splitting up the file into small blocks for
storage.
Auditing the cloud storage without demanding a
local copy of data enables more efficiency.
4. INTRODUCTION
Cloud computing customers do not own a physical
infrastructure; rather they rent the usage from a third
party provider.
They consume resources as a service and pay only for
resources that they use.
Cloud computing comes in three forms: public clouds,
private clouds, and hybrids clouds.
Public clouds offer the greatest level of efficiency in
shared resources but are more vulnerable.
Private clouds offer the greatest level of security and
control, but they require the company to still purchase
and maintain all the software and infrastructure.
Hybrid cloud includes both public and private
options.The downside is that we have to keep track of
multiple different security platforms.
5. Cloud computing provides on demand self
services,location independent resource
pooling,rapid resource elasticity,usage based
pricing etc..
Challenge faced is security threats towards users
outsourced data.
Here the correctness of user data in the cloud is put
at risk.
CSP might reclaim storage for monetary reasons by
discarding rarely accesed data or even hiding data
corruption due to server hacks over byzantine
failures.
6. LITERATURE REVIEW
SL
.N
O
AUTHOR YEAR TITLE DESCRIPTION
1 P. Mell and T.
Grance
June 2009 DraftNISTworking
definitionofcloud
computing
Subscribers should identify the specific resources that are
suitable for migrating data into and out of clouds.
Resources could be services such as: (1) email, (2)
data repositories such as shared documents, or (3) systems that run in
virtualized environments.
2 M. Arrington December
2006
Gmail disaster: Reports
of mass email
deletions
Cloud Computing provides convenient on demand network access to
a shared pool of configurable computing
resources that can be rapidly deployed with the great efficiency and
minimal management overhead.
3 J. Kincaid December
2006.
MediaMax/TheLinkup
Closes Its Doors
To achieve the assurances of cloud data
integrity and availability and enforce the quality of
dependable cloud storage service for users, To
propose an effective and flexible distributed
scheme with explicit dynamic data support,
including block update, delete, and append.
7. LITERATURE REVIEW
S
L
.
N
O
AUTHOR YEAR TITLE DESCRIPTION
4 M.A.Shah,R.Swamina
than, and M. Baker
Oct.
2008
Privacy-preserving audit
and extraction of digital
contents
A growing number of online services, such as Google, Yahoo!,
and Amazon, are starting to charge users for their storage.
Customers often use these services to store valuable data such as
email, family photos and videos, and disk backups. Today, a
customer must entirely trust such external services to maintain
the integrity of hosted data and return it intact.
5 Q. Wang, C. Wang, J.
Li, K. Ren, and W.
Lou
Sep.
2009
Enabling publicverifiability
and data dynamics for
storage security in cloud
computing
Cloud Computing has been envisioned as the next-generation
architecture of IT Enterprise. It moves the application software
and databases to the centralized large data centers, where the
management of the data and services may not be fully
trustworthy.
6 G. Ateniese, S.
Kamara, and J. Katz
2009 Proofs of storage
fromhomomorphic
identification protocols
Proofs of storage (PoS) are interactive protocols allowing a client
to verify that a server faithfully stores a file. Previous work has
shown that proofs of storage can be constructed from any
homomorphic linear authenticator (HLA). The latter, roughly
speaking, are signature/message authentication schemes where
`tags' on multiple messages can be homomorphically combined
to yield a `tag' on any linear combination of these messages.
8. 8
BASIC SCHEME 1
MAC
key
File block
code
Message Authentication Code (MAC)
Block 1 Block nBlock 2 …
File is divided into blocks
Cloud
user
TPA
Block 1 Block n…Block 2
code 1 code n…code 2
-User computes the MAC of every file block
-Transfers the file blocks & codes to cloud
-Shares the key with TPA
Audit
-TPA demands a random number of
blocks and their code from CSP
-TPA uses the key to verify the
correctness of the file blocks
Drawbacks: -The audit demands retrieval of user’s data; this is not privacy-preserving
-Communication and computation complexity are linear with the sample size
EXISTING METHOD
9. 9
BASIC SCHEME 2
Block 1 Block n…Block 2
code 1 code n…code 2
code 1 code n…code 2
code 1 code n…code 2
Key 1
Key 2
Key s
…
user
Cloud
TPA
Block 1 Block m…Block 2
Setup
-User uses s keys and computes the MAC for blocks
-User shares the keys and MACs with TPA
Audit
-TPA gives a key (one of the s keys) to CSP and requests MACs for the blocks
-TPA compares with the MACs at the TPA
-Improvement from Scheme 1: TPA doesn’t see the data, preserves privacy
-Drawback: a key can be used once.
-The TPA has to keep a state; remembering which key has been used
-Schemes 1 & 2 are good for static data (data doesn’t change at the cloud)
10. PROBLEM DESCRIPTION
Audit cloud storage demanding local copy of data.
Violates the privacy-preserving guarantee.
Large communication overhead and time delay.
Band-width available between the TPA and the
cloud server is limited.
