SlideShare a Scribd company logo
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
1 | P a g e
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
Pratik Bhujbal
Department of Computer, SCSCOE, Rahuri Factory, India
* pratikbhujbal1994@gmail.com
Anupam Pahnale
Department of Computer, SCSCOE, Rahuri Factory, India
* anupampanhale73@gmail.com
Parve Gorakh
Department of Computer, SCSCOE, Rahuri Factory, India
* parvegorakh@gmail.com
Prof. Mohit Dighe
Asst. Professor, Department of Computer, SCSCOE, Rahuri Factory, India
* dighe.mohit@gmail.com
ABSTRACT
Nowadays, Data is rising over internet in terabytes and Exabyte. So, there is a need of storing these data which
has been fulfilled by cloud computing. Though the service of cloud appear to be efficient and cost effective. Yet
there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud
Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data
does not have any direct control over the data. If the data over cloud is modified by the cloud, Third Party
Auditor (TPA) or any other person there is no precision such that the owner of the data gets the information
about the modification of the data. TPA is a Third Party Auditor who has
Experience in checking the integrity of data. TPA verifies the files stored over the cloud if they are modified or
not. Our scheme provides the solution to this problem such that if there is any modification in the data the owner
will get information about the change in the data. Our scheme only provides the information about the change in
data it does not keep data intact or secure from modification over cloud.
KEYWORDS - Third Party Auditor (TPA), Cloud Storage, Cryptography, Data integrity.
INTRODUCTION
The usage of computers, mobile gadgets and social networking sites is now part of common mans day to day life.
Sharing of information, photos, video and audio files have enabled user to communicate and utilize virtual
storage space in the Internet without worrying to buy physical storage locally. All these data need to be stored
somewhere in Internet and Cloud happens to be a default choice.
In order to reap the operational and financial benefits of Cloud, the enterprises are also storing data with third
parties in Cloud. It is challenging for small and medium company to keep updating hardware according to
increasing data [1]. Cloud service provides flexibility to use storage services on demand according to ever
changing requirement of enterprise. Storage as service is popular model, where data storage is outsourced by
enterprise to third party service provider (Cloud Provider) [2] who charges as per the usage of storage facility.
On the other side of spectrum, there is increasing trend these days, in the form of ubiquitous presence of mobile
devices and the wide variety of functions for which they are used. Most of these functions are data generating
(like photography, video shooting etc
A. CLOUD COMPUTING
The cloud in cloud computing provides the means through which everything from computing power to
computing infrastructure, applications, business processes to personal collaboration can be delivered to you as a
service wherever and whenever you need.
Cloud computing is offered in different forms:
• :Public clouds
• Private clouds
• Hybrid clouds, which combine both public and private
The cloud itself is a set of hardware, networks, storage, services, and interfaces that enable the delivery of
computing as a service. Cloud services provide delivery of software, infrastructure, and storage on the Internet
(either as separated components or as a complete platform) based on the user demand.
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
2 | P a g e
B. CLOUD DATA CENTERS
cloud data centers means the data centers with 10,000 or more servers on sites, all are devoted to running very
few applications that are to be built with consistent infrastructure components (such as Hardware, racks,
networking, OS, and so on).
Cloud data centers are
• Constructed for different purposes.
• Created at different times than traditional data center.
• Built on a different scale.
• Not constrained by same limitations.
• Perform different workload than classic data centers.
C. DATA INTEGRITY IN CLOUD STORAGE
Integrity, in terms of Network and data security, is assurance that information could only be accessed and
modified by those authorized for it. Measures are taken to ensure Data integrity includes controlling physical
environment of network terminals and the servers, restricting access of data, and maintaining strict authentication
practice. Data integrity can also threatened by environmental hazards, such as heat, dust, and electrical surges.
Data Integrity is most important of all security issues and privacy in cloud data storages because it not only
ensures completeness and correctness of data but also ensure that data is consistent, correct, correct and of high
quality.
LITERATURE REVIEW
In Literature survey the study of cloud services and study of data integrity proof in cloud storage. Many solutions
have been provided to focus on resolving the issues of integrity. Juels and Kaliski[1] proposed a model Proofs of
Retrievability(POR) was one of the first most important attempts to formulize the notion guaranteed remotely
and reliable integrity of the data without the retrieving of data file. It is basically a data encryption mechanism
which detects data corruptions and retrieve the complete the data without any damage. Shacham and
Waters[2]gave a new model for POR enabling verifiability of unlimited number of queries by user with reduced
overhead. Later Bowels and Juels[3] gave a theoretical model for the implementing of POR, but all these
mechanisms proposed were weak from the security point because they all work for single server. Therefore
Bowels [4] in their further work gave a HAIL protocol extending the POR mechanism for multiple servers. Priya
Metri and Geeta Sarote[5] proposed a threat model to overcome the threat of integrity and provide data privacy
in the cloud storage. It uses TPA(Third Party Auditor) and digital signature mechanism for the purpose of
reliable data retrievable. The TPA being used notifies any unauthorized access attempting to make changes,
avoiding the changes in data and maintaining the originality of data. Atienies and Burns[6] gave Provable Data
Possession(PDP) mechanism which verifies the integrity of data being outsourced, detecting all kind of errors
occurring in data but doesn’t guarantee complete data retrievable. In their later work Atienies and Pietro[7]
