SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 5 (Jul. - Aug. 2013), PP 30-33
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Privacy and Integrity Preserving in Cloud Storage Devices
V. Tejaswini1
, S.k. Prashanth2
, Dr. N.sambasiva Rao3
, C. Satya kumar4
,
1
M.Tech (C.S.E), VCE, A.P, India.
2
Associate professor, VCE, A.P, India.
3
Professor, VCE, A.P, India.
4
Associate professor, VCE, A.P, India.
Abstract: Cloud computing is an internet based model which allows the user all the “services on demand”.
The services provided by cloud are infrastructure, software and platform. Cloud Computing has great potential
of providing robust computational power to the society at reduced cost. Despite the tremendous benefits,
security is the primary obstacle that prevents the wide adoption of this promising computing model, especially
for customers when their confidential data are consumed and produced during the computation. Wang proposed
enabling public audit ability and data dynamics for storage security in cloud computing which provides data
integrity and dynamic operation but cannot assure confidentiality. Here in this scheme we are providing a new
method which provide confidentiality and also manage the storage space in cloud server. In this we are
providing confidentiality by using cryptographic algorithm and storage space is managed by using complete
binary tree by arranging all the files by their size and checking the integrity using TPA(third party auditor).
Thus providing integrity, memory management as well as confidentiality in cloud computing.
Keywords – cloud computing, data integrity, data storage, public audit ability
I. INTRODUCTION
Cloud Computing provides convenient on-demand network access to a shared pool of configurable
computing resources that can be deployed with great efficiency and minimal management overhead. One
primary advantage of the cloud paradigm is computation outsourcing, where the computational power of cloud
customers is no longer limited by their resource-constraint devices. By outsourcing the workloads into the cloud,
customers could enjoy the unlimited computing resources in a pay-per-use manner without committing large
capital outlays in the purchase of both hardware and software. In spite of the incredible benefits, outsourcing
computation to the commercial public cloud is also miserly customers‟ direct control over the systems that
consume and produce their data during the computation, which certainly brings in new security challenges
towards this promising computing model [2]. Numerous trends are opening up the era of Cloud Computing,
which is an Internet-based development and use of computer technology. The ever cheaper and more powerful
processors, together with the “software as a service” (SaaS) computing architecture, are transforming data
centers into pools of computing service on a huge scale. Meanwhile, the increasing network bandwidth and
reliable yet flexible network connections make it even possible that clients can now subscribe high-quality
services from data and software that reside solely on remote data centers. Although envisioned as a promising
service platform for the Internet, this new data storage paradigm in “Cloud” brings about many challenging
design issues which have profound influence on the security and performance of the Overall system. One of the
biggest concerns with cloud data storage is that of data integrity verification at untrusted servers.
On the one hand, the outsourced computation workloads often contain sensitive information, such as
the business financial records, proprietary research data, etc. To combat against unauthorized information
leakage, sensitive data have to be encrypted before outsourcing so as to provide end-to- end data confidentiality
assurance in the cloud. However, ordinary data encryption techniques in essence prevent cloud from performing
any meaningful operation of the underlying plaintext data, making the computation over encrypted data a very
hard problem. On the other hand, the operational details inside the cloud are not transparent enough to
customers [4]. As a result, there exist various motivations for cloud server to behave unfaithfully and return
incorrect results. For example, for the computations that require a large amount of computing resources, there
are huge financial incentives for the cloud to be “lazy” if the customers cannot tell the correctness of the output.
Besides, possible software bugs, hardware failures, or even outsider attacks might also affect the
quality of the computed results. Thus, we argue that the cloud is basically not secure from the point of
customers. Without providing a mechanism for secure computation outsourcing, i.e., to protect the sensitive
input and output information and to validate the integrity of the computation result, it would be hard to expect
cloud customers to turn over control of their workloads from local machines to cloud solely based on its
economic savings as well as resource flexibility. For practical consideration, such a design should further ensure
that customers perform fewer amounts of operations than completing the computations by themselves directly.
Recent researches made steady advances in “privacy and integrity preserving in cloud computing”.
Privacy and Integrity Preserving in Cloud Storage Devices
www.iosrjournals.org 31 | Page
Cloud Computing treating the cloud as an intrinsically insecure computing platform from the viewpoint
of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling
computations with encrypted data, but also protect customers from malicious behaviors by enabling the
validation of the computation result. Such a mechanism of general secure computation outsourcing was recently
shown to be feasible in theory, but to design mechanisms that are practically efficient remains a very
challenging problem.
Consider the large size of the outsourced data and the client‟s constrained resource capability, the core
of the problem can be generalized as how can the client find an efficient way to perform periodical integrity
verifications without the local copy of data files. In order to solve the problem of data integrity, many schemes
are proposed under different models [2], [3], [4], [5], [6], [7], [8]. In all these works, great efforts are made to
design solutions that meet various requirements of each and every user such as: high scheme efficiency, stateless
verification and retrievability of data, etc.
Fig 1. Cloud computing using TPA
II. RELATED WORK
