SlideShare a Scribd company logo
Enabling Dynamic Data and Indirect Mutual Trust for
Cloud Computing Storage Systems
ABSTRACT:
Storage-as-a-Service offered by cloud service providers (CSPs) is a paid facility
that enables organizations to outsource their sensitive data to be stored on remote
servers. In this paper, we propose a cloud-based storage scheme that allows the
data owner to benefit from the facilities offered by the CSP and enables indirect
mutual trust between them. The proposed scheme has four important features: (i) it
allows the owner to outsource sensitive data to a CSP, and perform full block-level
dynamic operations on the outsourced data, i.e., block modification, insertion,
deletion, and append, (ii) it ensures that authorized users (i.e., those who have the
right to access the owner’s file) receive the latest version of the outsourced data,
(iii) it enables indirect mutual trust between the owner and the CSP, and (iv) it
allows the owner to grant or revoke access to the outsourced data. We discuss the
security issues of the proposed scheme. Besides, we justify its performance
through theoretical analysis and a prototype implementation on Amazon cloud
platform to evaluate storage, communication, and computation overheads.
EXISTING SYSTEM:
Commonly, traditional access control techniques assume the existence of the data
owner and the storage servers in the same trust domain. This assumption, however,
no longer holds when the data is outsourced to a remote CSP, which takes the full
charge of the outsourced data management, and resides outside the trust domain of
the data owner.
DISADVANTAGES OF EXISTING SYSTEM:
CSP needs to be safeguarded from a dishonest owner, who attempts to get illegal
compensations by falsely claiming data corruption over cloud servers. This
concern, if not properly handled, can cause the CSP to go out of business.
PROPOSED SYSTEM:
In this work, we propose a scheme that addresses important issues related to
outsourcing the storage of data, namely dynamic data, newness, mutual trust, and
access control.
The remotely stored data can be not only accessed by authorized users, but also
updated and scaled by the owner. After updating, authorized users should receive
the latest version of the data (newness property), i.e., a technique is required to
detect whether the received data is stale. Mutual trust between the data owner and
the CSP is another imperative issue, which is addressed in the proposed scheme.
A mechanism is introduced to determine the dishonest party, i.e., misbehavior from
any side is detected and the responsible party is identified.
Last but not least, the access control is considered, which allows the owner to grant
or revoke access rights to the outsourced data.
ADVANTAGES OF PROPOSED SYSTEM:
(i) It allows a data owner to outsource the data to a CSP, and perform full dynamic
operations at the block-level, i.e., it supports operations such as block
modification, insertion, deletion, and append;
(ii) It ensures the newness property, i.e., the authorized users receive the most
recent version of the outsourced data;
(iii) It establishes indirect mutual trust between the data owner and the CSP since
each party resides in a different trust domain; and
(iv) It enforces the access control for the outsourced data
ARCHITECTURE:
ALGORITHM USED:
Broadcast Encryption Algorithm
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 inch VGA Colour.
Mouse : Logitech Mouse.
Ram : 512 MB
Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS:
Operating System : Windows XP.
Coding Language : JAVA
Database : MYSQL
REFERENCE:
Ayad Barsoum and Anwar Hasan, “Enabling Dynamic Data and Indirect Mutual
Trust for Cloud Computing Storage Systems”, IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, 2013.

More Related Content

DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
Privacy preserving public auditing for secure cloud storage
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PPTX
Privacy preserving public auditing
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOC
Oruta privacy preserving public auditing
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Privacy preserving public auditing for secure cloud storage
Oruta privacy preserving public auditing for shared data in the cloud
Privacy preserving public auditing
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta privacy preserving public auditing
Enabling data dynamic and indirect mutual trust for cloud computing storage s...

