IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Data Security Proofs in the Cloud Storage Prof.Harish Barapatre1, Mr.Rahul Katwe2, Mr.Rohit Tawade3,Mr.Rakesh Deshmukh4,Mr.Mangesh Pathak5 12345

Yadavrao Tasgaonkar Institute Of Engineering & technology 1

Professor, Computer Engineering,Mumbai University Kalyan, Maharashtra, India Email:[email protected] 2

Student, Computer Engineering,Mumbai University Ambernath, Maharashtra, India Email:[email protected]

3

Student, Computer Engineering,Mumbai University Alibag, Maharashtra, India Email:[email protected]

4

Student, Computer Engineering,Mumbai University Karjat, Maharashtra, India Email:[email protected]

5

Student, Computer Engineering,Mumbai University Karjat, Maharashtra, India Email:[email protected]

Abstract In cloud computing, data is moved to a remotely located cloud server. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). In order to overcome the threat of integrity of data, the user must be able to use the assist of a TPA. The TPA has experience in checking integrity of the data, that clouds users does not have, and that is difficult for the owner to check. The data in the cloud should be correct, consistent, accessible and high quality. The aim of this research is twofold 1) ensuring the integrity of the data and provides the proof that data is in secured manner. 2) Providing Cryptographic key to secure the data in the cloud. The proposed approach is been implemented and the test results are promising.

Keywords: Data integrity, Cryptography, TPA,Cloud storage.

1. Introduction Cloud storage is visualized pools where data and applications are stored which are hosted by the third party. Company, who desires to store their data in the cloud, buy or lease storage capacity from them and use it for their storage needs. Some of the cloud storage benefits are reduce costs, provide more flexibility, reduce IT management of hardware and data, reduce management of web applications through automated updates, and provide Mr.Mangesh Pathak, IJRIT

629

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

greater storage capacity. In spite of these benefits, “cloud” lack in some of the issues like data integrity, data loss, unauthorized access, privacy etc. Data Integrity is very important among the other cloud storage issues. Because data integrity ensured that data is of high quality, correct,Consistent and accessible. After moving the data to the cloud, owner hopes that their data and applications are in secured manner. But that hope may fail some times (i.e.) the owner’s data may be altered or deleted. In that scenario, it is important to verify if one’s data has been tampered with or deleted. To validate data, often a user must download the data. If the outsourced data is very large files or entire file systems, such downloading to determine data integrity may become prohibitive in terms of increased cost of bandwidth and time, especially if frequent data checks are necessary. This paper propose a method that, owner need not download the data or files to check the integrity and it provides the proofs that data is stored at a remote storage in the cloud is not modified by anyone and there by integrity of the data is assured. Some of the best examples for cloud storage are Amazon S3, Windows Azure Storage, EMC Atoms, Files Anywhere, Google Cloud Storage, Google App Engine Blob store, cloud by Apple. The remainder of the paper is organized as follows: Section two analyses about the cloud storage architecture and along with its characteristics. Section three of this paper briefly describes the proof of retrievability and role of Third party auditor (TPA). Section four is explaining how the data integrity is verified in the cloud. We concluded the paper in section five.

2. Cloud Storage The process of storing data in the remotely located cloud servers are said to be cloud storage. The Architecture of cloud storage as shown in fig. 1.

Fig. 1 Architecture of cloud storage

The cloud storage is better than all traditional storage methods because of the following reasons Companies do not need to install physical storage devices in their owndatacenter oroffices. Storage maintenance tasks, such as backup, and purchasingadditional storage device are offloaded to the Mr.Mangesh Pathak, IJRIT

630

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

responsibility of service provider, allowing organizations to focus on their core business. Companies need only payfor the storage they actually use. Some of the characteristics of cloud storage areas follows: Performance: In the internet, TCP c n controls theflow of data based on packet acknowledgements from the prior endpoint. But TCP is supreme for moving small amounts of data through the glob al Internet and it is not suitable if size of the data becomes larger. Cloud storage overcomes the above problem effectively. Manageability: Basically the main key focus of thecloud storage is maintenance. Clients itself store their data with them but it is too expensive when the data size is increased and also maintaining their data is not an easy task. For this reason, cloud storage must be self-managing to a large extent. Client stores their data on the cloud by this maintenance troublereduced. Availability: In cloud storage data areretrieved frequently, quickly and securely.One way to protect against threats to web applications and data is to deploy a Web applicationFirewallasasoftwaresolution.Noadditional hardware is required on the part of the cloud provider and it can be installed directly in web applications.When deployed correctly, aWebApplicationFire wall protects web applications and data from known threatsincludingPathTraversal,Remote Command Execution, and compromised server s. Butthe firewall must consume CPUcycles reading foreach packet, this process requiresmoreprocessing power, which become a bottleneck for the network.This meansapplicationfirewalls are lesssuited to real applications. But cloudstorageiswell suited for accessing huge size of fileand complicated real time application.

