0% found this document useful (0 votes)
40 views

Providing Security and Integrity For Data Stored in Cloud Storage

Uploaded by

Fahad Naeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Providing Security and Integrity For Data Stored in Cloud Storage

Uploaded by

Fahad Naeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/286573699

Providing security and integrity for data stored in cloud storage

Conference Paper · February 2014


DOI: 10.1109/ICICES.2014.7033968

CITATIONS READS
2 41

3 authors, including:

Chandrashekhar Pawar Pankaj Rambhau Patil


Charotar University of Science and Technology R. C. Patel Institute of Technology
9 PUBLICATIONS   95 CITATIONS    3 PUBLICATIONS   2 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Resource Allocation in Cloud Computing View project

All content following this page was uploaded by Chandrashekhar Pawar on 27 November 2019.

The user has requested enhancement of the downloaded file.


ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India

Providing Security and Integrity for Data Stored


In Cloud Storage

Mr. Chandrashekhar S. Pawar Mr. Pankaj R. Patil Mr. Sujitkumar V. Chaudhari


Assistant Professor, Assistant Professor, Assistant Professor,
Department of Computer Science Department of Computer Science Department of Computer Science
and Engineering, R.C.P.I.T., and Engineering, R.C.P.I.T., and Engineering, J. T. Mahajan Polytechnic,
Shirpur, India Shirpur, India Fazipur, India
pawar.chandrashekhar09@yahoo.com patil.pankaj01@gmail.com sujitv14@gmail.com

ABSTRACT: Cloud computing [1] is a recent technology that


uses the Internet, central servers to organize the data and
Cloud computing which is widely emerging applications, which the user can access. Cloud computing
technology in the recent years is adopted by most of the IT allows individual users and other business peoples to use
companies and other organizations. Storing large amount of application without the necessity to install in their computer.
data by the user in the LAN may cost the user heavily .We They can access their files, which is located in other
use different electronic storage device like file servers, computer using Internet. This technology allows for more
Storage Area Networks (SAN) and Network Attached inefficient computing by centralizing storage, processing
Storage (NAS) which provide high performance and many memory, and bandwidth. Cloud computing comes in three
useful features to the user but the electronic storage has categories such as Software as a Service (SaaS),
many drawbacks like it cost more, its life time is less and Infrastructure as a service (IaaS), Platform as a Service
needs backup. Cloud storage avoid these problem by storing (PaaS).The SaaS provides application software which the
data in a virtual pool hosted by TPA .The TPA is responsible user can use. The Paas provides the platform for the user to
for maintaining the user data. But cloud storage has many do his operation .The Iaas provides physical or virtual
draw back in which integrity and security of data stored in devices for user. And each provides different services to the
cloud storage is issues among it. user. The cloud is available in four-deployment model
namely
So we create a scheme by which we provide a
secure saving of our confidential data in cloud storage in an 1. Public cloud
efficient manner which requires low computational power 2. Private cloud
and time and disallowing hacker from penetrating into our 3. Community cloud
privacy data storage. And we provide a simple and easy 4. Hybrid cloud
integrity checking mechanism when compared to other
already present one by which we can verify whether our data Public Cloud: If the cloud computing resides outside an
is not corrupted and deleted or modified ours is an efficient. organization and any one access it is called public cloud.
Our integrity checking mechanism is simple that it does not Third party hosts the files.
take more computational power. The mechanism even
prevents the TPA who maintains our data in cloud storage Private Cloud: If the cloud computing resides inside an
organization and file or application accessed through a
from editing our file.
secure network is called private cloud.
Keywords: Cloud Storage, Integrity, Third Party Auditor,
Security in cloud. Community Cloud: Different organization with same policy
and requirement share a same cloud computing and this is
called community cloud.
1. INTRODUCTION
1.1 Cloud Computing Hybrid Cloud: Combination of public, private and
community cloud is called hybrid cloud.

ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE


ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India

1.2 Cloud storage give proof that the data which user retrieve from the cloud is
what he has stored and the integrity of the user data is
As cloud computing is popular and in demand maintained. There are two implementation to give the proof
similarly cloud storage technology has greater demand. of retrievability. They are
Cloud storage is a virtualized storage areas over a network
basis .It provides services on the basis of QoS assured. Cloud 1. Keyed Hash Function.
storage consist of many resources but yet act as single 2. Sentinels.
system. It has greater fault tolerance by redundancy. As the
data generated by IT sectors are dramatically growing we 1. Keyed Hash Function
can’t just update our hardware frequently instead we can
adopt for cloud storage which is a better choice. Cloud Initially, they used hashed key function. Before
storage can we just for different purpose just backing up our storing the user data into the cloud storage the data is
home desktop data into cloud storage or as an archive to preprocessed at the client side and then stored in the cloud
maintain data for regulatory. Cloud storage allows user to storage. While preprocessing for each data, which we store
access broad range of application and resources immediately, in cloud storage as hash, key is generated and a hash value is
which are hosted by others. too generated. To verify if the integrity of the user data
stored is not lost the user send the hash key to the cloud
storage and request to return the hash value .If the hash value
Home PC is same as we have we can confirm that the integrity is
preserved. But the drawback of this approach is that for
Internet Cloud every user data that he saves in the cloud storage a hash key
Company Storage and a hash value is generated an it must be stored in the user
space .For large organization they have large amount of data
to be stored and the hash value and key storage for it itself
Fig 1: Sample Cloud Storage needs more storage space.
Advantages
• Cloud storage avoids the need to buy storage 2. Sentinels:
equipment.
• We have to just pay for the amount of storage we In this approach for every data that we store in the
are using. cloud we add sentinels [3] i.e. Special blocks in random
• Cloud storage allows user to access broad range of places in the user file. Only the user knows the location of
application and resources immediately, which are the sentinels. While checking for integrity the user verifies
hosted by others. the location of the sentinels that the user has embedded into
the file. If the location of the sentinels has changed or if the
Disadvantages sentinels are absent it proves that the data has been corrupted
• As data is redundant it leads to be hacked by or hacked by intruders. Thus the integrity of file is found.
unauthorized users. But the drawback of this approach is the user has to save the
• Cloud storage is costly for day users. sentinels that he has used in his personal computer which
• Security is not grauntaneed completely for our data. itself will become a storage overhead.

By using this two method they find integrity for the data. In
2. EXISTING SYSTEM this two approach the computational work is more at client
side, which is an overhead for the client. So, we proposed an
The objective of the existing system is to provide enhanced approach in which we found integrity in an
integrity and security to the data stored in cloud storage. efficient manner. It eliminates the client overhead.
Since data generation is more rapid it makes small firms hard
to update their hardware often. Also maintain the large
volume of data at client side becomes an overhead to user.
3. PROPOSED SYSTEM
The problem becomes yet complicated when the user of the
Here we are going propose a system, which
data uses small device, like a PDA, mobile phone, which has
decrease workload of the client and provide security and
limited battery power CPU power, and communication
integrity in an efficient manner. Since the data is not
bandwidth. Despite there may occur certain security
physically accessible to the user the cloud should provide the
problem, data authentication and integrity there is a need to
user a way to check for integrity. We provide a method

ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE


ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India

which gives a proof of integrity for data in the cloud which 1. Providing Security.
the customer employ to check the correctness of his/her data 2. Integrity Check.
in the cloud. This proof can be agreed by both the customer
and the cloud can be incorporated in the SLA.
1. Providing Security:
In proposed system, we eliminate the need of
encrypting the full file. Instead we encrypted only some bits The data that the user stores in the cloud storage
of each data block and thus the client computational should be secure so that it prevents intruders from accessing
overhead is reduced [2].The storage overhead at client side our private data [4]. To provide security we use a security
too is reduced as there is no need to store any data. Therefore key which is automatically generated foe each unique user
thin client can adopt our scheme. and we use RSA encryption algorithm to encrypt the file and
In this model irrespective of data file size only one store it. It is a public key encryption algorithm, which
cryptographic key is used. The client does not store any data eliminates the need to send our secret key over the network.
at his side. While uploading a file it preprocess the user file The public key is shared but the private key is not shared.
and create a meta data later which is appended at the back of The sender encrypts the file or data that is to be stored in the
the file. The Meta data is later used for checking if integrity cloud storage using the Third party auditor public key. So
is preserved or not. the receiver with the particular private key can only decrypt
the file.
System Architecture

