Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing


Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud.

The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both.

We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

Module1(Admin Module):

1. We propose a general formal PoR model with public verifiability for cloud data storage, in which both blockless and stateless verification are achieved simultaneously;

Module2(Authorized User Module):

2. We equip the proposed PoR construction with the function of supporting for fully dynamic data operations, especially to support block insertion, which is missing in most existing schemes;

Module3(Public User Module):

3. We prove the security of our proposed construction and justify the performance of our scheme through concrete implementation and comparisons with the state-of-the-art.

Hardware Requirements:

  • System : Pentium IV 2.4 GHz.
  • Speed - 1.1 GHz
  • RAM - 256 MB (min)
  • Hard Disk - 20 GB
  • Floppy Drive - 1.44 MB
  • Key Board - Standard Windows Keyboard
  • Mouse - Two or Three Button Mouse Monitor - SVGA

S/W System Configuration


  • Operating System : Windows 95/98/2000/NT4.0.

  • Application Server : Tomcat5.0
  • Front End : HTML, Java.
  • Scripts : JavaScript.
  • Server side Script : Java Server Pages.
  • Database : Mysql.
  • Database Connectivity : JDBC.





<< back

Related Projects : Online Real Estate Property Management ,Online Recruitment System ,Online Rental House Web Portal ,Online University ,Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks ,Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks ,Orkut Using Java ,Personal Authentication Based On Iris Recognition ,Planning of Wireless Sensor Networks ,Predicting Missing Items in Shopping Carts ,Project Controller ,Project Scheduler ,Project Tracking ,Promotional Portal ,Random Cast ,Real-Time Detection Of Clone Attacks ,Reality Shows Organization ,Record Tracker ,Remote Administration using Mobile ,Remote PC Administration Using J2ME ,Resilient Online Coverage For Surveillance Applications , Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services ,RITAS: Services For Randomized Intrusion Tolerance ,Route Stability in MANETs under the Random Direction Mobility Model ,Script Identification Through Temporal Sequence Of The Strokes ,Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients ,Secure and Policy-Compliant Source Routing ,Secure Data Transmission , Ship Store System ,Smart Network Profile Manager



Copyright © V2computers 2006 through 2017