Recently, much of growing interest has been pursued in the context of remotely stored data verification
[1], [3], [4], [5], [6], [7], [8]. ateniese et al. [2] are the first to consider public auditability in their defined
“provable data possession” model for ensuring possession of files on untrusted storages. In their scheme, they
utilize RSA-based homomorphic tags for auditing outsourced data, thus public auditability is achieved.
However, Ateniese et al. do not consider the case of dynamic data storage, and the direct extension of
their scheme from static data storage to dynamic case may suffer design and security problems.. Ateniese et al.
Similar to, they only consider partial support for dynamic data operation. Juels and Kaliski [3] describe
a “proof of retrievability” model, where spot-checking and error-correcting codes are used to ensure both
“possession” and “retrievability” of data files on archive service systems. Specifically, some special blocks
called “sentinels” are randomly fixed into the data file F for detection purpose, and F is further encrypted to
protect the positions of these special blocks. However, like [12], the number of queries a client can perform is
also a fixed priori, and the introduction of precomputed “sentinels” prevents the development of realizing
dynamic data updates. Erway et al. were the first to explore constructions for dynamic provable data
possession. They extend the PDP model in [2] to support provable updates to stored data files using rank-based
authenticated skip lists. This scheme is essentially a fully dynamic version of the PDP solution.
Although the existing schemes aim at providing integrity verification for different data storage systems,
the problem of supporting both confidentiality and memory management is not achieved. How to achieve a
secure and efficient design to integrate these two important mechanisms for data storage service remains an
open exigent task in Cloud Computing.
III. Threat Model
The threats can come from two different sources: internal attacks and external attacks.
For internal attacks, a CSP can be self-interested, untrusted and possibly mal-icious. Not only it desire
to move data that is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also
attempt to hide the data loss incidents due to management errors, failures etc.For external attacks, data integrity
threats may comes from outsiders who are beyond the CSP.
Privacy and Integrity Preserving in Cloud Storage Devices
www.iosrjournals.org 32 | Page
IV. Design Goals
1. Storage integrity: to ensure users that their data are stored appropriately and kept intact all the time in the
cloud for the multiple files.
2. Confidentiality: providing security for the data by using encryption techniques.
3. Memory space management in cloud server using complete binary tree.
V. Proposed Work Construction
Before storing the data in the server the client first calculate the hash values for each and every file and
keeps with him. After calculating the hash values with polynomial hashing technique, the client places his file in
the server. To check the integrity we are constructing a complete binary tree where all the „‟Fn“ files are arrange
as shown in the figure based their file size. If we want to find integrity for „f1,f2,f3,…..fn-1‟‟ any of the files
then the TPA downloads the total number of files (i.e the files which client challenges the server to find the
integrity) and performs the integrity checking simultaneously by creating threads for each file. Thus hash values
which the client get by the server is compared with the hash values which are with the client. If both the hash
values are matched then their exist integrity else the file is corrupted.
f1 to fm
.
.
.
fm to fn
Fig 2. Complete Binary Tree
Algorithm 1.
Step 1 : Create an N object for „N‟ files
Step 2 : Create a thread for each file
Thread t1=new Thread(f1);
Thread t2=new thread (f2);
--
---
Thread tn=new Thread(fn);
Step 3 : t1.start(f1);
t2.start(f2);
---
---
tn.start(fn);
Algorithm 2
Step 1 : Create a Class using Runable Interface
Step 2: Implement a run() method
-Process take place (Calculates hash values)
-Sends hash value to client.
For N types of files we create N objects and for each object we create a thread. If client wants to check an
integrity for F2, F4 then the TPA downloads the total file and creates a thread T2, T4 respectively and
simultaneously checks the integrity using runnable interface. For each thread we calculate hash values and send
it to the server. The server sends the hash values to the client and the client compares both the hash values and
checks the integrity. If the hash values of the server matches with the client then it said to be integrity exist.
Privacy and Integrity Preserving in Cloud Storage Devices
www.iosrjournals.org 33 | Page
VI. CONCLUSION
This approach is very secure and attains the integrity without the users burden. All the integrity
checking is performed by the Third party auditor(TPA) so that the clients involvement is reduced. Here the
memory is also managed as all the files are arranged to a complete binary tree. In order to attain the
confidentiality we are using some cryptographic algorithm and sending the files to the server. So we are
achieving integrity, confidentiality and supports memory management.
References
[1] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud
Computing, European Symp. Research in Computer Security (ESORICS ’09), 2009, pp. 355-370.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores,
ACM Conf. Computer and Comm. Security (CCS ’07), 2007, pp. 598-609.
[3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, ACM Conf. Computer and Comm. Security (CCS ’07),
2007, pp. 584-597.
[4] H. Shacham and B. Waters, Compact Proofs of Retrievability, Int’l Conf. Theory and Application of Cryptology and Information
Security: Advances in Cryptology (ASIACRYPT ’08), 2008,pp. 90-107.
[5] K.D. Bowers, A. Juels, and A. Oprea, Proofs of Retrievability: Theory and Implementation,Report 2008/175, Cryptology ePrint
Archive, 2008.
[6] M. Naor and G.N. Rothblum, The Complexity of Online Memory Checking, Ann. IEEE Symp. Foundations of Computer Science
(FOCS ’05), 2005, pp. 573-584.
[7] E.-C. Chang and J. Xu, Remote Integrity Check with Dishonest Storage Server, European Symp. Research in Computer Security
(ESORICS ’08), 2008, pp. 223-237.
[8] M.A. Shah, R. Swaminathan, and M. Baker, Privacy-Preserving Audit and Extraction of Digital Contents,Report 2008/186,
Cryptology ePrint Archive, 2008.

