Providing Security and Integrity For Data Stored in Cloud Storage
Providing Security and Integrity For Data Stored in Cloud Storage
net/publication/286573699
CITATIONS READS
2 41
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Chandrashekhar Pawar on 27 November 2019.
1.2 Cloud storage give proof that the data which user retrieve from the cloud is
what he has stored and the integrity of the user data is
As cloud computing is popular and in demand maintained. There are two implementation to give the proof
similarly cloud storage technology has greater demand. of retrievability. They are
Cloud storage is a virtualized storage areas over a network
basis .It provides services on the basis of QoS assured. Cloud 1. Keyed Hash Function.
storage consist of many resources but yet act as single 2. Sentinels.
system. It has greater fault tolerance by redundancy. As the
data generated by IT sectors are dramatically growing we 1. Keyed Hash Function
can’t just update our hardware frequently instead we can
adopt for cloud storage which is a better choice. Cloud Initially, they used hashed key function. Before
storage can we just for different purpose just backing up our storing the user data into the cloud storage the data is
home desktop data into cloud storage or as an archive to preprocessed at the client side and then stored in the cloud
maintain data for regulatory. Cloud storage allows user to storage. While preprocessing for each data, which we store
access broad range of application and resources immediately, in cloud storage as hash, key is generated and a hash value is
which are hosted by others. too generated. To verify if the integrity of the user data
stored is not lost the user send the hash key to the cloud
storage and request to return the hash value .If the hash value
Home PC is same as we have we can confirm that the integrity is
preserved. But the drawback of this approach is that for
Internet Cloud every user data that he saves in the cloud storage a hash key
Company Storage and a hash value is generated an it must be stored in the user
space .For large organization they have large amount of data
to be stored and the hash value and key storage for it itself
Fig 1: Sample Cloud Storage needs more storage space.
Advantages
• Cloud storage avoids the need to buy storage 2. Sentinels:
equipment.
• We have to just pay for the amount of storage we In this approach for every data that we store in the
are using. cloud we add sentinels [3] i.e. Special blocks in random
• Cloud storage allows user to access broad range of places in the user file. Only the user knows the location of
application and resources immediately, which are the sentinels. While checking for integrity the user verifies
hosted by others. the location of the sentinels that the user has embedded into
the file. If the location of the sentinels has changed or if the
Disadvantages sentinels are absent it proves that the data has been corrupted
• As data is redundant it leads to be hacked by or hacked by intruders. Thus the integrity of file is found.
unauthorized users. But the drawback of this approach is the user has to save the
• Cloud storage is costly for day users. sentinels that he has used in his personal computer which
• Security is not grauntaneed completely for our data. itself will become a storage overhead.
By using this two method they find integrity for the data. In
2. EXISTING SYSTEM this two approach the computational work is more at client
side, which is an overhead for the client. So, we proposed an
The objective of the existing system is to provide enhanced approach in which we found integrity in an
integrity and security to the data stored in cloud storage. efficient manner. It eliminates the client overhead.
Since data generation is more rapid it makes small firms hard
to update their hardware often. Also maintain the large
volume of data at client side becomes an overhead to user.
3. PROPOSED SYSTEM
The problem becomes yet complicated when the user of the
Here we are going propose a system, which
data uses small device, like a PDA, mobile phone, which has
decrease workload of the client and provide security and
limited battery power CPU power, and communication
integrity in an efficient manner. Since the data is not
bandwidth. Despite there may occur certain security
physically accessible to the user the cloud should provide the
problem, data authentication and integrity there is a need to
user a way to check for integrity. We provide a method
which gives a proof of integrity for data in the cloud which 1. Providing Security.
the customer employ to check the correctness of his/her data 2. Integrity Check.
in the cloud. This proof can be agreed by both the customer
and the cloud can be incorporated in the SLA.
1. Providing Security:
In proposed system, we eliminate the need of
encrypting the full file. Instead we encrypted only some bits The data that the user stores in the cloud storage
of each data block and thus the client computational should be secure so that it prevents intruders from accessing
overhead is reduced [2].The storage overhead at client side our private data [4]. To provide security we use a security
too is reduced as there is no need to store any data. Therefore key which is automatically generated foe each unique user
thin client can adopt our scheme. and we use RSA encryption algorithm to encrypt the file and
In this model irrespective of data file size only one store it. It is a public key encryption algorithm, which
cryptographic key is used. The client does not store any data eliminates the need to send our secret key over the network.
at his side. While uploading a file it preprocess the user file The public key is shared but the private key is not shared.
and create a meta data later which is appended at the back of The sender encrypts the file or data that is to be stored in the
the file. The Meta data is later used for checking if integrity cloud storage using the Third party auditor public key. So
is preserved or not. the receiver with the particular private key can only decrypt
the file.
System Architecture
Key Encryption F
Data Encrypted
Data
Request
Fig 3: User Side Encryption
User Archive
Challenges c
Reply Encrypted Data
Fig 2: Overall Architecture Data
When the user wants to store his/her file into cloud compared with computational power used and processing
storage he preprocesses the file and create Meta data that is time.
to be appended into the file.
Comparison of Existing System and Proposed System
with efficiency and computational process& Time:
DATA FILE
5 6
1 2 3 4
Data Block
Fig 5: Generation of meta-data
All the Meta data selected from each data block are
further encrypted [5] to add more security .The Meta data are
encrypted using certain algorithm. A random generator
generates bits which are XOR with the meta data bits and 1’s
complement of the result of the above XOR operation is used
for appending.