Proficient Public Substantiation of Data Veracity for Cloud Storage through Dual Protection

Authors

  • Ajay Kannan B  Department of CSE, KVCET, Kodambakkam, Chennai, India

Keywords:

cloud computing, encryption

Abstract

ABSTRACT-The cloud security is one of the important roles in cloud, here we can preserve our data into cloud storage. More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. Not only stored also the content will be encrypted in the cloud server. If anyone try to hack at the cloud end is not possible to break the two different blocks. The security of our scheme under the strongest security model. They need first decrypt the files and also combine the splitted files from three different locations. This is not possible by anyone. Anyone can download the files from the server with file owner permission. At the time of download key generated (code based key generation) and it will send to the file owner. We can download the file need to use the key for verification and some other users want to download file owner permission is necessary.

References

  1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of CCS. ACM, 2007, pp. 598-609.
  2. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of SecureComm. ACM, 2008.
  3. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in computing,” in Proceedings of INFOCOM. IEEE, 2010, pp. 19.
  4. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in computing,” IEEE Transactions on Parallel and Cloud Systems, vol. 22, no. 5, pp. 847-859, 2011.
  5. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in computing,” IEEE Transactions on Parallel and Cloud Systems, vol. 24, no. 9, pp. 1717-1726, 2013.
  6. M. Sookhak, A. Gani, H. Talebian, A. Akhunzada, S. U. Khan, R. Buyya, and A. Y. Zomaya, “Remote data auditing in computing environments: A survey, taxonomy, and open issues,” ACM Computing Surveys, vol. 47, no. 4, 2015.
  7. Y. Cui, Z. Lai, X. Wang, N. Dai, and C. Miao, “Quicksync: Improving synchronization efficiency for mobile storage services,” in Proceedings of MobiCom. ACM, 2015, pp. 592-603.
  8. S. Garg, C. Gentry, S. Halevi, M. Raykova, A. Sahai, and B. Waters, “Hiding secrets in software: A cryptographic approach to program obfuscation,” Communications of The ACM, vol. 59, no. 5, pp. 113-120, 2016
  9. H. Li, D. Liu, Y. Dai, and T. H. Luan, “Engineering searchable encryption of mobile networks: When qoe meets qop,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74-80, 2015.
  10. H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. Shen, “Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312-325, 2016.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Ajay Kannan B, " Proficient Public Substantiation of Data Veracity for Cloud Storage through Dual Protection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.107-117, January-February-2018.