More Related Content

PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
PDF
Data Security in Cloud Computing Using Linear Programming
PDF
A Secure Model for Cloud Computing Based Storage and Retrieval
PDF
S.A.kalaiselvan toward secure and dependable storage services
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PDF
C017421624
PDF
Survey on securing outsourced storages in cloud
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Data Security in Cloud Computing Using Linear Programming
A Secure Model for Cloud Computing Based Storage and Retrieval
S.A.kalaiselvan toward secure and dependable storage services
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
C017421624
Survey on securing outsourced storages in cloud

What's hot (19)

PDF
Survey on securing outsourced storages in cloud
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Security and privacy approach of cloud computing
PDF
A Study of Data Storage Security Issues in Cloud Computing
PDF
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
PPT
Unit 3 -Data storage and cloud computing
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
PDF
50120140503020
PDF
H1803035056
PDF
Data Storage Issues in Cloud Computing
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
A robust and verifiable threshold multi authority access control system in pu...
PDF
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
PDF
IRJET- Two ways Verification for Securing Cloud Data
Survey on securing outsourced storages in cloud
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Ijarcet vol-2-issue-4-1405-1409
International Journal of Engineering Research and Development (IJERD)
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Security and privacy approach of cloud computing
A Study of Data Storage Security Issues in Cloud Computing
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Unit 3 -Data storage and cloud computing
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
50120140503020
H1803035056
Data Storage Issues in Cloud Computing
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
A robust and verifiable threshold multi authority access control system in pu...
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
IRJET- Two ways Verification for Securing Cloud Data
Ad

Viewers also liked (20)