Auditor can modify user data.
Copy of user data on auditing side.
No data control on user side.
The number of times a particular data file can be
audited is limited by the number of secret key.
11. BLOCK DIAGRAM
U: cloud user has a large amount of data files to store in the cloud
CS: cloud server which is managed by the CSP and has significant
data storage and computing power (CS and CSP are the same in
this paper)
TPA: third party auditor has expertise and capabilities that U and
CSP don’t have. TPA is trusted to assess the CSP’s storage security
upon request from U
13. Consists of four algorithms (KeyGen, SigGen,
GenProof, VerifyProof)
KeyGen: key generation algorithm that is run by
the user
SigGen: used by the user to generate verification
metadata, which may consist of MAC, signatures or
other information used for auditing
GenProof: run by the cloud server to generate a
proof of data storage correctness
VerifyProof: run by the TPA to audit the proof
from the cloud server
14. 14
user KeyGen
Public key (sk)&
Secret key (pk)
Setup
SigGenuser
sk
Block 1 Block 2 Block n…
σ1 …σ2 σn
Block 1 Block n…Block 2
σ1 … σnσ2
1- User generates public
and secret parameters
2- A code is generated for
each file block
3- The file blocks and their codes
are transmitted to the cloud
Audit
-TPA sends a challenge
message to CSP
-It contains the position
of the blocks that will be
checked in this audit
GenProofCSP
Selected blocks in challenge
Aggregate authenticator
-CSP also makes a linear combination
of selected blocks and applies a
mask. Separate PRF key for each
auditing.
-CSP send aggregate authenticator &
masked combination of blocks to TPA
VerifyProofTPA
Masked linear combination of requested blocks
Aggregate authenticator
Compare the obtained Aggregate
authenticator to the one received from
CSP
15. PROPOSED METHOD
Public auditing scheme which provides a complete
outsourcing solution of data– not only the data
itself, but also its integrity checking
System consist of client and server side application
and website.
Effectively audit cloud storage without demanding
local copy of data.
Extensive security and performance analysis shows
provably secure and highly efficient.
Data conrtol in the hands of users only.
16. APPLICATIONS
Used in applications that require public auditing.
Can be used for batch auditing.
Application that ensures storage correctness.
28. DISCUSSION OF BASE PAPER
Objective of the Project
The objective of the system is to develop a system
that would enable the cloud users to have control
over their data so that they can ensure that their
data is secured and not corrupted.
Scope of the Project
“ Trusted Cloud Services” provides a security
solution to the cloud users. It ensures that the data
of the users that have been stored in a remote
server is secured and controlled.
29. Constraints
Only the registered users will be authorized to use the
service.
A trustworthy TPA is required to audit the storage.
Assumptions and dependencies
The project will not change in scope
The resources identified will be available upon request
Approved funding will be available upon request
Only the registered users can access the Website
Roles and tasks are predefined.
30. EXECUTION TOOLS
Hardware Requirements
Intel Pentium dual core processor or above
1 GB RAM
200 GB HDD
Other standard peripherals
Software Requirements
Operating system : windows XP
Tool: Netbeans IDE 6.1
Programming Package : Jdk.5.0
Database :MySQL
Server :Glassfish v2
31. CONCLUSION
The aim of the project is to develop a system that
would enable the cloud users to have control over
their data so that they can ensure that their data is
secured .
They can know whether there is any data loss or
corruption by logging into the website.
TPA would not learn any knowledge about the
data content stored on the cloud server during the
efficient auditing process.
TPA can perform multiple auditing tasks in a batch
manner for better efficiency.
Schemes are provably secure and highly efficient.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41. REFERENCE
P. Mell and T. Grance, “Draft NIST working definition of cloud
computing,” Referenced on June. 3rd, 2009 Online at
http://csrc.nist.gov/groups/SNS/cloud-computing/index.
html, 2009.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz,
A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica,
and M. Zaharia, “Above the clouds: A berkeley view of cloud
computing,” University of California, Berkeley, Tech.
M. Arrington, “Gmail disaster: Reports of mass email deletions,”
Online at http://www.techcrunch.com/2006/12/28/gmail-
disasterreports-of-mass-email-deletions/,December 2006.
J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” Online at
http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closes-
its-doors/, July 2008.
Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online
at http://status.aws.amazon.com/s3-20080720.html,2008.
42. S. Wilson, “Appengine outage,” Online at http://www.cio-
weblog.com/50226711/appengine outage.php, June 2008.
B. Krebs, “Payment Processor Breach May Be Largest Ever,”, Jan.
2009.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.
Peterson, and D. Song, “Provable data possession at untrusted
stores,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598–
609.
M. A. Shah, R. Swaminathan, and M. Baker, “Privacypreservingaudit
and extraction of digital contents,” Cryptology Print Archive, Report
2008/186, 2008.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public
verifiability and data dynamics for storage security in cloud
computing,” in Proc. of ESORICS’09, volume 5789 of LNCS.
Springer-Verlag, Sep. 2009, pp. 355–370.