Secured Way To Store Data Cloud Computing

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract- Cloud storage helps us to store data remotely without the help of the hardware locally and software management. Though it has some benefits of outsourced data, it also has some risks on correctness of data present in the cloud. To remove this problem we proposed a method called as a flexible integrity auditing mechanism in distributed storage. It uses the homomorphic token and Erasure-coded data. This method allows us to audit data of very lightweight communication and computation cost. This method not only achieves fast data error localization but also guarantees strong cloud storage. It also supports efficient dynamic operations on outsourced data, including deletion, block modification and append. This is more effective for finding the Byzantine failure, ever server colluding and Data modification attack.

Keywords- Error localization, cloud computing, data integrity, dependable storage, data dynamics

INTRODUCTION

Cloud computing includes several trends till now, which act as an internal-based development. The processors together along with the software converting the data centers into computation service. The high technologies and network bandwidth help the users to subscribe high quality data from remote [1].

Data movement provides great convenience and not focusing on direct hardware management, examples are Amazon simple storage service[2]. This service provides high access of storage space but reducing the data maintenance of the local machine. As a result, they want some integrity of data. However, the clouds are much powerful in comparing with the personal computing devices. The integrity of data still exists [3].

A Cloud service provider (CSP) discards the data which were rarely accessed to reduce the profit margin by cost. It may also hide data to maintain a reputation. Thus outsourcing of cloud is always attractive. Economically, it reduces strong data integrity.

Thus to improve the data integrity we have to provide some efficient methods of data verification and correctness. We can use the direct adoption of cryptography to data integrity. Data files should not be included in security. It’s not a third party warehouse. The data are always updated by the users beyond of accessing it. Thus we must also consider the updated data in the storage correctness. Users can store the data redundantly in many servers for providing data integrity and the correctness. This is provided by cloud deployment [3-5].

We are implementing a flexible and effective method of storage along with dynamic storage. Correcting code in distributed files guarantees the dependent of data in Byzantine servers. When a server fails this construction reduces the communication overhead when compared to traditional methods. By using the homomorphic token along with distributed verification we reduce the data error localization or misbehaving of servers. The algebraic property of token is also used for erasure-coded data. Third party auditing is used for the time and resource computation, which helps users to delegate integrity checking. Thus the users will become worry free to use the cloud services [6-8].

Cloud computing system relinquishing user’s physical control their outsourced data, which necessarily poses new level security risks towards the data correct in the cloud. In existing system privacy data will be stolen by network. This cause the identification of misbehaving server [9].

EXISTING SYSTEM TECHNIQUE

The existing technique is client cloud computing which is nothing but the user has been storing the data in the cloud and downloads the data from some other place. So the attackers have been changing the content of the data in the cloud [5].

EXISTING SYSTEM DRAWBACKS

Privacy data will be lost or stolen by anonymous server

The Cloud computing system easily undergoes against malicious data as well as Byzantine failure and data modification attacks.

EXISTING CONCLUSION

In this Existing concept, we have stored the data in cloud with less security level. So the privacy data will be lost or stolen by anonymous server [7]. The Cloud computing system easily undergoes against malicious data as well as Byzantine failure and data modification attacks.

PROPOSED SYSTEM

In proposing system, we utilizing a homomorphic token with a distributed verification scheme of erasure-coded data, we achieves the integration of data error location and storage correctness. It is flexible and effective dynamically distributed data support for deleting, updating and appending data in the cloud storage.

SCOPE OF THE PROJECT

We provide the solution for storing data in a secured way. It ensures the cloud data integrity and quality of cloud storage. It is flexible and effective dynamically distributed data support for deleting, updating and appending data in the cloud storage.

Figure 1. Cloud System Framework

PROPOSED SYSTEM ALGORITHM

Trusted global identity framework providing global interoperability and enabling informed trust decisions on organizations, people and digital entities in the Future Internet. Enabling privacy protection in accordance with EU culture.

Transparency and Accountability of data use in processes, services and policies in ICT systems.

Sound risk management for enterprises and consumers (there is no 100% security).

Governance based on these principles to law enforcement and citizen/infrastructure security.

