An Efficient Auditing Scheme For Data Storage Security in Cloud
An Efficient Auditing Scheme For Data Storage Security in Cloud
user and their data over the cloud. Cloud computing has
Abstract — Cloud computing provides tremendous data
become more and more advanced in the recent years. As the
storage and computing capabilities to its users. Large
resources are becoming dynamic, scalable and virtualized, the
amount of people can store various data onto the cloud
data has to be more secured in cloud. Therefore, auditing is
without any hesitation or limitations. Additional security
taking more attention for increased complexity of cloud
requires a secure cloud storage system with independent
resources for the researchers today. The auditing method
efficient auditing service to check the correctness of
makes storing and sharing of data easier in cloud [1].
outsourced data. Enormous users keep sending the data
over Internet and they are made stored in cloud data
centers remotely. The data files can be accessed by
Various cloud computing types include Public, Private, Hybrid
unauthorized users or hackers in the unsecured cloud
and Community based clouds used for various purposes
network. This leads in leaking of confidential data or data
globally. The security and privacy concern occur due to
loss during the transmission over the network. Hence
transfer of data and applications on network resources and
securing the cloud plays a very important role in cloud
various security policies. Data stored, processing and
environment. The data transfer over wireless network
movement of data outside the controls of an organization
across the globe has to be protected safely from
poses an inherent risk and making it vulnerable to various
unauthorized usage over the cloud. The data files and the
attacks. Privacy preserving is an important issue in business
remote data centers have to be given extra security as well
because the user who is accessing the cloud files may change
as maintenance capabilities from hackers or third party
the contents of the original file which may lead to legal
intruders. In this regard, data auditing along with privacy
consequences in future. Therefore, security is the biggest
preserving, integrity and dynamic capabilities plays as a
concern when it comes to cloud computing environment. The
proficient method for preventing from various cloud
main challenge here is to deal with the security and privacy
attacks which is considered in this work. In this work,
concerns of business thinking of adopting it. Hacking the
efficient auditor plays a crucial role in securing the cloud
cloud systems and network infrastructure would affect many
environment.
business clients as well as their profit which seriously need to
Keywords—Cloud computing, Data Auditing, Network be thought [2].
Security, Hacking, Data Centers
Data Auditability has been designed for cloud storage and
efficient storage auditing protocol has been proposed in this
I. INTRODUCTION
work. The proposed protocol uses dynamic operations with
data integrity and multiple batch auditing process. This work
The Forrester research says “The global cloud computing includes new cryptographic technique for encrypting and
market is going to reach $241 Billion in 2020 as that of $40.7 decrypting the data files in multi cloud environment.
Billion in 2010”.
In section 2, we have discussed the existing work related to
Almost every people who are using the modern technology in cloud security. In section 3, system design is discussed along
today’s world are making use of cloud computing techniques with overall cloud system architecture. Section 4 gives the
internally or externally. This is rated as the advancement in proposed solution for securing the cloud. Section 5 focuses on
storage technology towards cloud computing. Major results. Section 6 gives the conclusion to the work.
cryptographic techniques are proposed for performing security
much stronger way. Therefore, people from different area of II. RELATED WORK
specialization especially for business in companies are relying Many auditing framework has been designed for cloud storage
on cloud. The information of users in cloud servers are kept systems. Privacy preserving storage auditing protocol has been
secret as well as confidential which protects the privacy of given for securing the cloud systems. The cloud computing
security auditing system includes user auditing requirements,
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on January 24,2023 at 18:16:29 UTC from IEEE Xplore. Restrictions apply.
2017 International Conference on circuits Power and Computing Technologies [ICCPCT]
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on January 24,2023 at 18:16:29 UTC from IEEE Xplore. Restrictions apply.
2017 International Conference on circuits Power and Computing Technologies [ICCPCT]
in the table. The user processes and administrator process C. Integrity Phase: In integrity phase, the client or TPA
transactions are indicated in this phase [10]. checks the integrity of file blocks by selecting the subset of
Several processing operations under hacking process include those blocks. The data integrity verification is done by TPA by
modifying file, deleting file and uploading data files. challenging the server itself.
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on January 24,2023 at 18:16:29 UTC from IEEE Xplore. Restrictions apply.
2017 International Conference on circuits Power and Computing Technologies [ICCPCT]
Fig 3: Public Auditing based on Clients Figure 5 indicates the communication complexity issue which
includes number of block size with communication cost taken
Figure 3 gives the graph of public auditing for single user and for each task in the system.
multiple users based on the usage per task. X axis contains
time taken by one user and y axis the time taken shows for VI. CONCLUSION
number of users in term of seconds.
The public auditing system is presented which provides a
Figure 4 shows the comparison made between CSA algorithm privacy-preserving auditing protocol. The scheme supports a
with DES (Data Encryption Standard) algorithm. Algorithm in special auditor to audit the user’s data in the cloud without
the proposed work chosen for encrypting and decrypting of accessing the actual data contents. Thus we have made an
data files in the proposed work is CSA. The CSA algorithm is attempt to justify the security of proposed scheme using the
compared with DES algorithm which includes time taken from comparisons with the state-of-the art in cloud computing
each algorithm and number of tasks included significantly for environment.
each system.
REFERENCES
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on January 24,2023 at 18:16:29 UTC from IEEE Xplore. Restrictions apply.
2017 International Conference on circuits Power and Computing Technologies [ICCPCT]
Authorized licensed use limited to: University of Technology Jamaica. Downloaded on January 24,2023 at 18:16:29 UTC from IEEE Xplore. Restrictions apply.