0% found this document useful (0 votes)
55 views6 pages

Data Integrity Proofs in Cloud Storage

This document proposes a scheme for verifying data integrity in cloud storage. It describes existing solutions that are costly and computationally intensive. The proposed scheme uses metadata generated from file blocks and encrypted with an algorithm like XOR. This metadata is appended to the file before storing in the cloud. During verification, the metadata is used to check if the integrity of the stored data is maintained and not illegally modified or deleted by the cloud. The scheme requires less computation than existing solutions and allows verification of multiple files using a single key.

Uploaded by

Usha Baburaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views6 pages

Data Integrity Proofs in Cloud Storage

This document proposes a scheme for verifying data integrity in cloud storage. It describes existing solutions that are costly and computationally intensive. The proposed scheme uses metadata generated from file blocks and encrypted with an algorithm like XOR. This metadata is appended to the file before storing in the cloud. During verification, the metadata is used to check if the integrity of the stored data is maintained and not illegally modified or deleted by the cloud. The scheme requires less computation than existing solutions and allows verification of multiple files using a single key.

Uploaded by

Usha Baburaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

Data Integrity Proofs in Cloud Storage

Abstract:
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT
Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is
being generated it proves costly for enterprises or individual users to frequently update their
hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in
reducing the maintenance. Cloud storage moves the users data to large data centers, which are
remotely located, on which user does not have any control. However, this unique feature of the
cloud poses many new security challenges which need to be clearly understood and resolved. We
provide a scheme which gives a proof of data integrity in the cloud which the customer can
employ to check the correctness of his data in the cloud. This proof can be agreed upon by both
the cloud and the customer and can be incorporated in the Service level agreement (SLA).

Existing System:
As data generation is far outpacing data storage it proves costly for small firms to frequently
update their hardware whenever additional data is created. Also maintaining the storages can be a
difficult task. It transmitting the file across the network to the client can consume heavy
bandwidths. The problem is further complicated by the fact that the owner of the data may be a
small device, like a PDA (personal digital assist) or a mobile phone, which have limited CPU
power, battery power and communication bandwidth.
Disadvantages:

The main drawback of this scheme is the high resource costs it requires for the
implementation.

Also computing hash value for even a moderately large data files can be computationally
burdensome for some clients (PDAs, mobile phones, etc).

Data encryption is large so the disadvantage is small users with limited computational
power (PDAs, mobile phones etc.).

Proposed System:

One of the important concerns that need to be addressed is to assure the customer of the integrity
i.e. correctness of his data in the cloud. As the data is physically not accessible to the user the
cloud should provide a way for the user to check if the integrity of his data is maintained or is
compromised. In this paper we provide a scheme which gives a proof of data integrity in the
cloud which the customer can employ to check the correctness of his data in the cloud. This
proof can be agreed upon by both the cloud and the customer and can be incorporated in the
Service level agreement (SLA). It is important to note that our proof of data integrity protocol
just checks the integrity of data i.e. if the data has been illegally modified or deleted.

Advantages:

Apart from reduction in storage costs data outsourcing to the cloud also helps in
reducing the maintenance.
Avoiding local storage of data.
By reducing the costs of storage, maintenance and personnel.
It reduces the chance of losing data by hardware failures.
Not cheating the owner.

Architecture:

Algorithm:
Meta-Data Generation:

Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file
blocks. We initially preprocess the file and create metadata to be appended to the file. Let each of
the n data blocks have m bits in them. A typical data file F which the client wishes to store in the
cloud.
Each of the Meta data from the data blocks mi is encrypted by using a suitable algorithm to give
a new modified Meta data Mi. Without loss of generality we show this process by using a simple
XOR operation. The encryption method can be improvised to provide still stronger protection for
verifiers data. All the Meta data bit blocks that are generated using the above procedure are to be
concatenated together. This concatenated Meta data should be appended to the file F before

storing it at the cloud server. The file F along with the appended Meta data e F is archived with
the cloud.

Modules:
Cloud Storage:
Data outsourcing to cloud storage servers is raising trend among many firms and users owing to
its economic advantages. This essentially means that the owner (client) of the data moves its data
to a third party cloud storage server which is supposed to - presumably for a fee - faithfully store
the data with it and provide it back to the owner whenever required.

Simply Archives:
This problem tries to obtain and verify a proof that the data that is stored by a user at remote data
storage in the cloud (called cloud storage archives or simply archives) is not modified by the
archive and thereby the integrity of the data is assured. Cloud archive is not cheating the owner,
if cheating, in this context, means that the storage archive might delete some of the data or may
modify some of the data. While developing proofs for data possession at untrusted cloud storage
servers we are often limited by the resources at the cloud server as well as at the client.

Sentinels:
In this scheme, unlike in the key-hash approach scheme, only a single key can be used
irrespective of the size of the file or the number of files whose retrievability it wants to verify.
Also the archive needs to access only a small portion of the file F unlike in the key-has scheme

which required the archive to process the entire file F for each protocol verification. If the prover
has modified or deleted a substantial portion of F, then with high probability it will also have
suppressed a number of sentinels.

Verification Phase:
The verifier before storing the file at the archive, preprocesses the file and appends some Meta
data to the file and stores at the archive. At the time of verification the verifier uses this Meta
data to verify the integrity of the data. It is important to note that our proof of data integrity
protocol just checks the integrity of data i.e. if the data has been illegally modified or deleted. It
does not prevent the archive from modifying the data.

System Requirements:
Hardware Requirements:

System

: Pentium IV 2.4 GHz.

Hard Disk

: 40 GB.

Floppy Drive : 1.44 Mb.

Monitor

: 15 VGA Colour.

Mouse

: Logitech.

Ram

: 512 Mb.

Software Requirements:

Operating system

: Windows XP.

Coding Language

: ASP.Net with C#

Data Base

: SQL Server 2005

REFERENCE:
Sravan Kumar, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage, IEEE Conference
2011.

You might also like