CHALLENGE TOKEN PRE-COMPUTATION:

In order To give authority of data storage rightness and data error localization at the same time , our project is fully dependents on the pre-computed verification token. The main idea is that :before the process of file distribution the user will pre-computes the correct number of short verification token on individual vector G(j) (j E {1,…., n}), each token has no specific pattern and will cover a random subset of data blocks. After that, when the user wants to check whether the data are stored in a correct manner , he will check the server has a set of block indices which are randomly generated. While checking, each cloud server will calculate a short ’signature’ over the specified blocks and will give to the particular user. The generated values of the signatures should match for the suited token pre-computed by the user. At the same time , as the servers operate with the same subset of the indices, the formally asked values for check integrity,the check must also be an actual codeword processed by the secret matrix P.

In order to ensure the correctness of the data storage in the cloud storage with the time t is impossible by the user. So that the user must ensure the pre-compute t verification tokens for every G(j) (j {1, …, n}), using a PRF f(•), a PRP a challenge key that is kchal and a master permutation key is KPRP.

1) A random challenge value αi of GF(2p) derived by αi = fkchal (i) and a permutation key

based on KPRP.

2) Set of random choosing indices are computed and represented as are,

{Iq ∈ [1, ..., l]|1 ≤ q ≤ r},where Iq = .

3) Calculate the value of Vi:

where =

The user expects , as the response from the server j while challenging for the specified data blocks, where , is the small size element of GF(2P).

The user can have the option to store the encrypted tokens in the cloud or they can also keep the precomputed tokens locally. In our project we store the tokens locally in order to avoid encryption which in turn reduce the bandwidth overhead during dynamic operation.

PROPOSED SYSTEM ADVANTAGE

Security enhanced in cloud data storage.

Identification of the misbehaving server(s).

This scheme is highly efficient and resilient to Byzantine failure, malicious data modification attack.

PROPOSED SYSTEM APPLICATION

Banking

Cloud Backup

Cloud Computing Risk Assessment

Google Apps and Government

COMPARISON BETWEEN EXISTING AND PROPOSED SYSTEMS

Existing Technique

Proposed technique

Privacy data will be lost or stolen by anonymous server which inevitably poses new security risks towards the correctness of the data in the cloud.

Privacy is ensured data security which is a protecting the information and the information systems from the unauthorized access.

The Cloud computing system easily undergoes against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Identification of the misbehaving server. This scheme is to be Byzantine failure, malicious data modification attack using the MD5 algorithm.

Users may not retain a local copy of outsourced data, there exist various incentives for cloud service providers (CSP) to behave unfaithfully towards the cloud users regarding the status of their outsourced data.

Owner of the natural required stragical infrastructure facilities to provide access to the parties except their customer.

Storage correctness is difficult to identify in client side. Error correction and error detection are difficult to determine in client side.

Ensure the data correctness surely their data not modified by unauthorized persons. It locate fastly the misbehaving servers.

One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise and/or random Byzantine failures.

In the distributed case the unwanted data are detected successfully then it recovers the data and it will intimate to the user.

Difficult way to store the data in cloud because the storage correctness is the Heavy weight to users handle

Lightweight to provide the users to perform data correctness in the storage check service provider which is used for third party auditing purpose using a token generation algorithm.

Working Procedure

STEP1: The user first register to access the data.

STEP2: After the register third party auditor generates the token for the user.

STEP3: Using that token the user can upload the file in the cloud service provider.

STEP4: If the content is modified in the third party auditor will intimate to the user. Because the every transaction should be transferred through the third party auditor only.

STEP5: The third party auditor[TPA] utilize the homomorpic token. If any file you want to upload the file TPA generate the homomorphic token. If an attacker tries to attack the content the homomorphic token is matched if it is not match it will intimate the user to retrieve the data from the cloud space.

Conclusion

In traditional model the user stores the data in one place of cloud and download it from another place. So the attacker may easily change the data. In this paper we clearly investigate the problem and overcome by utilizing homomorphic token and third party auditor. By utilizing the homomorphic token with distributed verification of erasure-coded data, our schemes achieve the integration of storage correctness insurance and data error localization. Then utilizing the distributed erasure-coded data homomorphic token, the user can access the cloud with very lightweight communication. This is also quickly locate the misbehaving servers. This is more secure and effective dynamic operations such as deletion, data modification and updating. In future, By using the homomorphic token and with distributed verification of erasure-coded data, our schemes achieve the integration of data correctness in the storage with insurance and immediate data error localization.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now