PDF
D0161926
PDF
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
PDF
A Survey on the Social Impacts of On-line Social Networking Sites
PDF
Isolation Of Salmonella Gallinarum From Poultry Droppings In Jos Metropolis, ...
PDF
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
PDF
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
PDF
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
PDF
D012631423
PDF
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
PDF
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
PDF
Lossless LZW Data Compression Algorithm on CUDA
PDF
Paralyzing Bioinformatics Applications Using Conducive Hadoop Cluster
PDF
Domestic Solar - Aero - Hydro Power Generation System
PDF
Impact of Price Expectation on the Demand of Electric Energy
PDF
Discovering Frequent Patterns with New Mining Procedure
PDF
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
PDF
A Framework for Providing Selective Permissions to Android Applications
PDF
C017361724
PDF
G013115167
PDF
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
D0161926
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
A Survey on the Social Impacts of On-line Social Networking Sites
Isolation Of Salmonella Gallinarum From Poultry Droppings In Jos Metropolis, ...
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
A Survey on Applications of Neural Networks and Genetic Algorithms in Fault D...
D012631423
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Lossless LZW Data Compression Algorithm on CUDA
Paralyzing Bioinformatics Applications Using Conducive Hadoop Cluster
Domestic Solar - Aero - Hydro Power Generation System
Impact of Price Expectation on the Demand of Electric Energy
Discovering Frequent Patterns with New Mining Procedure
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
A Framework for Providing Selective Permissions to Android Applications
C017361724
G013115167
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
Ad

Similar to Privacy and Integrity Preserving in Cloud Storage Devices (20)

PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
50120140507005
PDF
50120140507005 2
PDF
V04405122126
PDF
Fs2510501055
PDF
Excellent Manner of Using Secure way of data storage in cloud computing
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
PDF
Iaetsd storage privacy protection against data
PDF
F017414853
PDF
I017225966
PDF
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
PDF
L04302088092
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
A Novel Method of Directly Auditing Integrity On Encrypted Data
PDF
Enabling Integrity for the Compressed Files in Cloud Server
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
50120140507005
50120140507005 2
V04405122126
Fs2510501055
Excellent Manner of Using Secure way of data storage in cloud computing
Security Check in Cloud Computing through Third Party Auditor
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Iaetsd storage privacy protection against data
F017414853
I017225966
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
L04302088092
Insuring Security for Outsourced Data Stored in Cloud Environment
A Novel Method of Directly Auditing Integrity On Encrypted Data
Enabling Integrity for the Compressed Files in Cloud Server

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPT
Total quality management ppt for engineering students
PPTX
introduction to high performance computing
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT - 3 Total quality Management .pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
PPT on Performance Review to get promotions
PPT
Occupational Health and Safety Management System
PDF
Soil Improvement Techniques Note - Rabbi
Automation-in-Manufacturing-Chapter-Introduction.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Total quality management ppt for engineering students
introduction to high performance computing
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
737-MAX_SRG.pdf student reference guides
86236642-Electric-Loco-Shed.pdf jfkduklg
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT - 3 Total quality Management .pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Safety Seminar civil to be ensured for safe working.
PPT on Performance Review to get promotions
Occupational Health and Safety Management System
Soil Improvement Techniques Note - Rabbi

