SlideShare une entreprise Scribd logo
1  sur  10
Privacy-Preserving Public Auditing For Secure Cloud
Storage
ABSTRACT:
Using cloud storage, users can remotely store their data and enjoy the on-demand
high-quality applications and services from a shared pool of configurable
computing resources, without the burden of local data storage and maintenance.
However, the fact that users no longer have physical possession of the outsourced
data makes the data integrity protection in cloud computing a formidable task,
especially for users with constrained computing resources. Moreover, users should
be able to just use the cloud storage as if it is local, without worrying about the
need to verify its integrity. Thus, enabling public auditability for cloud storage is of
critical importance so that users can resort to a third-party auditor (TPA) to check
the integrity of outsourced data and be worry free. To securely introduce an
effective TPA, the auditing process should bring in no new vulnerabilities toward
user data privacy, and introduce no additional online burden to user. In this paper,
we propose a secure cloud storage system supporting privacy-preserving public
auditing. We further extend our result to enable the TPA to perform audits for
multiple users simultaneously and efficiently. Extensive security and performance
analysis show the proposed schemes are provably secure and highly efficient. Our
preliminary experiment conducted on Amazon EC2 instance further demonstrates
the fast performance of the design.
EXISTING SYSTEM:
In the Existing systems, the notion of public auditability has been proposed in the
context of ensuring remotely stored data integrity under different system and
security models. Public auditability allows an external party, in addition to the user
himself, to verify the correctness of remotely stored data. However, most of these
schemes do not consider the privacy protection of users’ data against external
auditors. Indeed, they may potentially reveal user’s data to auditors. This severe
drawback greatly affects the security of these protocols in cloud computing. From
the perspective of protecting data privacy, the users, who own the data and rely on
TPA just for the storage security of their data, do not want this auditing process
introducing new vulnerabilities of unauthorized information leakage toward their
data security.
DISADVANTAGES OF EXISTING SYSTEM:
 Although the infrastructures under the cloud are much more powerful and
reliable than personal computing devices, they are still facing the broad range of
both internal and external threats for data integrity.
 Second, there do exist various motivations for CSP to behave unfaithfully
toward the cloud users regarding their outsourced data status.
 In particular, simply downloading all the data for its integrity verification is not
a practical solution due to the expensiveness in I/O and transmission cost across
the network. Besides, it is often insufficient to detect the data corruption only
when accessing the data, as it does not give users correctness assurance for
those unaccessed data and might be too late to recover the data loss or damage.
 Encryption does not completely solve the problem of protecting data privacy
against third-party auditing but just reduces it to the complex key management
domain. Unauthorized data leakage still remains possible due to the potential
exposure of decryption keys.
PROPOSED SYSTEM:
In this paper, we utilize the public key based homomorphic authenticator and
uniquely integrate it with random mask technique to achieve a privacy-preserving
public auditing system for cloud data storage security while keeping all above
requirements in mind. To support efficient handling of multiple auditing tasks, we
further explore the technique of bilinear aggregate signature to extend our main
result into a multi-user setting, where TPA can perform multiple auditing tasks
simultaneously. Extensive security and performance analysis shows the proposed
schemes are provably secure and highly efficient. We also show how to extent our
main scheme to support batch auditing for TPA upon delegations from multi-users.
ADVANTAGES OF PROPOSED SYSTEM:
1. Public auditability: to allow TPA to verify the correctness of the cloud data
on demand without retrieving a copy of the whole data or introducing
additional online burden to the cloud users.
2. Storage correctness: to ensure that there exists no cheating cloud server
that can pass the TPA’s audit without indeed storing users’ data intact.
3. Privacy preserving: to ensure that the TPA cannot derive users’ data
content from the information collected during the auditing process.
4. Batch auditing: to enable TPA with secure and efficient auditing capability
to cope with multiple auditing delegations from possibly large number of
different users simultaneously
5. Lightweight: to allow TPA to perform auditing with minimum
communication and computation overhead.
MODULES:
1. Privacy-Preserving Public Auditing Module:
Homomorphic authenticators are unforgeable verification metadata
generated from individual data blocks, which can be securely aggregated in
such a way to assure an auditor that a linear combination of data blocks is
correctly computed by verifying only the aggregated authenticator.
Overview to achieve privacy-preserving public auditing, we propose to
uniquely integrate the homomorphic authenticator with random mask
technique. In our protocol, the linear combination of sampled blocks in the
server’s response is masked with randomness generated by a pseudo random
function (PRF). The proposed scheme is as follows:
Setup Phase
Audit Phase
2. Batch Auditing Module:
With the establishment of privacy-preserving public auditing in Cloud
Computing, TPA may concurrently handle multiple auditing delegations
upon different users’ requests. The individual auditing of these tasks for
TPA can be tedious and very inefficient. Batch auditing not only allows TPA
to perform the multiple auditing tasks simultaneously, but also greatly
reduces the computation cost on the TPA side.
3. Data Dynamics Module:
Hence, supporting data dynamics for privacy-preserving public risk auditing
is also of paramount importance. Now we show how our main scheme can
be adapted to build upon the existing work to support data dynamics,
including block level operations of modification, deletion and insertion. We
can adopt this technique in our design to achieve privacy-preserving public
risk auditing with support of data dynamics.
SYSTEM ARCHITECTURE:
ALGORITHMS USED:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
REFERENCE:
Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE,
Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE
“Privacy- Preserving Public Auditing for Secure Cloud Storage”, IEEE
TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013

Contenu connexe

Tendances

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Sathya Moorthy
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
sibidlegend
 

Tendances (20)

Oruta project report
Oruta project reportOruta project report
Oruta project report
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
L04302088092
L04302088092L04302088092
L04302088092
 
Observability
ObservabilityObservability
Observability
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 

En vedette

Sang tao slogan cho vivavivu
Sang tao slogan cho vivavivuSang tao slogan cho vivavivu
Sang tao slogan cho vivavivu
Nguyen D
 
Csc roles & responsibility
Csc roles & responsibilityCsc roles & responsibility
Csc roles & responsibility
Sandipan Dhar
 
ICT & Digital Divide by John Jacob
ICT & Digital Divide by John JacobICT & Digital Divide by John Jacob
ICT & Digital Divide by John Jacob
pumascomm
 
First fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labviewFirst fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labview
Oregon FIRST Robotics
 
Hayden -- Social Super Forum
Hayden -- Social Super ForumHayden -- Social Super Forum
Hayden -- Social Super Forum
BOLO Conference
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
JPINFOTECH JAYAPRAKASH
 
Smykova logo all
Smykova logo allSmykova logo all
Smykova logo all
ya_sandu
 
Physics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasuPhysics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasu
Sandipan Dhar
 

En vedette (19)

May 2012 - Real Estate Market Updates
May 2012 - Real Estate Market UpdatesMay 2012 - Real Estate Market Updates
May 2012 - Real Estate Market Updates
 
John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131
 
Sang tao slogan cho vivavivu
Sang tao slogan cho vivavivuSang tao slogan cho vivavivu
Sang tao slogan cho vivavivu
 
Recent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the WorldRecent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the World
 
Ctizen journalism
Ctizen journalismCtizen journalism
Ctizen journalism
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiring2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiring
 
A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...
 
Csc roles & responsibility
Csc roles & responsibilityCsc roles & responsibility
Csc roles & responsibility
 
ICT & Digital Divide by John Jacob
ICT & Digital Divide by John JacobICT & Digital Divide by John Jacob
ICT & Digital Divide by John Jacob
 
First fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labviewFirst fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labview
 
Cop form
Cop formCop form
Cop form
 
TEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni ClubTEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni Club
 
Yeager -- Curation
Yeager -- CurationYeager -- Curation
Yeager -- Curation
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Hayden -- Social Super Forum
Hayden -- Social Super ForumHayden -- Social Super Forum
Hayden -- Social Super Forum
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
 
Smykova logo all
Smykova logo allSmykova logo all
Smykova logo all
 
Physics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasuPhysics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasu
 

Similaire à Privacy preserving public auditing for secure cloud storage

Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
karthika kathirvel
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 

Similaire à Privacy preserving public auditing for secure cloud storage (20)

JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
V04405122126
V04405122126V04405122126
V04405122126
 
Homomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacyHomomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacy
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
50120140503020
5012014050302050120140503020
50120140503020
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Privacy preserving public auditing for secure cloud storage

  • 1. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our
  • 2. preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. EXISTING SYSTEM: In the Existing systems, the notion of public auditability has been proposed in the context of ensuring remotely stored data integrity under different system and security models. Public auditability allows an external party, in addition to the user himself, to verify the correctness of remotely stored data. However, most of these schemes do not consider the privacy protection of users’ data against external auditors. Indeed, they may potentially reveal user’s data to auditors. This severe drawback greatly affects the security of these protocols in cloud computing. From the perspective of protecting data privacy, the users, who own the data and rely on TPA just for the storage security of their data, do not want this auditing process introducing new vulnerabilities of unauthorized information leakage toward their data security. DISADVANTAGES OF EXISTING SYSTEM:  Although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity.
  • 3.  Second, there do exist various motivations for CSP to behave unfaithfully toward the cloud users regarding their outsourced data status.  In particular, simply downloading all the data for its integrity verification is not a practical solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those unaccessed data and might be too late to recover the data loss or damage.  Encryption does not completely solve the problem of protecting data privacy against third-party auditing but just reduces it to the complex key management domain. Unauthorized data leakage still remains possible due to the potential exposure of decryption keys. PROPOSED SYSTEM: In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed
  • 4. schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. ADVANTAGES OF PROPOSED SYSTEM: 1. Public auditability: to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional online burden to the cloud users. 2. Storage correctness: to ensure that there exists no cheating cloud server that can pass the TPA’s audit without indeed storing users’ data intact. 3. Privacy preserving: to ensure that the TPA cannot derive users’ data content from the information collected during the auditing process. 4. Batch auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously 5. Lightweight: to allow TPA to perform auditing with minimum communication and computation overhead.
  • 5. MODULES: 1. Privacy-Preserving Public Auditing Module: Homomorphic authenticators are unforgeable verification metadata generated from individual data blocks, which can be securely aggregated in such a way to assure an auditor that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. Overview to achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic authenticator with random mask technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated by a pseudo random function (PRF). The proposed scheme is as follows: Setup Phase Audit Phase 2. Batch Auditing Module: With the establishment of privacy-preserving public auditing in Cloud Computing, TPA may concurrently handle multiple auditing delegations upon different users’ requests. The individual auditing of these tasks for TPA can be tedious and very inefficient. Batch auditing not only allows TPA
  • 6. to perform the multiple auditing tasks simultaneously, but also greatly reduces the computation cost on the TPA side. 3. Data Dynamics Module: Hence, supporting data dynamics for privacy-preserving public risk auditing is also of paramount importance. Now we show how our main scheme can be adapted to build upon the existing work to support data dynamics, including block level operations of modification, deletion and insertion. We can adopt this technique in our design to achieve privacy-preserving public risk auditing with support of data dynamics.
  • 9. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA REFERENCE: Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE
  • 10. “Privacy- Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013