What's hot (14)

DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PPTX
Oruta ppt
DOCX
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPT
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for secure cloud storage
DOCX
oruta privacy-preserving public auditing for shared data in the cloud
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PPT
Privacy preserving public auditing for regenerating-code-based
PPT
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
Oruta privacy preserving public auditing for shared data in the cloud
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Oruta ppt
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
oruta privacy-preserving public auditing for shared data in the cloud
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Privacy preserving public auditing for regenerating-code-based
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ad

Viewers also liked (15)

PDF
Whadddyathink
PDF
Android ieee projects 2012
DOCX
Adaptive membership functions for hand written character recognition by voron...
DOCX
A stochastic model of multivirus dynamics
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PPTX
Sindrome compartimental expo 1
PDF
2012 ieee android project titles
PDF
2012 13 eee ieee projects - jp infotech
PDF
IEEE PROJECTS 2013 for me
DOCX
A gossip protocol for dynamic resource management in large cloud environments
PDF
The China Analyst - September 2011
Whadddyathink
Android ieee projects 2012
Adaptive membership functions for hand written character recognition by voron...
A stochastic model of multivirus dynamics
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
A trigger identification service for defending reactive jammers in wireless s...
Sindrome compartimental expo 1
2012 ieee android project titles
2012 13 eee ieee projects - jp infotech
IEEE PROJECTS 2013 for me
A gossip protocol for dynamic resource management in large cloud environments
The China Analyst - September 2011
Ad

Similar to Enabling dynamic data and indirect mutual trust for cloud computing storage systems (20)

DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
DOCX
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
PPT
Ppt1 130410095050-phpapp01
PPT
Ppt1 130410095050-phpapp01
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Enabling data dynamic and indirec...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharma ospi slides which help in ospi learning
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Basic Mud Logging Guide for educational purpose
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
RMMM.pdf make it easy to upload and study
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharma ospi slides which help in ospi learning
Complications of Minimal Access Surgery at WLH
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Basic Mud Logging Guide for educational purpose
2.FourierTransform-ShortQuestionswithAnswers.pdf

Enabling dynamic data and indirect mutual trust for cloud computing storage systems

  • 1. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems ABSTRACT: Storage-as-a-Service offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. The proposed scheme has four important features: (i) it allows the owner to outsource sensitive data to a CSP, and perform full block-level dynamic operations on the outsourced data, i.e., block modification, insertion, deletion, and append, (ii) it ensures that authorized users (i.e., those who have the right to access the owner’s file) receive the latest version of the outsourced data, (iii) it enables indirect mutual trust between the owner and the CSP, and (iv) it allows the owner to grant or revoke access to the outsourced data. We discuss the security issues of the proposed scheme. Besides, we justify its performance through theoretical analysis and a prototype implementation on Amazon cloud platform to evaluate storage, communication, and computation overheads.
  • 2. EXISTING SYSTEM: Commonly, traditional access control techniques assume the existence of the data owner and the storage servers in the same trust domain. This assumption, however, no longer holds when the data is outsourced to a remote CSP, which takes the full charge of the outsourced data management, and resides outside the trust domain of the data owner. DISADVANTAGES OF EXISTING SYSTEM: CSP needs to be safeguarded from a dishonest owner, who attempts to get illegal compensations by falsely claiming data corruption over cloud servers. This concern, if not properly handled, can cause the CSP to go out of business. PROPOSED SYSTEM: In this work, we propose a scheme that addresses important issues related to outsourcing the storage of data, namely dynamic data, newness, mutual trust, and access control. The remotely stored data can be not only accessed by authorized users, but also updated and scaled by the owner. After updating, authorized users should receive the latest version of the data (newness property), i.e., a technique is required to
  • 3. detect whether the received data is stale. Mutual trust between the data owner and the CSP is another imperative issue, which is addressed in the proposed scheme. A mechanism is introduced to determine the dishonest party, i.e., misbehavior from any side is detected and the responsible party is identified. Last but not least, the access control is considered, which allows the owner to grant or revoke access rights to the outsourced data. ADVANTAGES OF PROPOSED SYSTEM: (i) It allows a data owner to outsource the data to a CSP, and perform full dynamic operations at the block-level, i.e., it supports operations such as block modification, insertion, deletion, and append; (ii) It ensures the newness property, i.e., the authorized users receive the most recent version of the outsourced data; (iii) It establishes indirect mutual trust between the data owner and the CSP since each party resides in a different trust domain; and (iv) It enforces the access control for the outsourced data
  • 4. ARCHITECTURE: ALGORITHM USED: Broadcast Encryption Algorithm SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 inch VGA Colour. Mouse : Logitech Mouse. Ram : 512 MB
  • 5. Keyboard : Standard Keyboard SOFTWARE REQUIREMENTS: Operating System : Windows XP. Coding Language : JAVA Database : MYSQL REFERENCE: Ayad Barsoum and Anwar Hasan, “Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013.