Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud
ABSTRACT:
With cloud data
services, it is commonplace for data to be not only stored in the cloud, but
also shared across multiple users. Unfortunately, the integrity of cloud data
is subject to skepticism due to the existence of hardware/software failures and
human errors. Several mechanisms have been designed to allow both data owners
and public verifiers to efficiently audit cloud data integrity without
retrieving the entire data from the cloud server. However, public auditing on
the integrity of shared data with these existing mechanisms will inevitably
reveal confidential information—identity privacy—to public verifiers. In this
paper, we propose a novel privacy-preserving mechanism that supports public
auditing on shared data stored in the cloud. In particular, we exploit ring
signatures to compute verification metadata needed to audit the correctness of
shared data. With our mechanism, the identity of the signer on each block in
shared data is kept private from public verifiers, who are able to efficiently
verify shared data integrity without retrieving the entire file. In addition,
our mechanism is able to perform multiple auditing tasks simultaneously instead
of verifying them one by one. Our experimental results demonstrate the
effectiveness and efficiency of our mechanism when auditing shared data
integrity.
EXISTING SYSTEM:
v
Many
mechanisms have been proposed to allow
not only a data owner itself but also a public verifier to efficiently perform
integrity checking without downloading the entire data from the cloud, which is
referred to as public auditing . In these mechanisms, data is divided into many
small blocks, where each block is independently signed by the owner; and a
random combination of all the blocks instead of the whole data is retrieved
during integrity checking . A public verifier could be a data user (e.g.,
researcher) who would like to utilize the owner’s data via the cloud or a
third-party auditor (TPA) who can provide expert integrity checking services.
v
Moving
a step forward, Wang et al. designed an advanced auditing mechanism .so that
during public auditing on cloud data, the content of private data belonging to
a personal user is not disclosed to any public verifiers. Unfortunately,
current public auditing solutions mentioned above only focus on personal data
in the cloud .We believe that sharing data among multiple users is perhaps one
of the most engaging features that motivates cloud storage. Therefore, it is
also necessary to ensure the integrity of shared data in the cloud is correct.
v Existing public auditing mechanisms can actually be
extended to verify shared data integrity. However, a new significant privacy
issue introduced in the case of shared data with the use of existing mechanisms
is the leakage of identity privacy to public verifiers.
DISADVANTAGES
OF EXISTING SYSTEM:
1. Failing to preserve identity privacy on
shared data during public auditing will reveal significant confidential
information to public verifiers.
2. Protect these confidential information is
essential and critical to preserve identity privacy from public verifiers
during public auditing.
PROPOSED SYSTEM:
]
In
this paper, to solve the above privacy issue on shared data, we propose Oruta,
a novel privacy-preserving public auditing mechanism.
]
More
specifically, we utilize ring signatures to construct homomorphic
authenticators in Oruta, so that a
public verifier is able to verify the integrity of shared data without
retrieving the entire data while the identity of the signer on each block in shared
data is kept private from the public verifier.
]
In
addition, we further extend our mechanism to support batch auditing, which can
perform multiple auditing tasks simultaneously and improve the efficiency of
verification for multiple auditing tasks.
]
Meanwhile,
Oruta is compatible with random masking, which has been utilized in WWRL and
can preserve data privacy from public verifiers. Moreover, we also leverage
index hash tables from a previous public auditing solution to support dynamic
data. A high-level comparison among Oruta and existing mechanisms is presented.
ADVANTAGES
OF PROPOSED SYSTEM:
1. A public verifier is able to correctly verify shared
data integrity.
2. A public verifier cannot distinguish the identity of
the signer on each block in shared data during the process of auditing.
3. The ring
signatures generated for not only able to preserve identity privacy but also
able to support blockless verifiability.
SYSTEM
REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø
System : Pentium IV 2.4 GHz.
Ø
Hard Disk :
40 GB.
Ø
Floppy Drive : 1.44
Mb.
Ø
Monitor : 15
VGA Colour.
Ø
Mouse :
Logitech.
Ø Ram : 512 Mb.
SOFTWARE
REQUIREMENTS:
Ø Operating system : Windows
XP/7.
Ø Coding Language : JAVA/J2EE
Ø IDE : Netbeans 7.4
Ø Database : MYSQL
REFERENCE:
Boyang Wang,
Baochun Li, and Hui Li, “Oruta: Privacy-Preserving Public Auditing for
Shared Data in the Cloud”IEEE TRANSACTIONS ON CLOUD COMPUTING,VOL. 2,NO.
1,JANUARY-MARCH 2014.
No comments:
Post a Comment