proposed a scheme which overcome all problems in PDP, but the main and basic problem on both proposed
system didn’t overcome was they work on single server. Therefore, later Curtmola [8].
DATA INTEGRITY PROOF SCHEMES
A. OVERVIEW OF DATA INTEGRITY SCHEMES
As the word suggests itself data integrity means completeness or wholeness and it is basic requirement of
information technology [7]. Data integrity refers to maintaining and assuring the accuracy and consistency of
data over its entire life-cycle [8]. Data corruption is a form of data loss and data integrity is opposite of data
corruption [8]. Data integrity ensures the data is the same as it was when it was originally recorded.
B. PROOF OF RETRIEVABILITY
In the Proof of Retrivability (POR) scheme this scheme using keyed hash function is the simplest scheme than
any other scheme for proof of retrivability of data files [5]. In this scheme the data file is stored in the cloud
storage but before storing it in the cloud storage that file is pre-processed and Encryption cryptographic hash is
computed [5]. After calculating hash value the file is stored in the cloud storage or Data Center [5]. The
Encryption cryptographic key which is used to calculate hash value is then released to cloud storage and value
calculated by the cloud storage are compare with each other [5]. From that comparison final conclusion is
considered [5]. The main advantage of this scheme is simple to implementation. Limitation of this scheme is, it is
computational burdensome or difficult for devices like Laptops, mobile phones, PDAs etc. [5].
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
3 | P a g e
Fig.1: A Diagram of a proof of retrievability
Insert random sentinels in data files F
Next scheme for proof retrivability is using position of bits or sentinels [3].This concept is proposed by Ari Juels
and Burton S. Kaliski Jr [3]. Sentinels are the special blocks which are used in this scheme to verify the integrity.
Sentinels are embedded in the data blocks randomly during setup phase by the verifier in the setup phase [3]. The
integrity of the data file is calculate by challenge and response. The verifier or TPA throws challenge to the
cloud storage by specifying the position of the collection of the sentinels and the cloud storage has to return the
associated sentinels or TPA values to the verifier[3][5]. If the file stored by the client is modified then the
associated sentinels values also get changed and the cloud will return wrong values to verifier. From this
integrity of the file is checked [3][5]. Limitation of this scheme is that this scheme involves encryption of file so
this is computationally cumbersome for the small devices like mobile phones, PDA etc. [5].
Also Sravan Kumar R. and Ashutosh Saxena present this scheme [5] which involves selection of random bits per
blocks of data due to this computational overhead of the client is reduced. File is processed by the verifier before
storing it in the cloud storage [5]. After that verifier attaches some metadata to the file [5].This meta data is used
at the time of verification of the integrity of the file [5]. The limitation of this scheme is this scheme applies only
static data [5].
Fig.3.2: File is divided into number of Data Blocks
Fig.3.3: File is appending the Meta Data and made
Encryption file F’
1) setup phase:
Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file blocks.
We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks
have m bits in them. A typical data file F which the client wishes to store in the cloud is shown in Figure 3.2.
2) verification phase:
Let the verifier or TPA V wants to verifying the integrity of the file F. It throws challenge to archive and
asks it to respond. The challenge and response are compared and the verifiers accept or reject the integrity
proof. Suppose verifier wishes to check integrity of nth block. The verifier challenge cloud storage server by
specify the block number i and bit number j generated by using function g which only verifier knows. The
verifier also specifies position at which the meta data correspond the block i is append. This Meta data will be a
k-bit number. Hence cloud storage server is required to send k + 1 bits for verification process by the client. The
Meta data sent by cloud is decrypted by using number i and corresponding bit in this decrypted Meta data is
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
4 | P a g e
comparing with bit that is sent by the cloud. Any not match between two would mean a loss of the integrity of
the client data at the cloud storage.
CONCLUSION
In this paper, we have proposed next generation for cloud storage which provides a scheme to address storage,
management and the analysis of the rapidly growing machine Generated information. This paper explains about
cloud storage, advantages along with its characteristics. Our scheme is proposed to reduce computational data
and the storage Overhead of the cloud storage server. We also have proposed to minimize the size of proof of
data integrity so that to reduce network bandwidth consumption. At client we only store the two functions, bit
generator function g, and function h which can be used for encrypting data. Hence storage at client is very small
as compared to other schemes that were developed. In our scheme encryption task is very limited to only fraction
of whole data thus saving computational time of client. Many of schemes proposed earlier require the archive to
perform processes that need lot of computation power to generate proof of the data integrity. But in proposed
scheme archive just need to fetch and send few bits of data to client. And also evaluate performance of cloud
storage performance.
REFERENCES
[1] Daliya Attas, Omar Batrafi, Efficient integrity checking technique for securing client data in cloud
computing, IJECS Vol:11 No:05.,2011.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,
Provable data possession at untrusted stores, New York, NY, USA: ACM, 2007, pp. 5986095.
[3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf.
Computer and Comm. Security, pp. 584-597, 2007.
[4] Amazon.com. Amazon simple storage service (Amazon S3), 2007.
[5] Sravan Kumar R, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage,2011
[6] Satyakshma Rawat, Richa Chowdhary, Dr. Abhay Bansal, Data integrity of cloud data storage (CDSs) in
cloud ijarcsse Vol. 3, Issue 3, March 2013.
[7] Saranya Eswaran, Dr. Sunitha Abburu Identifying Data integrity in cloud storage, IJCSI Vol. 9, Issue 2, No 1,
March 2012.
[8] E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, Trans.
Storage, vol. 2, no. 2, pp. 107138, 2006.

