Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. Cloud Computing reduces cost by allocate computing and storage resources, complex with an on demand provisioning mechanism relying on a pay per use business model. The User doesn’t have to worry about storage and maintenance of cloud data. As the data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on cloud. Users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data. Specifically, our contribution in this work can be summarized as the following aspects: Stimulate the public auditing system of data storage security in Cloud Computing and provide a privacy preserving auditing protocol, i.e., our proposal supports an external auditor to audit user’s outsourced data in the cloud without learning information on the data content. In Our scheme is the first to support scalable and capable public auditing in the Cloud Computing. In exacting, our scheme achieves batch auditing where several delegated auditing tasks from different users can be performed concurrently by the TPA.
Keywords |
Cloud Computing, Cloud Storage, Privacy Preserving, Public Auditing, TPA, Batch Auditing |
INTRODUCTION |
Cloud computing is the next stage in the Internet's evolution, providing the means through which everything from
computing power to computing infrastructure, applications, business processes to personal collaboration — can be
delivered as a service wherever and whenever need. Cloud Computing is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. |
Cloud Services |
Cloud computing is anything that involves services over the internet. These services are broadly classified into
three categories: software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). Cloud
software as a service (SaaS) is the on-demand service developed for end users; provider will license the software for their
own use. As the software is managed over the central location over the web, the user need not required to handle the
upgrades. E.g.- gmail. And the next service is cloud platform as a service (PaaS) is designed for the application developers,
which provide all the facilities for developing the web applications easily with more features without the complexity of
buying and maintaining the software and the infrastructure. E.g.-Google App Engine. Finally the cloud infrastructure as a
service (IaaS) is way of delivering the cloud computing infrastructure which provisions the storage, service and network. |
As it is fully outsources service it is not necessary to purchase the server, software and other equipments for the business
and the service providers benefit from cost saving. |
Cloud Storage |
Cloud storage is an important service of cloud computing, which allows data owners (owners) to move data
from their local computing systems to the cloud. More and more owners start to store the data in the cloud. However, this
new paradigm of data hosting service also introduces new security challenges. Owners would worry that the data could be
lost in the cloud. This is because data loss could happen in any infrastructure, no matter what high degree of reliable
measures cloud service providers would take. Sometimes, cloud service providers might be dishonest. They could discard
the data which has not been accessed or rarely accessed to save the storage space and claim that the data are still correctly
stored in the cloud. Therefore, owners need to be convinced that the data are correctly stored in the cloud. |
In existing system, the clients store the data in server that server is trustworthy and after the third party auditor can
audit the client files. So, the third party auditor can stolen the files. The main Disadvantage of the Existing system can
support both features with the help of a third party auditor. Consider a cloud storage system in which there are a client and
an untrusted server. The user stores their data in the server without keeping a local copy. Hence, it is of critical importance
that the client should be able to verify the integrity of the data stored in the remote untrusted server. If the servers modify
any part of the client’s data, the user should be able to detect it; furthermore, any third party auditor should also be able to
detect it. In case a third party auditor verifies the integrity of the client’s data, the data should be kept private against the
third party auditor. Advantages of the proposed scheme have the following main contributions: Remote data integrity
checking protocol for cloud storage. The proposed system inherits the support of data dynamics, and supports public
verifiability and privacy against third-party verifiers, while at the same time it doesn’t need to use a third-party auditor.
Data correctness and security analysis of the proposed system which shows that data is secure against the untrusted cloud
service provider and private against Third Party Auditor. |
THE SYSTEM AND HAZARD MODEL |
We consider a cloud data storage service connecting three different network entities, the cloud user (U), who has
bulky amount of data files to be stored in the cloud; the cloud server (CS), which is managed by the cloud service provider
(CSP) to provide data storage service and has significant storage space and computation resources, the third party auditor
(TPA), who has knowledge and capabilities that cloud users do not have and is trusted to assess the cloud storage service
dependability on behalf of the user upon call. Users rely on the CS for cloud data storage and Protection. They may also
dynamically interact with the CS to access and update their stored data for various application purposes. To save the
computation resource as well as the online burden, cloud users may resort to TPA for ensuring the storage integrity of their
outsourced data, while hoping to keep their data private from TPA. Namely, in most of time it behaves correctly and does
not move away from the prescribed protocol execution. However, for their own benefits the CS might ignore to keep or
