Professional Documents
Culture Documents
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013
Abstract
Cloud Computing refers to both the applications
Cloud computing has become a significant technology delivered as service over the Internet and the hardware
trend. The boom in cloud computing has brought lots of and systems software in the datacenters that provide
security challenges for the consumers and service those services. The services themselves have long been
providers. This study aims to identify the most referred to as Software as a Service (SaaS), Platform as
vulnerable integrity threats in cloud computing. In a Service (PaaS), Infrastructure as a Service (IaaS). A
order to achieve a secure and dependable cloud cloud storage system, consisting of a collection of
storage service, a flexible distributed storage integrity storage servers, provides long-term storage services
auditing mechanism, utilizing the homomorphic token over the Internet having properties:
T
and distributed erasure coded data, is used. The On-demand Services.
auditing result not only ensures strong cloud storage Hardware management is abstracted from
SR
correctness guarantee, but also simultaneously the customers.
achieves fast data error localization and further Infrastructure capacities are elastic and
supports secure and efficient dynamic operations on can easily scale up and down.
IJC
IJCSRTV1IS050077 www.ijcsrt.org 58
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013
IJCSRTV1IS050077 www.ijcsrt.org 59
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013
challenge made will specify a particular file row index. most frequent append operation in cloud data storage is
bulk append, in which the user needs to upload a large
3.4. File Retrieval & Error Recovery number of blocks (not a single block) at one time.
Once the data corruption is detected, next important
step is to recover the corrupted data and bring data 4.4. Insert
storage back to consistent state. User can recover the An insert operation to the data file refers to an
corrupted data from those servers who sent correct append operation at the desired index position while
response. The newly recovered blocks can then be maintaining the same data block structure for the whole
redistributed to the misbehaving servers to maintain the data file, i.e., inserting a block F[j] corresponds to
correctness of storage. shifting all blocks starting with index j + 1 by one slot.
Thus, an insert operation may affect many rows in the
3.5. Third Party Auditing logical data file matrix F, and a substantial number of
The correctness validation and misbehaving server computations are required to renumber all the
identification for TPA is just similar to the previous subsequent blocks as well as re-compute the challenge-
scheme. The only difference is that TPA does not have response tokens. Hence, a direct insert operation is
to take away the blinding values in the servers’ difficult to support.
response but verifies directly. As TPA does not know
the secret blinding key, there is no way for TPA to
learn the data content information during auditing
process. Therefore, the privacy preserving third party
auditing is achieved.
IJCSRTV1IS050077 www.ijcsrt.org 60
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013
6. Conclusion
In this paper the problem of data security in cloud
data storage (which is essentially a distributed storage
system) is investigated. To achieve the assurances of
cloud data integrity and availability and enforce the
quality of dependable cloud storage service for users,
an effective and flexible distributed scheme with
explicit dynamic data support, including block update,
delete, and append is proposed. This relies on erasure-
Figure 4. Logical Representation of Data Dynamics correcting code in the file distribution preparation to
provide redundancy parity vectors and guarantee the
data dependability. By utilizing the homomorphic
token with distributed verification of erasure-coded
5. Performance Analysis
data, this scheme achieves the integration of storage
In order to make the performance evaluation of
correctness insurance and data error localization. It also
the research work, we have to study the influence of
provides the extension to support third-party auditing.
following factors:
Through detailed security and extensive experiment
number of misbehaving servers, ns
results, it is shown that the scheme is highly efficient.
number of challenges required, nc
file size, F
number of blocks modified, nb
7. References
[1] Balakrishnan.S, Saranya.G, Shobana.S, Karthikeyan.S,
“Introducing Effective Third Party Auditing (TPA) for Data
T
Storage Security in Cloud,” in IJCST Vol. 2, Issue 2, June
SR
2011.
[2] Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing
Lou, “Towards Secure and Dependable Storage Services in
Cloud Computing ,” IEEE T. Services Computing 5(2): 220-
IJC
232 (2012)
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring
data storage security in cloud computing,” in Proc. of
IWQoS’09, July 2009, pp.1–9.
Figure 5. The detection probability against data [4] Michael Armbrust, Armando Fox, Rean Griffith,
modification with ns=1 Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho
Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei,
“Above the Clouds: A View of Cloud Computing,” UC
Berkeley Reliable Adaptive Distributed systems Laboratory
7
(RAD Lab).
6 [5] Venkatesha Kumar, Poornima G, “Ensuring Data
5
Conclusion Integrity in Cloud Computing,” EICA2012-4, February, 2012.
4
[6] Dalia Attas, Omar Batrafi, “Efficient Integrity Checking
1 KB
10KB
Technique for Securing Client Data in Cloud Computing,”
3
20 KB IJECS-IJENS Vol: 11 No: 05.
2 [7] S P Jaikar, M V Nimbalkar, “Securing Cloud Data
1
Storage,” ISSN: 2278-0661, Vol: 1, Issue 6, July 2012
[8] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
0
1 2 3 “Enabling Public Verifiability and Data Dynamics for
Storage Security in Cloud Computing,” in Proc. of
ESORICS’09, volume 5789 of LNCS. Springer- Verlag, Sep.
Figure 6. The detection probability 2009, pp. 355–370.
against data modification with nc=1 [9] M. A. Shah, M. Baker, J. C. Mogul, and R.
Swaminathan, “Auditing to Keep Online Storage Services
Honest,” in Proc. of HotOS’07. Berkeley, CA, USA:
USENIX Association, 2007, pp. 1–6.
[10] Kayalvizhi S, Jagadeeswari S, “Data Dynamics for
Storage Security and Public Auditability in Cloud
Computing,” Journal of Computer Applications ISSN: 0974 –
1925, Volume-5, Issue EICA2012-1, February 10, 2012.
IJCSRTV1IS050077 www.ijcsrt.org 61