A Compressive Integrity Auditing Protocol for Secure Cloud Storage
ABSTARCT :
With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the knowledge of the indices of the audited blocks and tags, which thus requires the cloud to store both data blocks and tags for integrity verification. In this article, we present a compressive secure cloud storage protocol inspired by Goldreich-Goldwasser-Halevi (GGH) cryptosystem. Since the aggregated blocks can be reconstructed from the aggregated tags without the help of data indices, the cloud can only store data tags for providing the verifiable integrity proof. In this way, communication and storage costs can be hugely reduced and user private information can be hidden from the cloud. Furthermore, the proposed protocol only contains a few basic algebraic operations, making it highly efficient. We also provide formal security proof of the proposed protocol regarding forge, replay and replace attacks. In addition, we explore a new technique to support data dynamics. Furthermore, we establish a generic framework of compressive secure cloud storage protocols. Finally, we provide the theoretical analysis and experimental results, which further validate the effectiveness of the proposed protocol.
EXISTING SYSTEM :
? Existing system has vast storage for storing information and also allows exchange of data between the cloud and user.
? To overcome these existing problems this project proposes a system which handles both Integrity auditing and Data Deduplication.
? The design of the HMAC specification was motivated by the existence of attacks on more trivial mechanisms for combining a key with a hash function.
? To insert a new block or delete an existing block, it must move forward or backward the remaining (n/k - i) blocks of the DCT, which contains (n/k) blocks.
? Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data.
DISADVANTAGE :
? The obvious problem of this simple strategy is the huge overheads of computation and communication.
? Although it is a strong protocol for data integrity, there is one inevitable problem.
? One problem of random sampling schemes is that they cannot assure in 100 % confidence.
? However, the major problem of this scheme is the limited number of challenge once the sentinel embedded file is upload to the prover.
? This scheme efficiently solves the dynamic operation problem but has the drawback that the messages exchanged between the Client and the Server is proportional to the number of file blocks.
PROPOSED SYSTEM :
• The proposed system will achieve both file de-duplication and integrity auditing.
• Our proposed system successfully achieved Integrity auditing and secure de-duplication in cloud, which are main factors in achieving security in cloud.
• We propose a system for plainly examining integument looking under encoded share of the information.
• The proposed architecture of Cloud storage is a layered, cooperative architecture where the key technologies involved are data storage, data migration, data retrieval, data security etc.
• Compared with the relevant schemes in the literature, security analysis and performance evaluations show that the proposed scheme gains some advantages in integrity verification and dynamic updating.
ADVANTAGE :
? The Efficient Provable Data Possession (E-PDP) scheme achieved a higher performance at the cost of a weaker guarantee by eliminating all coefficients aj in the GenProof and CheckProof algorithms.
? The overhead of POR mainly includes the storage for error-correcting code and sentinels, as well as computation of error-correcting code and permutation operations. Several optimization can be done to improve POR’s performance.
? The extended scheme achieved higher efficiency because it only relied on symmetry-key cryptography.
? PDP provides a high probability guarantee that a system possesses a file with high efficiency in computation and communication.
? However, there is not sufficient study on efficiency and performance.
|