Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computi
#1

[attachment=14749]
[b
Abstract:[/b]
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.
System Analysis
Existing System

Although envisioned as a promising service platform for the Internet, this new data storage paradigm in “Cloud” brings about many challenging design issues which have profound influence on the security and performance of the overall system. One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. For example, the storage service provider, which experiences Byzantine failures occasionally, may decide to hide the data errors from the clients for the benefit of their own. What is more serious is that for saving money and storage space the service provider might neglect to keep or deliberately delete rarely accessed data files which belong to an ordinary client. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical integrity verifications without the local copy of data files.
Proposed System
In order to solve this problem, many schemes are proposed under different systems and security models. In all these works, great efforts are made to design solutions that meet various requirements: high scheme efficiency, stateless verification, unbounded use of queries and retrievability of data, etc. Considering the role of the verifier in the model, all the schemes presented before fall into two categories: private verifiability and public verifiability. Although schemes with private verifiability can achieve higher scheme efficiency, public verifiability allows anyone, not just the client (data owner), to challenge the cloud server for correctness of data storage while keeping no private information. Then, clients are able to delegate the evaluation of the service performance to an independent third party auditor (TPA), without devotion of their computation resources. In the cloud, the clients themselves are unreliable or cannot afford the overhead of performing frequent integrity checks. Thus, for practical use, it seems more rational to equip the verification protocol with public verifiability, which is expected to play a more important role in achieving economies of scale for Cloud Computing. That is, the outsourced data themselves should not be required by the verifier for the verification purpose. In the context of public verification, the importance of blocklessness goes even further because a TPA should not be allowed to possess
the original data files for the obvious security concern.
In this paper we present a framework and an efficient construction for seamless integration of these two components in our protocol design. Our contribution can be summarized as follows:
Module1(Admin Module):
1. We propose a general formal PoR model with public verifiability for cloud data storage, in which both blockless and stateless verification are achieved simultaneously;
Module2(Authorized User Module):
2. We equip the proposed PoR construction with the function of supporting for fully dynamic data operations, especially to support block insertion, which is missing in most existing schemes;
Module3(Public User Module):
3. We prove the security of our proposed construction and justify the performance of our scheme through concrete implementation and comparisons with the state-of-the-art.
System Requirement:
H/W System Requirement

Processor - Pentium –III
Speed - 1.1 GHz
RAM - 256 MB (min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Requirement
 Operating System : Windows 95/98/2000/NT4.0.
 Application Server : Tomcat5.0
 Front End : HTML, Java.
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql.
 Database Connectivity : JDBC.
Reply
#2
Hey ... I am trying to work on this topic. Anyone have some ideas, bits or code Please share with me.
Reply
#3
To get more information about the topic "Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computi" please refer the page link below
http://studentbank.in/report-enabling-pu...8#pid56758
Reply
#4
can u provide ppt 4 this paper
Reply
#5
To get more information about the topic "Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computi" please refer the page link below
http://studentbank.in/report-enabling-pu...8#pid56758
Reply
#6
hey,
anybody have this project...
I need it..
Reply
#7
Do you have this project...?
I need it for my MTech.
Reply
#8


to get information about the topic"Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computi" refer the page link bellow

http://studentbank.in/report-enabling-pu...ud-computi
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: security and the cloud, synopsis of data storage security project, seminar data storage in cloud, data dynamics in cloud computing, enabling public auditability and data dynamics for storage security in cloud computin reference http seminarprojects com thre, application of enabling public auditability and data dynamics for storage security in cloud computing ppt, reference for enabling public auditability and data dynamics for security storage in cloud computing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,063 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Ar 1 1,029 15-02-2017, 04:39 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 891 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 818 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 750 14-02-2017, 04:15 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,807 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,646 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,812 06-11-2015, 02:27 PM
Last Post: seminar report asees

Forum Jump: