Data Storage Protocol For Cloud Security
Data Storage Protocol For Cloud Security
Data Storage Protocol For Cloud Security
6.1 INTRODUCTION
Data Privacy and Verification in cloud have been handled extensively in many
existing works. On surveying the field of public auditability, it is evident that
considering the third party auditor as vulnerable component is not addressed
anywhere. The previous works do not address all the security threats and all are
focusing on single server scenario. Most of them do not consider dynamic data
operations and the problem of supporting both public auditability and dynamism have
been recently addressed where the data is vulnerable in the hands of third party
auditor. The DSP Protocol is proposed to provide security to the data in cloud
environment, remotely verifying the data and possession on server.
CSP
Equation 5. CSP sends masked blocks TPA sends audit message to CSP
Equation 6. CSP sends masked blocks TPA sends audit message to CSP
Operation
6.4 Implementation
(a) Operating Systems Metadata
Operating system maintains the metadata to authenticate the user, for that an account
will be created or call the batch file by creating an object. This account enables the
user to connect with Metadata Server. Metadata Server can grant or deny the user
access of metadata objects based on authentication.
The following are the steps for creating a metadata object.
1 Select Start ► Settings ► Control Panel ► Administrative Tools ► Local
Security Policy.
2. In the Local Security Settings window, expand Local Policies in the left pane
and click User Rights Assignment.
(Sample for Metadata Creation)
3. Click Log on as a batch job in the right pane to display the Log on as a
batch job Properties dialog box.
5. Make sure your new group appears in the box on the Local Security
Setting tab and click OK.
1. In the Catalog window, right-click the folder where you want to store the
metadata template.
2. Click New > XML Document. A new XML file with the default
name metadata.xml is created in the folder.
4. Press ENTER.
8. Click the Save button in the description tab. The contents of the metadata
template will be displayed.
CSUS tool
(AES+ Oracle database 12c)
= RSA SQL+ RSA Oracle 10g
Metadata
DSP
Decision
F5 icontrol
F5 Application Delivery Network
DSP PROTOCOL
Phase 2:
CSP
Level Security
CONCLUSION
DSP protocol allows users to obtain a probabilistic proof from the storage service
providers. Metadata verification is designed for such a purpose which restricts the
third party to access the metadata of the data to be verified. The Data Storage Protocol
can further be enhanced to check security, auditor’s reliability and confidentiality in
handling the data without biasing. Further the data stored in cloud can be encrypted
and the code generated for individual files can be sent for using secured transmission
protocols.