Sanctioning Assestation of Retrievability in Cloud

Authors

  • M. Jangamreddy  Department of Computer Science, RIIMS College, Tirupathi, India
  • K. Sunitha  Department of Computer Science, RIIMS College, Tirupathi, India

Keywords:

Cloud Storage Server , Cloud Audit Server, Cloud Service Provider, Cloud Consumer

Abstract

Cloud computing plays an important role in data storing and accessing now-a-days. Cloud Service Brokers are acting as important meditators for transferring the data between cloud Service Providers and Cloud Consumers. Cloud Computing moves the appliance code and informationbases to the centralized massive data centers, where the management of the info and services might not be totally trustworthy. during this work, we tend to study the matter of ensuring the integrity of information storage in Cloud Computing. To reduce the procedure value at user aspect throughout the integrity verification of their information, the notion of public verifiability has been planned. However, the challenge is that the procedure burden is simply too immense for the users with resource-constrained devices to cypher the general public authentication tags of file blocks. To tackle the challenge, we propose a replacement cloud storage theme involving a cloud storage server and a cloud audit server, where the latter is assumed to be semi-honest. especially, we consider the task of permitting the cloud audit server, on behalf of the cloud users, to pre-process the info before uploading to the cloud storage server and later corroborative the data integrity. It outsources the significant computation of the tag generation to the cloud audit server and eliminates the involvement of user within the auditing and within the preprocessing phases. what is more, we tend to strengthen the Proof of Retrievabiliy model to support dynamic information operations, yet as guarantee security against reset attacks launched by the cloud storage server within the transfer part.

References

  1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA:ACM, 2007, pp. 598–609.
  2. A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584–597.
  3. H. Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT ’08: Proceedings of the 14th International
  4. Conference on the Theory and Application of Cryptology and Information Security. Berlin, Heidelberg: Springer-Verlag, 2008,pp. 90–107.
  5. K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: theory and implementation,” in Proceedings of CCSW 2009. ACM, 2009, pp. 43–54.
  6. M. Naor and G. N. Rothblum, “The complexity of online memory checking,” J. ACM, vol. 56, no. 1, pp. 2:1–2:46, Feb. 2009. [Online]. Available: http://doi.acm.org/10.1145/1462153. 1462155
  7. E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proceedings of ESORICS 2008, volume 5283of LNCS. Springer-Verlag, 2008, pp. 223–237.
  8.  M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008, http://eprint.iacr.org/.
  9. A. Oprea, M. K. Reiter, and K. Yang, “Space-efficient block storage integrity,” in In Proc. of NDSS 2005, 2005.
  10. T. S. J. Schwarz and E. L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in ICDCS ’06: Proceedings of the 26th IEEE InternationalConference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2006.
  11. Q. Wang, K. Ren, S. Yu, and W. Lou, “Dependable and secure sensor data storage with dynamic integrity assurance,” ACM Transactions on Sensor Networks, vol. 8, no. 1, pp. 9:1–9:24, Aug. 2011. [Online]. Available: http: //doi.acm.org/10.1145/1993042.1993051
  12. L. V. M. Giuseppe Ateniese, Roberto Di Pietro and G. Tsudik, “Scalable and efficient provable data possession,” in InternationalConference on Security and Privacy in Communication Networks(SecureComm 2008), 2008.
  13. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010, pp. 525–533.
  14. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” in SAC, 2011, pp. 1550–1557.
  15. Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability,” in CODASPY, 2011, pp. 237–248.
  16. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained access control system based on attribute-based encryption,” ESORICS, 2013.
  17. J. Li and K. Kim, “Hidden attribute-based signatures without anonymity revocation,” Information Sciences, vol. 180, no. 9, pp. 1681–1689, 2010.
  18. J. Li, C. Jia, J. Li, and X. Chen, “Outsourcing encryption of attribute-based encryption with mapreduce,” ICICS, 2012.
  19. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms of outsourcing modular exponentiations,” ESORICS, pp. 541–556, 2012.
  20. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEETrans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, 2012.
  21. H. Xiong, X. Zhang, D. Yao, X. Wu, and Y. Wen, “Towards endto- end secure content storage and delivery with public cloud,” in CODASPY, 2012, pp. 257–266.
  22. Q. Zheng and S. Xu, “Secure and efficient proof of storage with deduplication,” in CODASPY, 2012, pp. 1–12.
  23. C. Wang, Q. Wang, and K. Ren, “Ensuring data storage security in cloud computing,” in Proceedings of IWQoS 2009, Charleston, South Carolina, USA, 2009.
  24. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” Cryptology ePrint Archive, Report 2008/432, 2008, http://eprint.iacr.org/.
  25. X. Lei, X. Liao, T. Huang, H. Li, and C. Hu, “Outsourcinglarge matrix inversion computation to a public cloud,,” in IEEETransactions on Cloud Computing, 2013, pp. vol. 1, no. 1.
  26. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling publicverifiability and data dynamics for storage security in cloud computing,” in ESORICS, 2009, pp. 355370.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Jangamreddy, K. Sunitha, " Sanctioning Assestation of Retrievability in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1093-1096, March-April-2018.