Privacy and Integrity Preserving in Cloud Storage Devices

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 5 (Jul. - Aug. 2013), PP 30-33 www.iosrjournals.org www.iosrjournals.org 30 | Page Privacy and Integrity Preserving in Cloud Storage Devices V. Tejaswini1 , S.k. Prashanth2 , Dr. N.sambasiva Rao3 , C. Satya kumar4 , 1 M.Tech (C.S.E), VCE, A.P, India. 2 Associate professor, VCE, A.P, India. 3 Professor, VCE, A.P, India. 4 Associate professor, VCE, A.P, India. Abstract: Cloud computing is an internet based model which allows the user all the “services on demand”. The services provided by cloud are infrastructure, software and platform. Cloud Computing has great potential of providing robust computational power to the society at reduced cost. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Wang proposed enabling public audit ability and data dynamics for storage security in cloud computing which provides data integrity and dynamic operation but cannot assure confidentiality. Here in this scheme we are providing a new method which provide confidentiality and also manage the storage space in cloud server. In this we are providing confidentiality by using cryptographic algorithm and storage space is managed by using complete binary tree by arranging all the files by their size and checking the integrity using TPA(third party auditor). Thus providing integrity, memory management as well as confidentiality in cloud computing. Keywords – cloud computing, data integrity, data storage, public audit ability I. INTRODUCTION Cloud Computing provides convenient on-demand network access to a shared pool of configurable computing resources that can be deployed with great efficiency and minimal management overhead. One primary advantage of the cloud paradigm is computation outsourcing, where the computational power of cloud customers is no longer limited by their resource-constraint devices. By outsourcing the workloads into the cloud, customers could enjoy the unlimited computing resources in a pay-per-use manner without committing large capital outlays in the purchase of both hardware and software. In spite of the incredible benefits, outsourcing computation to the commercial public cloud is also miserly customers‟ direct control over the systems that consume and produce their data during the computation, which certainly brings in new security challenges towards this promising computing model [2]. Numerous trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the “software as a service” (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale. Meanwhile, the increasing network bandwidth and reliable yet flexible network connections make it even possible that clients can now subscribe high-quality services from data and software that reside solely on remote data centers. Although envisioned as a promising service platform for the Internet, this new data storage paradigm in “Cloud” brings about many challenging design issues which have profound influence on the security and performance of the Overall system. One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. On the one hand, the outsourced computation workloads often contain sensitive information, such as the business financial records, proprietary research data, etc. To combat against unauthorized information leakage, sensitive data have to be encrypted before outsourcing so as to provide end-to- end data confidentiality assurance in the cloud. However, ordinary data encryption techniques in essence prevent cloud from performing any meaningful operation of the underlying plaintext data, making the computation over encrypted data a very hard problem. On the other hand, the operational details inside the cloud are not transparent enough to customers [4]. As a result, there exist various motivations for cloud server to behave unfaithfully and return incorrect results. For example, for the computations that require a large amount of computing resources, there are huge financial incentives for the cloud to be “lazy” if the customers cannot tell the correctness of the output. Besides, possible software bugs, hardware failures, or even outsider attacks might also affect the quality of the computed results. Thus, we argue that the cloud is basically not secure from the point of customers. Without providing a mechanism for secure computation outsourcing, i.e., to protect the sensitive input and output information and to validate the integrity of the computation result, it would be hard to expect cloud customers to turn over control of their workloads from local machines to cloud solely based on its economic savings as well as resource flexibility. For practical consideration, such a design should further ensure that customers perform fewer amounts of operations than completing the computations by themselves directly. Recent researches made steady advances in “privacy and integrity preserving in cloud computing”.
  • 2. Privacy and Integrity Preserving in Cloud Storage Devices www.iosrjournals.org 31 | Page Cloud Computing treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Such a mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient remains a very challenging problem. Consider the large size of the outsourced data and the client‟s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical integrity verifications without the local copy of data files. In order to solve the problem of data integrity, many schemes are proposed under different models [2], [3], [4], [5], [6], [7], [8]. In all these works, great efforts are made to design solutions that meet various requirements of each and every user such as: high scheme efficiency, stateless verification and retrievability of data, etc. Fig 1. Cloud computing using TPA II. RELATED WORK Recently, much of growing interest has been pursued in the context of remotely stored data verification [1], [3], [4], [5], [6], [7], [8]. ateniese et al. [2] are the first to consider public auditability in their defined “provable data possession” model for ensuring possession of files on untrusted storages. In their scheme, they utilize