More Related Content

PDF
Ijarcet vol-2-issue-3-951-956
PDF
A hybrid cloud approach for secure authorized
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
Tees an efficient search scheme over
PDF
Seed block algorithm
PPTX
seed block algorithm
PDF
Fog Computing: Issues, Challenges and Future Directions
PDF
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Ijarcet vol-2-issue-3-951-956
A hybrid cloud approach for secure authorized
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
Tees an efficient search scheme over
Seed block algorithm
seed block algorithm
Fog Computing: Issues, Challenges and Future Directions
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage

What's hot (18)

PDF
A Hybrid Cloud Approach for Secure Authorized De-Duplication
PDF
Kamal Jyoti V3I5-0161
PDF
An4201262267
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
Secure Auditing and Deduplicating Data in Cloud
PDF
Guaranteed Availability of Cloud Data with Efficient Cost
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
PDF
iaetsd Controlling data deuplication in cloud storage
PDF
an enhanced multi layered cryptosystem based secure
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
IRJET- Securely Performing Operations on Images using PSNR
PDF
Remote data integrity checking with a third party auditor in public cloud usi...
PDF
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
PDF
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Cyclone DDS: Sharing Data in the IoT Age
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Kamal Jyoti V3I5-0161
An4201262267
Ijarcet vol-2-issue-4-1405-1409
Secure Auditing and Deduplicating Data in Cloud
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Improving Data Storage Security in Cloud using Hadoop
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
iaetsd Controlling data deuplication in cloud storage
an enhanced multi layered cryptosystem based secure
International Journal of Computational Engineering Research(IJCER)
IRJET- Securely Performing Operations on Images using PSNR
Remote data integrity checking with a third party auditor in public cloud usi...
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Cyclone DDS: Sharing Data in the IoT Age
Ad

Similar to DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE (20)