3.Literature Review In cloud computing enormous threats are raised. One of the threat is data privacy and integrity. A lot of researchers focused on proving data integrity in the cloud and introduce many solutions to decrease the threat of the data privacy and integrity. Calce says about cloud computing, putting everything into a single box will only make it easier for hackers. Moving to a virtual environment to save on costs automatically introduces fresh risk on top of existing risk. PriyaMetri and GeetaSarote. Introduce threat model to treat the privacy problem in cloud. One of the service is third party auditing because it notify the threats in cloud computing is tempering with the data in the cloud that interface with the unauthorized modification for data which leads to an effectiveness processers, data storage and data flow proofs of retrievability (POR) model proposed Juels & kaliski are among the few attempts to formulized the not on of “ remotely and reliably verifying the data integrity without retrieving the data file”. Archival network storage presents unique performance demands. File data are large and are stored at remote sites accessing an entire file is expensive in I/O host to the storage server and in transmitting a file across a network. Reading an entire archieve , even periodically, greatly limits the scalability of network stores. Further more, I/O incurred to establish data possession interface with on demand bandwidth to store an retrieve data. Previous solutions do not meet these requirements for providing data integrity.Some schemes provide a weaker guarantee by enforcing storage complexity moreover, all previous techniques require the server to access the entire the file, which is not feasible when dealing with large amount of data. This paper conclude that clients need to be able to verify that a server has retained file data without retrieving the data from the server and without having a server access the entire file. In the existing cloud storage system, the owner want to check the data integrity, he need to access the entire file so it’s expensive to the cloud server. Also transmitting the file across a network may consume high bandwidth. It’s further complicated for the owner of the data whose devices like Personnel Digital Assist and mobile phones. Because these devices can have only a limited amount of battery power, CPU power, storage capacity and communication bandwidth. Basically using cloud storage, the owner stores their files in the cloud. Owner can check over the data integrity by enabling a new role which is TPA [5] because it possesses experience capabilities that the customer does not. Third Party Auditors can understand the threats and they know best practices to identify the threats. Also they have the resources to check for process adherence and service quality. The TPA will be able to verify over any threats in online storage services that are represented in the cloud server. Thus, the user who owns the data can rely Mr.Mangesh Pathak, IJRIT

631

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

on the TPA to verify the data in the cloud without involving with the procedure. The encryption idea is based on scrambling the information that only the one who have the secret key can expose it by decryption. The encryption concept will not be enough to ensure the data integrity over the cloud. Sometimes TPA may modify file and upload it in cloud again

4. Proving the data integrity in cloud storage Juels and Kaliski [3] proposed a scheme called Proof of Retrievability (POR). Proof of retrievability means Verify the data stored by user at remote storage in the cloud is not modified by the cloud. POR for huge size of files named as sentinels. The main role of sentinels is cloud needs to access only a small portion of the file (F) instead of accessing entire file. Sravan and saxena[6] proposed a Schematic view of a proof of re-trievability based on inserting random sentinels in the data file. Semantic view of POR is shown in Fig. 2.

Fig.2 Schematic view of a POR The above architecture describes that, user (cloud client) likes to store a file (F) in the cloud server (archive). Before storing the file to the cloud, owner needs to encrypt the file in order to prevent from the unauthorized access.

Fig. 3 data security in cloud storage

Mr.Mangesh Pathak, IJRIT

632

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

Fig. 4 Owner Login form

The current section discusses various aspects that should be considered to achieve data integrity. Company who is wishes to go for cloud storage service must be an authorized user and register themselves as a client. For every authorized user the system will generate a security key. Secret key is used while owner needs to login see fig. 3 and 4. The owner can get the secret key either through offline see fig.5 (a) and (b) or online.

Fig. 5(a) Getting secret key while owner in offline

Fig. 5(b) Getting secret key If the owner is in online, the secret key is sent to their mail as shown at the figure 6(a) and (b) Mr.Mangesh Pathak, IJRIT

633

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

Fig. 6(a) Getting secret key while owner in online

Fig. 6(b) Getting secret key through mail. The proposed system ensures that unauthorized users are not permitted to login. The authorized client can upload the file into cloud. At the time of uploading the files into the cloud, the proposed system’s key generator generates an encryption key and sends to the owner. For every file which are uploaded in the cloud, TPA verifies it whether it is secured or not. This verification process can be done in two ways 1) direct verification and 2) download verification. Shown in figure 7 and figure 8.

Fig. 7 File verification form

Mr.Mangesh Pathak, IJRIT

634

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

Fig. 8 Two types of file verification In direct verification, TPA directly verified the file without the need of cryptographic key. In th download verification, cryptographic key is necessary to download the file. F or cryptographic key, TPA needs to send key request to the owner. Owner sent the key to the TPA to check the integrity of the file and sends report to the owner. Some times TPA may alter the file and upload the file again in the cloud. I f the TPA modified the file means cloud sent alert to the owner. Through this process integrity of the file identified and assured. Algorithm for cloud storage: File is denoted s 'F' Owner of data i s represented a s 'cc' C loud-server is denoted as 'cs' Secret-key is represented as S key and Encryption-key as Ekey begin If uservalue==Skey then Login:=true; else Report:=Invalid owner End if c s<--F'(F U Eke y); end; Algorithm for verification: TPA is used by 'cc' to verify the integrity Begin if verifyproof=direct then report:=direct access of file Else Return {1,0}<--verifyproof(Ekey) / outputs 1(TR E) if the integrity of the file is verified as correct, otherwise 0 (FALSE).*/

Mr.Mangesh Pathak, IJRIT

635

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 629- 636

5. Conclusion The next generation of cloud storage provides a new architecture to address the storage, management and analysis of fast-growing ma chine-generated data. This paper briefly explaining about the cloud storage, advantages along with its characteristics. The proposed system provides the proof of the data integrity and the owner can check the integrity if their data in efficient manner. If any modifications by the TPA, cloud will immediately intimate to owner of the file. So security and data integrity is secured properly. And it reduces the access time at the cloud server and reduce the cost of retrieving the file and bandwidth consumption across the network.