RSA-based homomorphic tags for auditing outsourced data, thus public auditability is achieved. However, Ateniese et al. do not consider the case of dynamic data storage, and the direct extension of their scheme from static data storage to dynamic case may suffer design and security problems.. Ateniese et al. Similar to, they only consider partial support for dynamic data operation. Juels and Kaliski [3] describe a “proof of retrievability” model, where spot-checking and error-correcting codes are used to ensure both “possession” and “retrievability” of data files on archive service systems. Specifically, some special blocks called “sentinels” are randomly fixed into the data file F for detection purpose, and F is further encrypted to protect the positions of these special blocks. However, like [12], the number of queries a client can perform is also a fixed priori, and the introduction of precomputed “sentinels” prevents the development of realizing dynamic data updates. Erway et al. were the first to explore constructions for dynamic provable data possession. They extend the PDP model in [2] to support provable updates to stored data files using rank-based authenticated skip lists. This scheme is essentially a fully dynamic version of the PDP solution. Although the existing schemes aim at providing integrity verification for different data storage systems, the problem of supporting both confidentiality and memory management is not achieved. How to achieve a secure and efficient design to integrate these two important mechanisms for data storage service remains an open exigent task in Cloud Computing. III. Threat Model The threats can come from two different sources: internal attacks and external attacks. For internal attacks, a CSP can be self-interested, untrusted and possibly mal-icious. Not only it desire to move data that is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to hide the data loss incidents due to management errors, failures etc.For external attacks, data integrity threats may comes from outsiders who are beyond the CSP.
  • 3. Privacy and Integrity Preserving in Cloud Storage Devices www.iosrjournals.org 32 | Page IV. Design Goals 1. Storage integrity: to ensure users that their data are stored appropriately and kept intact all the time in the cloud for the multiple files. 2. Confidentiality: providing security for the data by using encryption techniques. 3. Memory space management in cloud server using complete binary tree. V. Proposed Work Construction Before storing the data in the server the client first calculate the hash values for each and every file and keeps with him. After calculating the hash values with polynomial hashing technique, the client places his file in the server. To check the integrity we are constructing a complete binary tree where all the „‟Fn“ files are arrange as shown in the figure based their file size. If we want to find integrity for „f1,f2,f3,…..fn-1‟‟ any of the files then the TPA downloads the total number of files (i.e the files which client challenges the server to find the integrity) and performs the integrity checking simultaneously by creating threads for each file. Thus hash values which the client get by the server is compared with the hash values which are with the client. If both the hash values are matched then their exist integrity else the file is corrupted. f1 to fm . . . fm to fn Fig 2. Complete Binary Tree Algorithm 1. Step 1 : Create an N object for „N‟ files Step 2 : Create a thread for each file Thread t1=new Thread(f1); Thread t2=new thread (f2); -- --- Thread tn=new Thread(fn); Step 3 : t1.start(f1); t2.start(f2); --- --- tn.start(fn); Algorithm 2 Step 1 : Create a Class using Runable Interface Step 2: Implement a run() method -Process take place (Calculates hash values) -Sends hash value to client. For N types of files we create N objects and for each object we create a thread. If client wants to check an integrity for F2, F4 then the TPA downloads the total file and creates a thread T2, T4 respectively and simultaneously checks the integrity using runnable interface. For each thread we calculate hash values and send it to the server. The server sends the hash values to the client and the client compares both the hash values and checks the integrity. If the hash values of the server matches with the client then it said to be integrity exist.
  • 4. Privacy and Integrity Preserving in Cloud Storage Devices www.iosrjournals.org 33 | Page VI. CONCLUSION This approach is very secure and attains the integrity without the users burden. All the integrity checking is performed by the Third party auditor(TPA) so that the clients involvement is reduced. Here the memory is also managed as all the files are arranged to a complete binary tree. In order to attain the confidentiality we are using some cryptographic algorithm and sending the files to the server. So we are achieving integrity, confidentiality and supports memory management. References [1] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, European Symp. Research in Computer Security (ESORICS ’09), 2009, pp. 355-370. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, ACM Conf. Computer and Comm. Security (CCS ’07), 2007, pp. 598-609. [3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, ACM Conf. Computer and Comm. Security (CCS ’07), 2007, pp. 584-597. [4] H. Shacham and B. Waters, Compact Proofs of Retrievability, Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), 2008,pp. 90-107. [5] K.D. Bowers, A. Juels, and A. Oprea, Proofs of Retrievability: Theory and Implementation,Report 2008/175, Cryptology ePrint Archive, 2008. [6] M. Naor and G.N. Rothblum, The Complexity of Online Memory Checking, Ann. IEEE Symp. Foundations of Computer Science (FOCS ’05), 2005, pp. 573-584. [7] E.-C. Chang and J. Xu, Remote Integrity Check with Dishonest Storage Server, European Symp. Research in Computer Security (ESORICS ’08), 2008, pp. 223-237. [8] M.A. Shah, R. Swaminathan, and M. Baker, Privacy-Preserving Audit and Extraction of Digital Contents,Report 2008/186, Cryptology ePrint Archive, 2008.