DATA INTEGRITY PROOFS IN CLOUD STORAGE
ABSTRACT :
Cloud computing has been envisioned as the de-facto
solution to the rising storage costs of IT Enterprises. With the high costs of
data storage devices as well as the rapid rate at which data is being generated
it proves costly for enterprises or individual users to frequently update their
hardware. Apart from reduction in storage costs data outsourcing to the cloud
also helps in reducing the maintenance. Cloud storage moves the user’s data to
large data centers, which are remotely located, on which user does not have any
control. However, this unique feature of the cloud poses many new security
challenges which need to be clearly understood and resolved. We provide a
scheme which gives a proof of data integrity in the cloud which the customer
can employ to check the correctness of his data in the cloud. This proof can be
agreed upon by both the cloud and the customer and can be incorporated in the
Service level agreement (SLA).
PROJECT PURPOSE:
Purpose of developing proofs for data possession at untrusted cloud
storage servers we are often limited by the resources at the cloud server as
well as at the client. Given that the data sizes are large and are stored at
remote servers, accessing the entire file can be expensive in I/O costs to the
storage server. Also transmitting the file across the network to the client can
consume heavy bandwidths. Since growth in storage capacity has far outpaced the
growth in data access as well as network bandwidth, accessing and transmitting
the entire archive even occasionally greatly limits the scalability of the
network resources. Furthermore, the I/O to establish the data proof interferes
with the on-demand bandwidth of the server used for normal storage and
retrieving purpose.
PROJECT SCOPE:
Cloud storing its data file F at the client should process it and create suitable meta data which is
used in the later stage of verification the data integrity at the cloud
storage. When checking for data integrity the client queries the cloud storage
for suitable replies based on which it concludes the integrity of its data
stored in the client. our data integrity protocol the verifier needs to store only
a single cryptographic key - irrespective of the size of the data file F- and two functions which generate a random sequence.
The verifier does not store any data with it. The verifier before storing the
file at the archive, preprocesses the file and appends some meta data to the
file and stores at the archive.
PRODUCT FEATURES:
Our scheme was developed to reduce the computational and storage
overhead of the client as well asto minimize the computational overhead of the
cloud storage server. We also minimized the size of the proof of data integrity
so as to reduce the network bandwidth consumption. Hence the storage at the
client is very much minimal compared to all other schemes that were developed.
Hence this scheme proves advantageous to thin clients like PDAs and mobile
phones.
The operation of encryption of data generally consumes a large
computational power. In our scheme the encrypting process is very much limited
to only a fraction of the whole data thereby saving on the computational time
of the client. Many of the schemes proposed earlier require the archive to
perform tasks that need a lot of computational power to generate the proof of
data integrity. But in our scheme the archive just need to fetch and send few
bits of data to the client.
INTRODUCTION:
Data outsourcing to cloud storage servers is raising
trend among many firms and users owing to its economic advantages. This
essentially means that the owner (client) of the data moves its data to a third
party cloud storage server which is supposed to - presumably for a fee -
faithfully store the data with it and provide it back to the owner whenever
required.
As data generation is far outpacing data storage it
proves costly for small firms to frequently update their hardware whenever
additional data is created. Also maintaining the storages can be a difficult
task. Storage outsourcing of data to cloud storage helps such firms by reducing
the costs of storage, maintenance and personnel. It can also assure a reliable
storage of important data by keeping multiple copies of the data thereby
reducing the chance of losing data by hardware failures.
Storing of user data in the cloud despite its
advantages has many interesting security concerns which need to be extensively
investigated for making it a reliable solution to the problem of avoiding local
storage of data. In this paper we deal with the problem of implementing a
protocol for obtaining a proof of data possession in the cloud sometimes
referred to as Proof of retrievability (POR).This problem tries to obtain and
verify a proof that the data that is stored by a user at a remote data storage
in the cloud (called cloud storage archives or simply archives) is
Not modified by the archive and thereby the integrity
of the data is assured.
Such verification systems prevent the cloud storage
archives from misrepresenting or modifying the data stored at it without the
consent of the data owner by using frequent checks on the storage archives.
Such checks must allow the data owner to efficiently, frequently, quickly and
securely verify that the cloud archive is not cheating the owner. Cheating, in
this context, means that the storage archive might delete some of the data or
may modify some of the data.
CHAPTER 02
SYSTEM ANALYSIS :
PROBLEM DEFINITION:
Storing of user data in the cloud despite its advantages has many
interesting security concerns which need to be extensively investigated for
making it a reliable solution to the
problem of avoiding local storage of data. Many problems like data
authentication and integrity (i.e., how to efficiently and securely ensure that
the cloud storage server returns correct and complete results in response to
its clients’ queries, outsourcing encrypted data and associated difficult
problems dealing with querying over encrypted domain were discussed in research
literature.
EXISTING SYSTEM:
As data generation is far outpacing data storage it
proves costly for small firms to frequently update their hardware whenever
additional data is created. Also maintaining the storages can be a difficult
task. It transmitting the file across the network to the client can consume
heavy bandwidths. The problem is further complicated by the fact that the owner
of the data may be a small device, like a PDA (personal digital assist) or a
mobile phone, which have limited CPU power, battery power and communication
bandwidth.
LIMITATIONS OF EXISTING SYSTEM:
§ The main drawback of this scheme is
the high resource costs it requires for the implementation.
§ Also computing hash value for even a
moderately large data files can be computationally burdensome for some clients
(PDAs, mobile phones, etc).
§ Data encryption is large so the
disadvantage is small users with limited computational power (PDAs, mobile
phones etc.).
PROPOSED SYSTEM:
One of the important concerns that need to be
addressed is to assure the customer of the integrity i.e. correctness of his
data in the cloud. As the data is physically not accessible to the user the
cloud should provide a way for the user to check if the integrity of his data
is maintained or is compromised. In this paper we provide a scheme which gives
a proof of data integrity in the cloud which the customer can employ to check
the correctness of his data in the cloud. This proof can be agreed upon by both
the cloud and the customer and can be incorporated in the Service level
agreement (SLA). It is important to note that our proof of data integrity
protocol just checks the integrity of data i.e. if the data has been illegally
modified or deleted.
ADVANTAGES OF PROPOSED SYSTEM:
§
Apart
from reduction in storage costs data outsourcing to the cloud also helps in
reducing the maintenance.
§
Avoiding
local storage of data.
§
By
reducing the costs of storage, maintenance and personnel.
§
It
reduces the chance of losing data by hardware failures.
§
Not
cheating the owner.
No comments:
Post a Comment