6. References [1]

Paul Zimski, “Cloud computing faces security store” in 2009.

[2]

Jiaxu and Ee-chienchang, “Towards efficientproofs of retrievibility in cloud storage”.

[3]

A. Juels and B.S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security.

[4]

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07.

[5]

Dalia Attas and Omar Batrafi “Efficient integrity checking technique for securing client data in cloud computing” in IJECS-IJENS, 2011.

Mr.Mangesh Pathak, IJRIT

636

Data Security Proofs in the Cloud Storage Data ... - IJRIT

In cloud computing, data is moved to a remotely located cloud server. Cloud ... Data Integrity is very important among the other cloud storage issues. .... The next generation of cloud storage provides a new architecture to address the storage, ...

1MB Sizes 5 Downloads 235 Views

Recommend Documents

Data Security Proofs in the Cloud Storage Data ... - IJRIT
Company, who desires to store their data in the cloud, buy or lease storage capacity from them ... Blob store, cloud by Apple. ... It's further complicated for the owner of the data whose devices like Personnel Digital Assist and mobile phones.

data integrity proofs in cloud storage pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. data integrity ...

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
important aspect of quality of service, Cloud. Computing inevitably poses ... also proposed distributed protocols [8]-[10] for ensuring storage .... Best practices for managing trust in private clouds ... information they're hosting on behalf of thei

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
Cloud computing provides unlimited infrastructure to store and ... service, paying instead for what they use. ... Due to this redundancy the data can be easily modified by unauthorized users which .... for application purposes, the user interacts.

Data Storage Security Model for Cloud Computing
CDO's signature for later verification. SearchWord .... cryptographic primitives such as digital signature which can be used to authenticate the CDO/CDU by CSP.

Data sharing in the Cloud using Ensuring ... - IJRIT
Sep 9, 2013 - where software objects that offer sensitive functions or hold sensitive data are responsible for protecting .... Log files should be reliable and tamper proof to avoid illegal insertion, deletion, and ..... attacker erase or tamper a re

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
Abstract:- In recent years, cloud computing has become a major part of IT industry. It is envisioned as a next generation in It. every organizations and industries ...

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
(TPA) to verify the correctness of the dynamic data stored in cloud. Here the .... analyze the audits (verification) performed by the verifier (TPA) and get a better ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 100-105. Vinitha Varghese ... In this paper, we address the ... Since cloud computing environment is constructed based on open architectures ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
using virtual infrastructure management (VIM) , a multi-cloud allows clients to easily ... These tools help cloud providers construct a distributed cloud storage ...

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
Authentication Forwarding Mechanisms to scale the usability of the servers by ... the broad range of both internal and external threats for data integrity [11].

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
stored in the cloud. By using the corresponding private key, the embedded data and the key can be extracted successfully from the cloud. This scheme ensures ...

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Enhancing Cloud Security Using Data Anonymization - Media12
Data Anonymization. Cloud Computing. June 2012. Enhancing Cloud Security Using Data. Anonymization. Intel IT is exploring data anonymization—the process ...

Enhancing Cloud Security Using Data Anonymization - Media12
Data Anonymization. Cloud Computing. June 2012. Enhancing Cloud Security Using Data. Anonymization. Intel IT is exploring data anonymization—the process ...

Secure the Cloud Storage and Recovery of Security Risks and ... - IJRIT
Now a day‟s rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost . Ensuring the ...

Secure the Cloud Storage and Recovery of Security Risks and ... - IJRIT
of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. ... In order to define cloud computing, it is first necessary to explain what is ... Software as a Service provides software or application which can be

Mobile data offloading (Android application) to cloud to save ... - IJRIT
save mobile phone energy by offloading to cloud. .... process/program or full virtual machine is migrated to the infrastructure, and then programmers do not have ...

Mobile data offloading (Android application) to cloud to save ... - IJRIT
Analyzing the intensive calculus dividing it in sub processes that are ... upload data on social networks, use online banking, find our way by using GPS and ...

Synchronized mirrored data in a data storage device
Jan 8, 2008 - Pat. No. 6,295,577 issued. Sep. 25, 2001, entitled “Disc storage system having a non volatile cache to store write data in the event of a power.

Synchronized mirrored data in a data storage device
Jan 8, 2008 - types of data storage devices, including hard-disc drives, optical drives (such as CDROMs), ZIP drives, ?oppy-disc drives, and many other types ...