amazon

Friday, November 28, 2014

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud


Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

ABSTRACT:
With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.

EXISTING SYSTEM:
v Many mechanisms  have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking . A public verifier could be a data user (e.g., researcher) who would like to utilize the owner’s data via the cloud or a third-party auditor (TPA) who can provide expert integrity checking services.
v Moving a step forward, Wang et al. designed an advanced auditing mechanism .so that during public auditing on cloud data, the content of private data belonging to a personal user is not disclosed to any public verifiers. Unfortunately, current public auditing solutions mentioned above only focus on personal data in the cloud .We believe that sharing data among multiple users is perhaps one of the most engaging features that motivates cloud storage. Therefore, it is also necessary to ensure the integrity of shared data in the cloud is correct.
v Existing public auditing mechanisms can actually be extended to verify shared data integrity. However, a new significant privacy issue introduced in the case of shared data with the use of existing mechanisms is the leakage of identity privacy to public verifiers.
DISADVANTAGES OF EXISTING SYSTEM:
   1. Failing to preserve identity privacy on shared data during public auditing will reveal significant confidential information to public verifiers.
   2. Protect these confidential information is essential and critical to preserve identity privacy from public verifiers during public auditing.

PROPOSED SYSTEM:
] In this paper, to solve the above privacy issue on shared data, we propose Oruta, a novel privacy-preserving public auditing mechanism.
] More specifically, we utilize ring signatures to construct homomorphic authenticators  in Oruta, so that a public verifier is able to verify the integrity of shared data without retrieving the entire data while the identity of the signer on each block in shared data is kept private from the public verifier.
] In addition, we further extend our mechanism to support batch auditing, which can perform multiple auditing tasks simultaneously and improve the efficiency of verification for multiple auditing tasks.
] Meanwhile, Oruta is compatible with random masking, which has been utilized in WWRL and can preserve data privacy from public verifiers. Moreover, we also leverage index hash tables from a previous public auditing solution to support dynamic data. A high-level comparison among Oruta and existing mechanisms is presented.

ADVANTAGES OF PROPOSED SYSTEM:
1.     A public verifier is able to correctly verify shared data integrity.
2.     A public verifier cannot distinguish the identity of the signer on each block in shared data during the process of auditing.
3.      The ring signatures generated for not only able to preserve identity privacy but also able to support blockless verifiability.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.

SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.
Ø Coding Language :         JAVA/J2EE
Ø IDE                      :         Netbeans 7.4
Ø Database              :         MYSQL

REFERENCE:

Boyang Wang, Baochun Li, and Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”IEEE TRANSACTIONS ON CLOUD COMPUTING,VOL. 2,NO. 1,JANUARY-MARCH 2014.

No comments:

Post a Comment