SlideShare a Scribd company logo
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
Applications and services
that run on a distributed network
using virtualized resources and accessed
by common internet protocols and
network standards
Cloud Computing is a paradigm in
which information is permanently
stored in servers on the internet and
can be accessed from anywhere
Data Integrity proofs in cloud storage
Data center
Office space
Servers and storages
Team of technical personnel's
Coolants
Network
Power
Provides all the infrastructure needed to run
applications over the internet
 Increased storage
 Reduced cost
 Flexibility
 Increased mobility
 Highly automated
-> Sometimes referred to as "on-demand software" is a
software delivery model in which software and its
associated data are hosted centrally and are typically
accessed by users
• ….enables you to create web
applications quickly, without the
• cost and complexity of buying and
managing the underlying software
or hardware…
No Frequent updates
Inexpensive
Data Integrity proofs in cloud storage
Data Integrity
and
Data Privacy
Availability
and
Reliability
Bandwidth and
Latency guarantees
Portability
and
Compliance
Cloud storage moves the user’s data to large data
centers, which are remotely located, on which the user
does not have any control
However there are lot of security
issues which need to be considered
 Data integrity
 Authentication
 Small devices like PDA’s, mobiles, and laptops are
associated with limited battery power and computation
speed
We provide a scheme which gives a proof of data
integrity in the cloud through which the user can
verify the correctness of his data, this proof can be
termed as Proof of Retrievability (POR)
 This enables individual to
entertain
 Economic advantages
 Zero Maintenance
Note:
-> Our scheme just checks the integrity (if the data is
illegally modified) only of static data…
 This proof can be agreed
upon by both the cloud and
the customer and can be
incorporated in SLA.
SLA is part of service
contract where the level of
services being offered is
formally defined.
Key generator:
A random key is generated
Encryption:
A metadata of the file is
generated and is encrypted using any suitable algorithm
Archive:
It is the data center where the data is outsourced
Challenge:
Verification of data integrity by the user…
Response:
Proof of data integrity by data center
A simplest Proof of Retrievability can be made
using hash key function
File (F)
Data Center
(archive)
Cryptographic
Hash Function
Hk(F)
User
DB
Hash
Secret
key (k)
Encrypted
file(~f)
StoredRetrieves
C
H
A
L
L
E
N
G
E
Response
• Computing hash value for moderately large file
might be overhead for some device like Mobiles,
PDA’s and Laptops
• For each verification request from
client the archive has to process
the entire file
• High resource cost and lot of ambiguity as a result
of maintaining secret key and number of hash
keys….
Proposed a theory to proof the retrievability for
large files using sentinels…. According to them
1 2 3 4 5 6 7
Data File( f )
s
s
s s
s
s s
s s
s
s
s
s
s s
s
s s
s
s s
Data file with
seven blocks
Inserting sentinels at
different positions and
noting their position,
present at different
blocks
File(~f)
Encryption
(~F )
Data
Archive
To hide the
position of
sentinels
Computationally burdensome for entire file to be
encrypted for small devices
This scheme is best suited for encrypted files
Data
Center
Cloud
Storage
Client
In this we provide a scheme of data integrity , which
the customer can utilize to check the correctness of his
data by including SLA
M bits M bits M bits M bits M bits M bits
File (F) with n
blocks, and each
block of size M bits
K bits
K<<<M, K bit positions
are noted Where K is
user defined
E
M1
K bits
E
M2
K bits
E
M3
K bits
E
M4
K bits
E
M5
K bits
E
M6
Metadata
Encrypting k bits using
any appropriate
algorithm
Generation of
individual metadata
File (F) Metadata
Data
Center
File is appended
with metadata
New file (~F)
is stored at
data center
Client challenges
by specifying (ith)
block of file and
the jth bit of i
Response and
challenge should
be same to
accept the file
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
Our scheme is only for static data
Developing for dynamic data will
be a future challenge
Data Integrity proofs in cloud storage

More Related Content

PPT
Secure Socket Layer
PPTX
public key infrastructure
DOCX
Doctor appointment system.docx
PPT
Private cloud with vmware
PPTX
Transport Layer Security
PPTX
Cloud Encryption
PPTX
Public key infrastructure
PPTX
Identity and access management
Secure Socket Layer
public key infrastructure
Doctor appointment system.docx
Private cloud with vmware
Transport Layer Security
Cloud Encryption
Public key infrastructure
Identity and access management

