Author : Akshata Sawant 1
Date of Publication :7th February 2017
Abstract: Nowadays many organizations, enterprises, and companies store their large amount of data into the cloud to reduce the efforts and cost needs for storage management. Also, cloud servers allow data users to retrieve their data when he needs it. But providing confidentiality, availability, integrity to this outsourced data are major security challenges in cloud computing. There is a chance of data loss due to unauthorized access or hacking. Existing data recovery methods for regenerating coded data requires data owner to always stay online and handle auditing as well as recovery of data which is impossible. This system proposes public auditing scheme in which every block of the file have its own hash code so that auditor can check the integrity of data stored on a cloud. Privacy preserved because data owner uploads files in an encrypted format which done using AES algorithm. If data corrupted or lost, then proxy server help to regenerate back a lost data by using regenerating code which has lower repair bandwidth. when a file distributed across servers regenerating code have the capability of repairing failed node by connecting to another node. Auditor ensures data is in safe mode and proxy solve regeneration problem so data owner free from online burden. The analysis shows that proposed system is highly efficient, secure with very low communication overhead.
Reference :
-
- A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A Berkeley view of cloud computing,” Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28, p. 13, 2009.
- Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy-Preserving Public Auditing for Regenerating -Code-Based Cloud Storage,” in IEEE Trans. on information forensics and security , vol.. 10,no. 7, July 2015.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598– 609.
- A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584–597.
- R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “Mr-pdp: Multiple replica provable data possession,” in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on. IEEE, 2008, pp. 411–420.
- K. D. Bowers, A. Juels, and A. Oprea, “Hail: a highavailability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.
- J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” Journal of Computer and System Sciences, vol. 78, no. 5, pp. 1345–1358, 2012.
- Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010, pp. 31–42.
- H. Chen and P. Lee, “Enabling data integrity protection in regenerating coding-based cloud storage: Theory and implementation,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 407–416, Feb 2014
- K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
- Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 12, pp. 2231– 2244, 2012.
- A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proceedings of the IEEE, vol. 99, no. 3, pp. 476– 489, 2011. [12] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in CryptologyASIACRYPT 2008. Springer, 2008, pp. 90– 107.
- Y. Hu, H. C. Chen, P. P. Lee, and Y. Tang, “Nccloud: Applying network coding for the storage repair in a cloud-of-clouds,” in USENIX FAST, 2012
- C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010IEEE, 2010, pp. 1–9.
- C.Wang,S.S.Chow,Q.Wang,K.Ren,andW.Lou“Privacy -preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013
- Yogesh Shinde, Omprakash Tembhurne “A review of protect the integrity of outsourced data using third party auditing for secure cloud storage,” Computers, International Journal of Science and Research(IJSR)
- Mr.Satish Shelar1, Prof.S.Y.Raut2” Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing " International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 09 | Dec-2015
- Yogesh Shinde , Alka Vishwa” Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage” International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 16, April 2015.
- Madhumati B.Shinde1, S. B. Sonkamble ” Survey on Secure Public Auditing and Privacy Preserving in Cloud” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 10-13
- Jyoti R Bolannavar1” Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage” International Journal of Scientific Engineering and Research (IJSER) Volume 2 Issue 6, June 2014
- C. Erway, A. K¨upc¸¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 213–222.