Data Recovery and Integrity Checking By Proxy In Cloud

S.Sowmya Sirisha, R.S rinivas

Abstract


Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integrity checking is challenging issue. Provable information ownership (PDP) and confirmation of retrievability (POR) to discharge the data owner from online weight for check, considered general society auditability in the PDP model interestingly. In any case, their variation convention uncovered the straight blend of tests and in this way gives no information protection ensure.Existing methods only support private auditing means data owner only audit the cloud data and always to stay online for repairing cloud data. In order to overcome this problem introducing public auditing instead of data owner a proxy can repair the corrupted data by using public verifiable authenticator. For cloud data auditing TPA can use the enhanced privacy auditing protocol. This new protocol is introduced to audit the cloud data by TPA. But he can’t know the original data. For security and Integrity checking AES-256 bit as well as SHA-1 Algorithm is used Finally proposed technique is efficient in terms of communication and computation as well as privacy.


References


G. Atenieseet al., “Provable data possession at

untrusted stores,” inProc. 14th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY,USA, 2007, pp. 598–609.

A. Juels and B. S. Kaliski, Jr., “PORs: Proofs of retrievabilityforlarge files,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007,pp. 584–597.

H. Shacham and B. Waters, “Compact proofs of retrievability,” inAdvances in Cryptology. Berlin, Germany: Springer-Verlag, 2008,pp. 90–107.

K. Yang and X. Jia, “An efficient and secure dynamic auditing protocolfor data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst.,vol. 24, no. 9, pp. 1717–1726, Sep. 2013.

Y. Dodis, S. Vadhan, and D. Wichs, “Proofs of retrievabilityviahardness amplification,” in Theory ofCryptography. Berlin, Germany:Springer-Verlag, 2009, pp. 109–127.

Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable datapossession for integrity verification in multicloud storage,” IEEE Trans.ParallelDistrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.

B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proc.ACM Workshop Cloud Comput. Secur. Workshop, 2010, pp. 31–42.

H. C. H. Chen and P. P. C. Lee, “Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation,”IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 407–416,

Feb. 2014.

R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP:Multiple-replica provable data possession,” in Proc. 28th Int. Conf.Distrib. Comput. Syst. (ICDCS), Jun. 2008, pp. 411–420.

K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability andintegrity layer for cloud storage,” in Proc. 16th ACM Conf. Comput.Commun. Secur., 2009, pp. 187–198.

J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed datapossession checking for securing multiple replicas in geographically dispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358,

A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey onnetwork codes for distributed storage,” Proc. IEEE, vol. 99, no. 3,pp. 476–489, Mar. 2011

Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applyingnetwork coding for the storage repair in a cloud-of-clouds,” in Proc.USENIX FAST, 2012, p. 21.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure anddependable storage services in cloud computing,” IEEE Trans. ServiceComput., vol. 5, no. 2, pp. 220–232, Apr./Jun. 2012

Y. Deswarte, J.-J. Quisquater, and A. Saïdane, “Remote integritychecking,” in Integrity and Internal Control in Information Systems VI.Berlin, Germany: Springer-Verlag, 2004, pp. 1–11.

Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian “Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage” IEEE transactions on information forensics and security, Vol. 10, No. 7, July 2015

M. Armbrustet al., “Above the clouds: A Berkeley view of cloudcomputing,” Dept. Elect. Eng. Comput. Sci., Univ. California, Berkeley,CA, USA, Tech. Rep. UCB/EECS-2009-28, 2009


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.