Key Encryption F

Data Encrypted
Data

Request
Fig 3: User Side Encryption
User Archive
Challenges c
Reply Encrypted Data
Fig 2: Overall Architecture Data

The overall working of the proposed system is as follows. TPA Secret


Key
Step 1: The user is one who needs to access the cloud
storage for storing his data.
Step 2: For secure access each user is given a unique key Fig 4: TPA Side Decryption
through which he can access his account and get the
benefits of the cloud storage. 2. Integrity Checks:
Step 3: The data before storing it is encrypted using RSA
algorithm. It uses the TPA public key to encrypt. Integrity modules check the correctness of the user
Step 4: Then the encrypted file is saved in the archive. data by verifying the Meta data appended at back of the file.
Step 5: The to verify the integrity the user request the meta These are the following steps involved in finding the
data. integrity of the user data
Step 6: The user compares the Meta data and find whether
the data is correct or modified. a) Generation of Meta data.
Step 7: If the file has been modified it is indicated to the b) Encrypting the Meta data.
user. c) Appending the Meta data.
d) Verification Phase.
Our proposal consists of two modules.
a) Generation of Meta data:

ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE


ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India

When the user wants to store his/her file into cloud compared with computational power used and processing
storage he preprocesses the file and create Meta data that is time.
to be appended into the file.
Comparison of Existing System and Proposed System
with efficiency and computational process& Time:
DATA FILE

5 6
1 2 3 4

Data Block
Fig 5: Generation of meta-data

We select random bit from the file which can be


used as Meta. Fig 7: Existing System

b) Encrypting the Meta data:

All the Meta data selected from each data block are
further encrypted [5] to add more security .The Meta data are
encrypted using certain algorithm. A random generator
generates bits which are XOR with the meta data bits and 1’s
complement of the result of the above XOR operation is used
for appending.

c) Appending the Meta data:


Fig 8: Proposed System
The Meta data generated and encrypted using the
above techniques are appended at the back of the file. The
file with encrypted Meta data appended back is archived 4. CONCLUSION
with the cloud.
In this paper we provide method to save our data in
Data File F Meta Data the cloud storage secure and provide an integrity check for
our data to verify if integrity is preserved or not while we
retrieve our data .Our scheme is efficient in the way that it
use less computational power and processing time, so it can
Fig 6. Encrypted file with Meta data inserted back be adopted for thin clients like PDA, mobile etc.

d) Verification phase: 6. REFERENCES


To verify the integrity of the user data the verifier
[1] Mell P. and Granc G., “The NIST Definition of Cloud
uses the Meta data. The verify do the reverse process of the
Computing (Draft),” in Proceedings of the National
encryption and see if the Meta data that was appended back
Institute of Standards and Technology, Gaithersburg, pp.
of the file if not changed. And thus we get a proof of
6, 2011.
retrievability
[2] Atenise.G, Burn R “Provable data possession at
untrusted stores,” in CCS ’07: Proceedings of the 14th
The performance measurement for the existing
ACM conference on Computer and communications
system and the proposed system has been calculated and it is
security. New York.
found that our proposed system show better efficiency when

ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE


ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India

[3] Juels.A “Pors: proofs of retrievability for large files,” in


CCS ’07: Proceedings of the 14th ACM conference on
Computer and communications security. USA
[4] D. Wagner, and A. Perrig, “Practical techniques for
searches on encrypted data,” in SP ’00: Proceedings of
the 2000 IEEE Symposium on Security and Privacy.
Washington.
[5] Metri P “Privacy Issues and Challenges in Cloud
computing,” International Journal of Advanced
Engineering Sciences and
Technologies, vol. 5, no. 1, pp. 5-6, 2011

ISBN No.978-1-4799-3834-6/14/$31.00©2014 IEEE

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy