SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2317 | Page
Jimnisha Shaik1
, Syed Gulam Gouse2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and
software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing
resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite
web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as
traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by
many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud
Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud
storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a
public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in
storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic
verifiable response and hash index hierarchy.
INDEX TERMS: Cloud, Hash index, Integrity, PDP.
I. INTRODUCTION
In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational
speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which
are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level,
task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core
and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one
instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi-
processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that
each processing element can execute its part of the algorithm simultaneously with others. There is another important concept
which is responsible for the effective and efficient computation of our problem is, distributed system. Using high
performance computers connected by using high speed communication links, it is possible to build a single system consisting
of multiple computers and using it as a single consolidated system.
In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are
a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent
transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be
transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage
and all the processing is done locally. All systems are interconnected using a LAN.
In any kind of computer system which involves data storage and retrieval, availability is one of the major security
issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of
retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of
client‟s data without being downloading it. The proof-checking of the data without being downloading is very important,
especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted
or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only
for single cloud storage, but not for the distributed-cloud storage environment.
II. RELATED WORK
To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic
approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first
proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a
static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a
dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash
function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses
due to the lack of the randomness in the challenges.
In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n)
communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of
Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which
relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and
models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system
that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code
(IP-ECC), which improves the security and efficiency of the existing tools, like POR.
An Efficient PDP Scheme for Distributed Cloud Storage
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2318 | Page
III. PROPOSED METHOD
In this section, we introduce the principles of our cooperative provable data possession for distributed clouds,
including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme.
A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that
f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This
notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and
mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj.
B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and
an interactive proof system, S′ = (K, T, P).
KeyGen(
k
1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk);
TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file
F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H)
is a set of verification parameters u and an index hierarchy
H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk.
Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that
is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk
and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit
{0|1} denoting false and true where,  pPK
denotes the collaborative computing in Pk  P.
C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1,
which has following characters:
 A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature
tags can be reduced with the order of s.
 The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost
importance for large or huge files.
 This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response,
which minimizes network communication overheads.
Figure 1: The fragment structure of Cooperative PDP model
The above structure, considered as a common representation for some existing schemes in [1][7], can be converted
to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical
CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates
favorable conditions for the architecture of the CSPs.
D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This
architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored
resources. Three layers can be described as follows:
 First Layer (Express Layer): It offers an abstract representation of the stored resources
 Second Layer (Service Layer): It promptly offers and manages cloud storage services
 Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2319 | Page
Figure 2: The architecture of Cooperative PDP model
This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a
simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the
differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three
CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage
Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1.
Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some
special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in
dashed line) and discontinuous blocks (as shown on a non continuous color).
IV. CONCLUSION
With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable
data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge
proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing
their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new
method for data integrity verification in out sourcing data storage on distributed cloud environment.
REFERENCES
[1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications
Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
[3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.
[4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference
onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
[5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on
Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.
[6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in
Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127.
[7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.

More Related Content

PDF
International Journal of Computational Engineering Research(IJCER)
PDF
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
PDF
Cryptographic Cloud Storage with Hadoop Implementation
PDF
Data integrity proof techniques in cloud storage
PDF
Mn3422372248
PDF
Ijcnc050208
PDF
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
PPTX
140320702029 maurya ppt
International Journal of Computational Engineering Research(IJCER)
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
Cryptographic Cloud Storage with Hadoop Implementation
Data integrity proof techniques in cloud storage
Mn3422372248
Ijcnc050208
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
140320702029 maurya ppt

What's hot (20)

PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Seed block algorithm
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
PPTX
seed block algorithm
PDF
Performance evaluation and estimation model using regression method for hadoo...
PDF
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
PDF
Energy and Load Aware Routing Protocol for Internet of Things
PDF
An efficient, secure deduplication data storing in cloud storage environment
PDF
An asynchronous replication model to improve data available into a heterogene...
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
PDF
Enabling efficient multi keyword ranked
PDF
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
PDF
Toward a real time framework in cloudlet-based architecture
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
Frequency and similarity aware partitioning for cloud storage based on space ...
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Iaetsd secured and efficient data scheduling of intermediate data sets
A Hybrid Cloud Approach for Secure Authorized Deduplication
Seed block algorithm
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
seed block algorithm
Performance evaluation and estimation model using regression method for hadoo...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
Energy and Load Aware Routing Protocol for Internet of Things
An efficient, secure deduplication data storing in cloud storage environment
An asynchronous replication model to improve data available into a heterogene...
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
Enabling efficient multi keyword ranked
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Toward a real time framework in cloudlet-based architecture
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Frequency and similarity aware partitioning for cloud storage based on space ...
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Ad

Viewers also liked (20)

PDF
Ijmer 46053040
PDF
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
PDF
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...
PDF
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
PDF
Design of Neural Network Controller for Active Vibration control of Cantileve...
PDF
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
PDF
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
PDF
Ijmer 46062932
PDF
Bh32793797
PDF
Da31456462
PDF
A Novel Switch Mechanism for Load Balancing in Public Cloud
PDF
Ae32626632
PDF
Dj31514517
PDF
Helicopter Flapping Under Dynamic Stall
PDF
Ce32944948
PDF
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
PDF
Dd3210971099
PDF
Aw32736738
PDF
Optimization of machining parameters of Electric Discharge Machining for 202 ...
PDF
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Ijmer 46053040
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
Design of Neural Network Controller for Active Vibration control of Cantileve...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
Ijmer 46062932
Bh32793797
Da31456462
A Novel Switch Mechanism for Load Balancing in Public Cloud
Ae32626632
Dj31514517
Helicopter Flapping Under Dynamic Stall
Ce32944948
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Dd3210971099
Aw32736738
Optimization of machining parameters of Electric Discharge Machining for 202 ...
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Ad

Similar to An Efficient PDP Scheme for Distributed Cloud Storage (20)

PDF
An4201262267
PDF
E045026031
PPTX
Improving availability and reducing redundancy using deduplication of cloud s...
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
A novel cloud storage system with support of sensitive data application
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
iaetsd Controlling data deuplication in cloud storage
PDF
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
PDF
Privacy preserving public auditing for secured cloud storage
PDF
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
PDF
A hybrid cloud approach for secure authorized
An4201262267
E045026031
Improving availability and reducing redundancy using deduplication of cloud s...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
A novel cloud storage system with support of sensitive data application
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Improving Data Storage Security in Cloud using Hadoop
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Improving Efficiency of Security in Multi-Cloud
iaetsd Controlling data deuplication in cloud storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
Privacy preserving public auditing for secured cloud storage
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
A hybrid cloud approach for secure authorized

More from IJMER (20)

PDF
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
PDF
Developing Cost Effective Automation for Cotton Seed Delinting
PDF
Study & Testing Of Bio-Composite Material Based On Munja Fibre
PDF
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
PDF
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
PDF
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
PDF
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
PDF
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
PDF
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
PDF
High Speed Effortless Bicycle
PDF
Integration of Struts & Spring & Hibernate for Enterprise Applications
PDF
Microcontroller Based Automatic Sprinkler Irrigation System
PDF
On some locally closed sets and spaces in Ideal Topological Spaces
PDF
Intrusion Detection and Forensics based on decision tree and Association rule...
PDF
Natural Language Ambiguity and its Effect on Machine Learning
PDF
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
PDF
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
PDF
Studies On Energy Conservation And Audit
PDF
An Implementation of I2C Slave Interface using Verilog HDL
PDF
Discrete Model of Two Predators competing for One Prey
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
Developing Cost Effective Automation for Cotton Seed Delinting
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
High Speed Effortless Bicycle
Integration of Struts & Spring & Hibernate for Enterprise Applications
Microcontroller Based Automatic Sprinkler Irrigation System
On some locally closed sets and spaces in Ideal Topological Spaces
Intrusion Detection and Forensics based on decision tree and Association rule...
Natural Language Ambiguity and its Effect on Machine Learning
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Studies On Energy Conservation And Audit
An Implementation of I2C Slave Interface using Verilog HDL
Discrete Model of Two Predators competing for One Prey

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

An Efficient PDP Scheme for Distributed Cloud Storage

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2317 | Page Jimnisha Shaik1 , Syed Gulam Gouse2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. INDEX TERMS: Cloud, Hash index, Integrity, PDP. I. INTRODUCTION In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level, task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi- processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that each processing element can execute its part of the algorithm simultaneously with others. There is another important concept which is responsible for the effective and efficient computation of our problem is, distributed system. Using high performance computers connected by using high speed communication links, it is possible to build a single system consisting of multiple computers and using it as a single consolidated system. In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage and all the processing is done locally. All systems are interconnected using a LAN. In any kind of computer system which involves data storage and retrieval, availability is one of the major security issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of client‟s data without being downloading it. The proof-checking of the data without being downloading is very important, especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only for single cloud storage, but not for the distributed-cloud storage environment. II. RELATED WORK To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of the randomness in the challenges. In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n) communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code (IP-ECC), which improves the security and efficiency of the existing tools, like POR. An Efficient PDP Scheme for Distributed Cloud Storage
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2318 | Page III. PROPOSED METHOD In this section, we introduce the principles of our cooperative provable data possession for distributed clouds, including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme. A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj. B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and an interactive proof system, S′ = (K, T, P). KeyGen( k 1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk); TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H) is a set of verification parameters u and an index hierarchy H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk. Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit {0|1} denoting false and true where,  pPK denotes the collaborative computing in Pk  P. C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1, which has following characters:  A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature tags can be reduced with the order of s.  The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost importance for large or huge files.  This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response, which minimizes network communication overheads. Figure 1: The fragment structure of Cooperative PDP model The above structure, considered as a common representation for some existing schemes in [1][7], can be converted to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates favorable conditions for the architecture of the CSPs. D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored resources. Three layers can be described as follows:  First Layer (Express Layer): It offers an abstract representation of the stored resources  Second Layer (Service Layer): It promptly offers and manages cloud storage services  Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2319 | Page Figure 2: The architecture of Cooperative PDP model This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1. Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in dashed line) and discontinuous blocks (as shown on a non continuous color). IV. CONCLUSION With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new method for data integrity verification in out sourcing data storage on distributed cloud environment. REFERENCES [1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597. [3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10. [4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222. [5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198. [6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127. [7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.