What's hot (20)

PDF
Alumni Management System
PDF
Cloud Security And Privacy
PPTX
Kerberos : An Authentication Application
PDF
Process injection - Malware style
PPTX
Zero trust Architecture
PDF
Electronic mail security
PDF
What's new in API Connect and DataPower - 2019
PPTX
Transport layer security (tls)
PPTX
Fundamentals of Network security
PPT
File replication
PDF
Public key Infrastructure (PKI)
PDF
Network security - OSI Security Architecture
PDF
Advanced Concepts of Cloud Computing
PDF
Dna cryptography
PDF
IDENTITY ACCESS MANAGEMENT
PDF
Web Security
PDF
Cap Theorem
PPTX
Operating system security
PPTX
Identity and Access Management Introduction
PPTX
Cryptography and Information Security
Alumni Management System
Cloud Security And Privacy
Kerberos : An Authentication Application
Process injection - Malware style
Zero trust Architecture
Electronic mail security
What's new in API Connect and DataPower - 2019
Transport layer security (tls)
Fundamentals of Network security
File replication
Public key Infrastructure (PKI)
Network security - OSI Security Architecture
Advanced Concepts of Cloud Computing
Dna cryptography
IDENTITY ACCESS MANAGEMENT
Web Security
Cap Theorem
Operating system security
Identity and Access Management Introduction
Cryptography and Information Security
Ad

Viewers also liked (20)

PDF
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
PPTX
Ensuring data integrity on cloud data storage
PDF
Fog computing may help to save energy in cloud computing
PPTX
FOG COMPUTING- Presentation
PDF
Storage Cloud and Spectrum deck March 2016
PPTX
Data integrity challenges and solutions
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
PDF
Cloud-forensics
PPTX
Fog Computing
DOCX
fog computing provide security to the data in cloud
PPT
Privacy preserving public auditing for secure cloud storage
PPTX
Graphical Password Authentication
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
fog computing ppt
PPT
PPTX
Fog computing
PPTX
Graphical password authentication
PPTX
Ppt for graphical password authentication using cued click points
DOC
E-commerce Security and Threats
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
Ensuring data integrity on cloud data storage
Fog computing may help to save energy in cloud computing
FOG COMPUTING- Presentation
Storage Cloud and Spectrum deck March 2016
Data integrity challenges and solutions
A Hybrid Cloud Approach for Secure Authorized Deduplication
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Cloud-forensics
Fog Computing
fog computing provide security to the data in cloud
Privacy preserving public auditing for secure cloud storage
Graphical Password Authentication
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
fog computing ppt
Fog computing
Graphical password authentication
Ppt for graphical password authentication using cued click points
E-commerce Security and Threats
Ad

Similar to Data Integrity proofs in cloud storage (20)

PPT
lecture8 Securing Distributed Data Storage.ppt
DOCX
Mis cloud computing
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PPTX
Important Terminology for the Users of Web-based Services
PDF
How To Build A Stable And Robust Base For a “Cloud”
PDF
Construire une « data fabric » pour les environnements edge
PDF
EGI Services
PPTX
Security in cloud computing
PDF
Privacy preserving public auditing for secured cloud storage
PDF
PDF
PDF
Slides: Accelerating Queries on Cloud Data Lakes
PPTX
Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420
PDF
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PPTX
A cloud enviroment for backup and data storage
PPTX
Data security in cloud computing
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PPTX
Demystifying Data Centers The Backbone of Cloud Computing.pptx
lecture8 Securing Distributed Data Storage.ppt
Mis cloud computing
Improving Data Storage Security in Cloud using Hadoop
Enabling Integrity for the Compressed Files in Cloud Server
Important Terminology for the Users of Web-based Services
How To Build A Stable And Robust Base For a “Cloud”
Construire une « data fabric » pour les environnements edge
EGI Services
Security in cloud computing
Privacy preserving public auditing for secured cloud storage
Slides: Accelerating Queries on Cloud Data Lakes
Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A cloud enviroment for backup and data storage
Data security in cloud computing
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Demystifying Data Centers The Backbone of Cloud Computing.pptx