purposely delete rarely accessed data files which belong to normal cloud users. Moreover, the CS may decide to hide the
data corruptions caused by server hacks or Byzantine failures to continue reputation. We assume the TPA, who is in the
production of auditing, is reliable and independent, and thus has no incentive to collude with either the CS or the users
during the auditing process. However, it harms the user if the TPA could learn the outsourced data after the audit. To
authorize the CS to respond to the audit delegated to TPA’s, the user can sign a certificate granting audit rights to the
TPA’s public key, and all audits from the TPA are authenticated against such a certificate. These authentication handshakes
are omitted in the following presentation. |
DESIGN GOALS |
To enable privacy-preserving public auditing for cloud data storage under the aforementioned model, our protocol
design should achieve the following security and performance guarantees. |
A. Public Audit ability: to permit TPA to validate the correctness of the cloud data on demand without retrieving a copy of
the whole data or introducing additional online burden to the cloud users. |
B. Storage accuracy: to ensure that there exists no cheating cloud server that can pass the TPA’s audit without indeed
storing users’ data intact. |
C. Privacy-preserving: to guarantee that the TPA cannot derive users’ data content from the information collected during
the auditing process. |
D. Group auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations
from possibly large number of different users simultaneously. |
E. Lightweight: to permit TPA to do auditing with minimum communication and computation overhead. |
PRIVACY PRESERVING DATA INTEGRITY CHECKING |
A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability make use
of a Remote Data Integrity Checking Protocol. The protocol provides public verifiability without the help of a third party
auditor. It doesn’t leak any privacy information to third party, which provides good performance without the support of the
trusted third party and provides a method for independent arbitration of data retention contracts. But it gives unnecessary
computation and communication cost. |
A. The public auditing protocol: To achieve privacy-preserving public auditing, we propose to uniquely integrate the
homomorphic linear authenticator with random masking technique. In our protocol, the linear combination of sampled
blocks in the server’s response is masked with randomness generated by the server. Our design makes use of a public keybased
HLA, to equip the auditing protocol with public auditability. |
HOMOMORPHIC ENCRYPTION |
Homomorphic Encryption systems are used to perform operations on encrypted data without knowing the private
key (without decryption), the client is the only holder of the secret key. When we decrypt the result of any operation, it is
the same as if we had carried out the calculation on the raw data. Definition: An encryption is homomorphic, if: from
Enc(a) and Enc(b) it is possible to compute Enc(f (a, b)), where f can be: +, × and without using the private key. Among
the Homomorphic encryption we distinguish, according to the operations that allows to assess on raw data, the additive
Homomorphic encryption (only additions of the raw data) is the Pailler and Goldwasser-Micalli cryptosystems, and the
multiplicative Homomorphic encryption (only products on raw data) is the RSA and El Gamal cryptosystems. |
CONCLUSION |
We propose a privacy-preserving public auditing system for data storage security in Cloud Computing. Cloud computing
security is a major issue that needs to be considered. Using TPA, We can verify the correctness and integrity of data stored
on a cloud. It uses public key based homomorphic linear authentication (HLA) protocol with random masking to achieve
privacy preserving data security. So client can trust on cloud storage service which is provided by cloud because TPA
works as a representative of data owner. We achieved zero knowledge privacy through random masking technique. It
supports batch auditing where TPA will handle multiple users request at the same time which reduces communication and
computation overhead. It also supports data dynamics. |
|
Figures at a glance |
|
|
Figure 1a |
Figure 1b |
|
|
References |
- C. Wang, Q. Wang, K. Ren, and W. Lou,âÃâ¬Ã Ensuring data storage security in cloud computing,âÃâ¬Ã in Proc. of IWQoSâÃâ¬Ãâ¢09, July 2009,pp.1âÃâ¬Ãâ9.
- C Wang, Sherman S. M. Chow, Q. Wang, K Ren and W. Lou, âÃâ¬ÃÅPrivacy-Preserving Public Auditing for Secure Cloud StorageâÃâ¬ÃÂ, IEEE Transaction on Computers I, vol. 62, no. 2, pp.362-375 , February 2013.
- P. Mell and T. Grance, âÃâ¬ÃÅDraft NIST working definition of Cloud ComputingâÃâ¬ÃÂ.
- Pearson, S. 2012. Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computing, 3-42.
- Q. Wang, C. Wang, Kui Ren, W.Lou and Jin Li, âÃâ¬ÃÅEnabling Public Auditability and Data Dynamics for Storage Security in Cloud ComputingâÃâ¬ÃÂ, in IEEE transaction on parallel and distributed system May 2011.
- C. Wang, Q. Wang and K. Ren, âÃâ¬ÃÅEnsuring Data Storage security in Cloud ComputingâÃâ¬ÃÂ, IEEE Conference Publication, 17th International Workshop on Quality of Service (IWQoS), 2009
- Balkrishnan. S, Saranya. G, Shobana . S and Karthikeyan .S, âÃâ¬ÃÅIntroducing Effective Third Party Auditing (TPA) for Data Storage Security in CloudâÃâ¬ÃÂ, International Journal of computer science and Technology, vol. 2, no. 2, ISSN 2229-4333 (Print) | ISSN: 0976-8491(Online), June 2012
- Maha TEBAA, SaÃÆïd EL HAJJI, Abdellatif EL GHAZI âÃâ¬ÃÅHomomorphic Encryption Applied to the Cloud Computing SecurityâÃâ¬Ã Proceedings of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K.
- AbhishekMohta, Lalit Kumar Awasti, âÃâ¬ÃÅCloud Data Security while using Third Party AuditorâÃâ¬ÃÂ, International Journal of Scientific & Engineering Research, Volume 3, Issue 6, ISSN 2229-8 June 2012.
- K Govinda, V. Gurunathprasad and H. sathishkumar, âÃâ¬ÃÅThird Party Auditing for Secure Data Storage in Cloud Thr
|