PDF
Periodic Auditing of Data in Cloud Using Random Bits
PDF
50120140507005 2
PDF
50120140507005
PDF
An extensive research survey on data integrity and deduplication towards priv...
PDF
L01246974
PDF
Survey on securing outsourced storages in cloud
PDF
Survey on securing outsourced storages in cloud
PDF
Data integrity proof techniques in cloud storage
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
PDF
A Novel Method of Directly Auditing Integrity On Encrypted Data
PDF
Fs2510501055
PDF
Privacy and Integrity Preserving in Cloud Storage Devices
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PDF
Secure Auditing and Deduplicating Data on Cloud
PDF
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
PDF
V04405122126
Periodic Auditing of Data in Cloud Using Random Bits
50120140507005 2
50120140507005
An extensive research survey on data integrity and deduplication towards priv...
L01246974
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Data integrity proof techniques in cloud storage
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
A Novel Method of Directly Auditing Integrity On Encrypted Data
Fs2510501055
Privacy and Integrity Preserving in Cloud Storage Devices
Enabling Integrity for the Compressed Files in Cloud Server
Secure Auditing and Deduplicating Data on Cloud
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
V04405122126
Ad

More from ijiert bestjournal (20)

PDF
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
PDF
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
PDF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
PDF
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
PDF
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
PDF
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
PDF
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
PDF
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
PDF
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
PDF
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
PDF
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
PDF
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
PDF
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
PDF
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
PDF
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
PDF
DESIGN OF WELDING FIXTURES AND POSITIONERS
PDF
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
PDF
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
PDF
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PDF
MAGNETIC ABRASIVE FINISHING
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
DESIGN OF WELDING FIXTURES AND POSITIONERS
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
MAGNETIC ABRASIVE FINISHING

Recently uploaded (20)

PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
introduction to datamining and warehousing
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
737-MAX_SRG.pdf student reference guides
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
Artificial Intelligence
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Current and future trends in Computer Vision.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
UNIT 4 Total Quality Management .pptx
Safety Seminar civil to be ensured for safe working.
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Fundamentals of Mechanical Engineering.pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
introduction to datamining and warehousing
Information Storage and Retrieval Techniques Unit III
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
737-MAX_SRG.pdf student reference guides
Visual Aids for Exploratory Data Analysis.pdf
Artificial Intelligence
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Current and future trends in Computer Vision.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Soil Improvement Techniques Note - Rabbi
UNIT 4 Total Quality Management .pptx

DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE

  • 1. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 1 | P a g e DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE Pratik Bhujbal Department of Computer, SCSCOE, Rahuri Factory, India * pratikbhujbal1994@gmail.com Anupam Pahnale Department of Computer, SCSCOE, Rahuri Factory, India * anupampanhale73@gmail.com Parve Gorakh Department of Computer, SCSCOE, Rahuri Factory, India * parvegorakh@gmail.com Prof. Mohit Dighe Asst. Professor, Department of Computer, SCSCOE, Rahuri Factory, India * dighe.mohit@gmail.com ABSTRACT Nowadays, Data is rising over internet in terabytes and Exabyte. So, there is a need of storing these data which has been fulfilled by cloud computing. Though the service of cloud appear to be efficient and cost effective. Yet there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data does not have any direct control over the data. If the data over cloud is modified by the cloud, Third Party Auditor (TPA) or any other person there is no precision such that the owner of the data gets the information about the modification of the data. TPA is a Third Party Auditor who has Experience in checking the integrity of data. TPA verifies the files stored over the cloud if they are modified or not. Our scheme provides the solution to this problem such that if there is any modification in the data the owner will get information about the change in the data. Our scheme only provides the information about the change in data it does not keep data intact or secure from modification over cloud. KEYWORDS - Third Party Auditor (TPA), Cloud Storage, Cryptography, Data integrity. INTRODUCTION The usage of computers, mobile gadgets and social networking sites is now part of common mans day to day life. Sharing of information, photos, video and audio files have enabled user to communicate and utilize virtual storage space in the Internet without worrying to buy physical storage locally. All these data need to be stored somewhere in Internet and Cloud happens to be a default choice. In order to reap the operational and financial benefits of Cloud, the enterprises are also storing data with third parties in Cloud. It is challenging for small and medium company to keep updating hardware according to increasing data [1]. Cloud service provides flexibility to use storage services on demand according to ever changing requirement of enterprise. Storage as service is popular model, where data storage is outsourced by enterprise to third party service provider (Cloud Provider) [2] who charges as per the usage of storage facility. On the other side of spectrum, there is increasing trend these days, in the form of ubiquitous presence of mobile devices and the wide variety of functions for which they are used. Most of these functions are data generating (like photography, video shooting etc A. CLOUD COMPUTING The cloud in cloud computing provides the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to you as a service wherever and whenever you need. Cloud computing is offered in different forms: • :Public clouds • Private clouds • Hybrid clouds, which combine both public and private The cloud itself is a set of hardware, networks, storage, services, and interfaces that enable the delivery of computing as a service. Cloud services provide delivery of software, infrastructure, and storage on the Internet (either as separated components or as a complete platform) based on the user demand.
  • 2. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 2 | P a g e B. CLOUD DATA CENTERS cloud data centers means the data centers with 10,000 or more servers on sites, all are devoted to running very few applications that are to be built with consistent infrastructure components (such as Hardware, racks, networking, OS, and so on). Cloud data centers are • Constructed for different purposes. • Created at different times than traditional data center. • Built on a different scale. • Not constrained by same limitations. • Perform different workload than classic data centers. C. DATA INTEGRITY IN CLOUD STORAGE Integrity, in terms of Network and data security, is assurance that information could only be accessed and modified by those authorized for it. Measures are taken to ensure Data integrity includes controlling physical environment of network terminals and the servers, restricting access of data, and maintaining strict authentication practice. Data integrity can also threatened by environmental hazards, such as heat, dust, and electrical surges. Data Integrity is most important of all security issues and privacy in cloud data storages because it not only ensures completeness and correctness of data but also ensure that data is consistent, correct, correct and of high quality. LITERATURE REVIEW In Literature survey the study of cloud services and study of data integrity proof in cloud storage. Many solutions have been provided to focus on resolving the issues of integrity. Juels and Kaliski[1] proposed a model Proofs of Retrievability(POR) was one of the first most important attempts to formulize the notion guaranteed remotely and reliable integrity of the data without the retrieving of data file. It is basically a data encryption mechanism which detects data corruptions and retrieve the complete the data without any damage. Shacham and Waters[2]gave a new model for POR enabling verifiability of unlimited number of queries by user with reduced overhead. Later Bowels and Juels[3] gave a theoretical model for the implementing of POR, but all these mechanisms proposed were weak from the security point because they all work for single server. Therefore Bowels [4] in their further work gave a HAIL protocol extending the POR mechanism for multiple servers. Priya Metri and Geeta Sarote[5] proposed a threat model to overcome the threat of integrity and provide data privacy in the cloud storage. It uses TPA(Third Party Auditor) and digital signature mechanism for the purpose of reliable data retrievable. The TPA being used notifies any unauthorized access attempting to make changes, avoiding the changes in data and maintaining the originality of data. Atienies and Burns[6] gave Provable Data Possession(PDP) mechanism which verifies the integrity of data being outsourced, detecting all kind of errors occurring in data but doesn’t guarantee complete data retrievable. In their later work Atienies and Pietro[7] proposed a scheme which overcome all problems in PDP, but the main and basic problem on both proposed system didn’t overcome was they work on single server. Therefore, later Curtmola [8]. DATA INTEGRITY PROOF SCHEMES A. OVERVIEW OF DATA INTEGRITY SCHEMES As the word suggests itself data integrity means completeness or wholeness and it is basic requirement of information technology [7]. Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle [8]. Data corruption is a form of data loss and data integrity is opposite of data corruption [8]. Data integrity ensures the data is the same as it was when it was originally recorded. B. PROOF OF RETRIEVABILITY In the Proof of Retrivability (POR) scheme this scheme using keyed hash function is the simplest scheme than any other scheme for proof of retrivability of data files [5]. In this scheme the data file is stored in the cloud storage but before storing it in the cloud storage that file is pre-processed and Encryption cryptographic hash is computed [5]. After calculating hash value the file is stored in the cloud storage or Data Center [5]. The Encryption cryptographic key which is used to calculate hash value is then released to cloud storage and value calculated by the cloud storage are compare with each other [5]. From that comparison final conclusion is considered [5]. The main advantage of this scheme is simple to implementation. Limitation of this scheme is, it is computational burdensome or difficult for devices like Laptops, mobile phones, PDAs etc. [5].
  • 3. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 3 | P a g e Fig.1: A Diagram of a proof of retrievability Insert random sentinels in data files F Next scheme for proof retrivability is using position of bits or sentinels [3].This concept is proposed by Ari Juels and Burton S. Kaliski Jr [3]. Sentinels are the special blocks which are used in this scheme to verify the integrity. Sentinels are embedded in the data blocks randomly during setup phase by the verifier in the setup phase [3]. The integrity of the data file is calculate by challenge and response. The verifier or TPA throws challenge to the cloud storage by specifying the position of the collection of the sentinels and the cloud storage has to return the associated sentinels or TPA values to the verifier[3][5]. If the file stored by the client is modified then the associated sentinels values also get changed and the cloud will return wrong values to verifier. From this integrity of the file is checked [3][5]. Limitation of this scheme is that this scheme involves encryption of file so this is computationally cumbersome for the small devices like mobile phones, PDA etc. [5]. Also Sravan Kumar R. and Ashutosh Saxena present this scheme [5] which involves selection of random bits per blocks of data due to this computational overhead of the client is reduced. File is processed by the verifier before storing it in the cloud storage [5]. After that verifier attaches some metadata to the file [5].This meta data is used at the time of verification of the integrity of the file [5]. The limitation of this scheme is this scheme applies only static data [5]. Fig.3.2: File is divided into number of Data Blocks Fig.3.3: File is appending the Meta Data and made Encryption file F’ 1) setup phase: Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file blocks. We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks have m bits in them. A typical data file F which the client wishes to store in the cloud is shown in Figure 3.2. 2) verification phase: Let the verifier or TPA V wants to verifying the integrity of the file F. It throws challenge to archive and asks it to respond. The challenge and response are compared and the verifiers accept or reject the integrity proof. Suppose verifier wishes to check integrity of nth block. The verifier challenge cloud storage server by specify the block number i and bit number j generated by using function g which only verifier knows. The verifier also specifies position at which the meta data correspond the block i is append. This Meta data will be a k-bit number. Hence cloud storage server is required to send k + 1 bits for verification process by the client. The Meta data sent by cloud is decrypted by using number i and corresponding bit in this decrypted Meta data is
  • 4. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 4 | P a g e comparing with bit that is sent by the cloud. Any not match between two would mean a loss of the integrity of the client data at the cloud storage. CONCLUSION In this paper, we have proposed next generation for cloud storage which provides a scheme to address storage, management and the analysis of the rapidly growing machine Generated information. This paper explains about cloud storage, advantages along with its characteristics. Our scheme is proposed to reduce computational data and the storage Overhead of the cloud storage server. We also have proposed to minimize the size of proof of data integrity so that to reduce network bandwidth consumption. At client we only store the two functions, bit generator function g, and function h which can be used for encrypting data. Hence storage at client is very small as compared to other schemes that were developed. In our scheme encryption task is very limited to only fraction of whole data thus saving computational time of client. Many of schemes proposed earlier require the archive to perform processes that need lot of computation power to generate proof of the data integrity. But in proposed scheme archive just need to fetch and send few bits of data to client. And also evaluate performance of cloud storage performance. REFERENCES [1] Daliya Attas, Omar Batrafi, Efficient integrity checking technique for securing client data in cloud computing, IJECS Vol:11 No:05.,2011. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, New York, NY, USA: ACM, 2007, pp. 5986095. [3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf. Computer and Comm. Security, pp. 584-597, 2007. [4] Amazon.com. Amazon simple storage service (Amazon S3), 2007. [5] Sravan Kumar R, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage,2011 [6] Satyakshma Rawat, Richa Chowdhary, Dr. Abhay Bansal, Data integrity of cloud data storage (CDSs) in cloud ijarcsse Vol. 3, Issue 3, March 2013. [7] Saranya Eswaran, Dr. Sunitha Abburu Identifying Data integrity in cloud storage, IJCSI Vol. 9, Issue 2, No 1, March 2012. [8] E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, Trans. Storage, vol. 2, no. 2, pp. 107138, 2006.