Security and Privacy Preserving in Cloud Computing

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

SECURITY AND PRIVACY PRESERVING IN CLOUD

COMPUTING
ABSTRACT
 TPA eliminates the involvement of the client through the auditing of whether his data
stored in the cloud is indeed intact, which can be important in achieving economies
of scale for Cloud Computing.

 The trust based cloud depends on both cloud users as well as TPA. If any changes
appear in the content of the remote file the intimation will be immediately posted to
the file owner without any delay.

 It describes a secure cloud storage system supporting privacy-preserving public


auditing, and further extend to enable the TPA to perform audits for multiple users
efficiently.
EXISTING SYSTEM
 To securely introduce an effective third party auditor (TPA), the following two
fundamental requirements have to be met:

 1) TPA should be able to efficiently audit the cloud data storage without demanding
the local copy of data, and introduce no additional on-line burden to the cloud user;

 2) The third party auditing process should bring in no new vulnerabilities towards
user data privacy.
DISADVANTAGES
 No user data privacy

 Security risks towards the correctness of the data in cloud

 Data encryption is large so the disadvantage is small users with


limited computational power (PDAs, mobile phones etc.).

 The main drawback of this scheme is the high resource costs it


requires for the implementation.
PROPOSED SYSTEM
 We focus on cloud data storage security, which has always been an important aspect
of quality of service.

 To ensure the correctness of users’ data in the cloud, we propose an effective and
flexible distributed scheme with two salient features, opposing to its predecessors.

 By utilizing the homomorphism token with distributed verification of erasure-coded


data, our scheme achieves the integration of storage correctness insurance and data
error localization, i.e., the identification of misbehaving server(s).

 Unlike most prior works, the new scheme further supports secure and efficient
dynamic operations on data blocks, including: data update, delete and append.
ADVANTAGES
 We utilize the public key based homomorphic authenticator and
uniquely integrate it with random mask technique to achieve a
privacy-preserving public auditing system for cloud data storage
security while keeping all above requirements in mind.

 To support efficient handling of multiple auditing tasks, we further


explore the technique of bilinear aggregate signature to extend our
main result into a multi-user setting, where TPA can perform
multiple auditing tasks simultaneously.

 Extensive security and performance analysis shows the proposed


schemes are provably secure and highly efficient.

 We also show how to extent our main scheme to support batch


auditing for TPA upon delegations from multi-users.
OVERALL SYSTEM DESIGN
DATA FLOW DIAGRAM
L ogin

Yes No
User Exists

No

Authenticated Create Account


User

Yes

K ey Generation

Up load Files

Store into File


Database

S tore into image


Database

Download Files

Display The Files


MODULES
 Privacy Preserving Public Auditing
 Batch Auditing
 Data Dynamics
 Simply Archives
 Sentinels
 Verification Phase
PRIVACY PRESERVING PUBLIC AUDITING

 Homomorphic authenticators are unforgeable verification metadata


generated from individual data blocks, which can be securely
aggregated in such a way to assure an auditor that a linear
combination of data blocks is correctly computed by verifying
only the aggregated authenticator. Overview to achieve privacy-
preserving public auditing, we propose to uniquely integrate the
homomorphic authenticator with random mask technique. In our
protocol, the linear combination of sampled blocks in the server’s
response is masked with randomness generated by a pseudo
random function (PRF).
BATCH AUDITING

 With the establishment of privacy-preserving public


auditing in Cloud Computing, TPA may concurrently
handle multiple auditing delegations upon different
users’ requests. The individual auditing of these tasks for
TPA can be tedious and very inefficient. Batch auditing
not only allows TPA to perform the multiple auditing
tasks simultaneously, but also greatly reduces the
computation cost on the TPA side.
DATA DYNAMICS

 Hence, supporting data dynamics for privacy-preserving


public risk auditing is also of paramount importance.
Now we show how our main scheme can be adapted to
build upon the existing work to support data dynamics,
including block level operations of modification,
deletion and insertion. We can adopt this technique in
our design to achieve privacy-preserving public risk
auditing with support of data dynamics
SIMPLY ARCHIVES

 This problem tries to obtain and verify a proof that the data that
is stored by a user at remote data storage in the cloud (called
cloud storage archives or simply archives) is not modified by the
archive and thereby the integrity of the data is assured. Cloud
archive is not cheating the owner, if cheating, in this context,
means that the storage archive might delete some of the data or
may modify some of the data. While developing proofs for data
possession at untrusted cloud storage servers we are often limited
by the resources at the cloud server as well as at the client.
SENTINELS

 In this scheme, unlike in the key-hash approach scheme,


only a single key can be used irrespective of the size of the
file or the number of files whose retrievability it wants to
verify. Also the archive needs to access only a small portion
of the file F unlike in the key-has scheme which required
the archive to process the entire file F for each protocol
verification. If the prover has modified or deleted a
substantial portion of F, then with high probability it will
also have suppressed a number of sentinels.
VERIFICATION PHASE

The verifier before storing the file at the archive,


preprocesses the file and appends some Meta data to the
file and stores at the archive. At the time of verification the
verifier uses this Meta data to verify the integrity of the
data. It is important to note that our proof of data integrity
protocol just checks the integrity of data i.e. if the data has
been illegally modified or deleted. It does not prevent the
archive from modifying the data.
REQUIREMENT SPECIFICATION

Hardware Requirements
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 Mb
Monitor : 15 VGA Colour
Mouse : Logitech
Ram : 512 Mb
Software Requirements
Operating system : Windows XP
Technology Used : Microsoft Visual Studio Coding
Language : ASP.NET
Data Base : Microsoft SQL Server
CONCLUSION
 Seeing the popularity of outsourcing archival storage to the
cloud, it is desirable to enable clients to verify the integrity of
their data in the cloud.

 We design and implement a practical data integrity


protection (DIP) scheme for functional minimum storage
regenerating (FMSR) codes under a multiserver setting.

 Our DIP scheme preserves the fault tolerance and repair


traffic saving properties of FMSR. To understand the
practicality of the integration of FMSR and DIP, we analyze
its security strength, evaluate its running time overhead via
testbed experiments, and conduct monetary cost analysis.

You might also like