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Getting Started with Data Integration: FME Form 101
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mushroom cultivation and it's methods.pdf
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Assigned Numbers - 2025 - Bluetooth® Document
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative study of natural language inference in Swahili using monolingua...
TLE Review Electricity (Electricity).pptx
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
SOPHOS-XG Firewall Administrator PPT.pptx
Machine learning based COVID-19 study performance prediction
Getting Started with Data Integration: FME Form 101
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mushroom cultivation and it's methods.pdf

Data Integrity proofs in cloud storage

  • 4. Applications and services that run on a distributed network using virtualized resources and accessed by common internet protocols and network standards Cloud Computing is a paradigm in which information is permanently stored in servers on the internet and can be accessed from anywhere
  • 6. Data center Office space Servers and storages Team of technical personnel's Coolants Network Power
  • 7. Provides all the infrastructure needed to run applications over the internet  Increased storage  Reduced cost  Flexibility  Increased mobility  Highly automated
  • 8. -> Sometimes referred to as "on-demand software" is a software delivery model in which software and its associated data are hosted centrally and are typically accessed by users
  • 9. • ….enables you to create web applications quickly, without the • cost and complexity of buying and managing the underlying software or hardware… No Frequent updates Inexpensive
  • 11. Data Integrity and Data Privacy Availability and Reliability Bandwidth and Latency guarantees Portability and Compliance
  • 12. Cloud storage moves the user’s data to large data centers, which are remotely located, on which the user does not have any control However there are lot of security issues which need to be considered  Data integrity  Authentication  Small devices like PDA’s, mobiles, and laptops are associated with limited battery power and computation speed
  • 13. We provide a scheme which gives a proof of data integrity in the cloud through which the user can verify the correctness of his data, this proof can be termed as Proof of Retrievability (POR)  This enables individual to entertain  Economic advantages  Zero Maintenance Note: -> Our scheme just checks the integrity (if the data is illegally modified) only of static data…
  • 14.  This proof can be agreed upon by both the cloud and the customer and can be incorporated in SLA. SLA is part of service contract where the level of services being offered is formally defined.
  • 15. Key generator: A random key is generated Encryption: A metadata of the file is generated and is encrypted using any suitable algorithm Archive: It is the data center where the data is outsourced Challenge: Verification of data integrity by the user… Response: Proof of data integrity by data center
  • 16. A simplest Proof of Retrievability can be made using hash key function File (F) Data Center (archive) Cryptographic Hash Function Hk(F) User DB Hash Secret key (k) Encrypted file(~f) StoredRetrieves C H A L L E N G E Response
  • 17. • Computing hash value for moderately large file might be overhead for some device like Mobiles, PDA’s and Laptops • For each verification request from client the archive has to process the entire file • High resource cost and lot of ambiguity as a result of maintaining secret key and number of hash keys….
  • 18. Proposed a theory to proof the retrievability for large files using sentinels…. According to them 1 2 3 4 5 6 7 Data File( f ) s s s s s s s s s s s s s s s s s s s s s Data file with seven blocks Inserting sentinels at different positions and noting their position, present at different blocks File(~f) Encryption (~F ) Data Archive To hide the position of sentinels
  • 19. Computationally burdensome for entire file to be encrypted for small devices This scheme is best suited for encrypted files Data Center Cloud Storage Client
  • 20. In this we provide a scheme of data integrity , which the customer can utilize to check the correctness of his data by including SLA
  • 21. M bits M bits M bits M bits M bits M bits File (F) with n blocks, and each block of size M bits K bits K<<<M, K bit positions are noted Where K is user defined E M1 K bits E M2 K bits E M3 K bits E M4 K bits E M5 K bits E M6 Metadata Encrypting k bits using any appropriate algorithm Generation of individual metadata
  • 22. File (F) Metadata Data Center File is appended with metadata New file (~F) is stored at data center Client challenges by specifying (ith) block of file and the jth bit of i Response and challenge should be same to accept the file
  • 25. Our scheme is only for static data Developing for dynamic data will be a future challenge