An Efficient PDP Scheme for Distributed Cloud Storage

IJMER
IJMERIJMER

International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education. International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.

International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2317 | Page
Jimnisha Shaik1
, Syed Gulam Gouse2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and
software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing
resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite
web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as
traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by
many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud
Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud
storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a
public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in
storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic
verifiable response and hash index hierarchy.
INDEX TERMS: Cloud, Hash index, Integrity, PDP.
I. INTRODUCTION
In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational
speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which
are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level,
task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core
and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one
instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi-
processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that
each processing element can execute its part of the algorithm simultaneously with others. There is another important concept
which is responsible for the effective and efficient computation of our problem is, distributed system. Using high
performance computers connected by using high speed communication links, it is possible to build a single system consisting
of multiple computers and using it as a single consolidated system.
In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are
a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent
transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be
transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage
and all the processing is done locally. All systems are interconnected using a LAN.
In any kind of computer system which involves data storage and retrieval, availability is one of the major security
issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of
retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of
client‟s data without being downloading it. The proof-checking of the data without being downloading is very important,
especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted
or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only
for single cloud storage, but not for the distributed-cloud storage environment.
II. RELATED WORK
To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic
approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first
proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a
static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a
dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash
function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses
due to the lack of the randomness in the challenges.
In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n)
communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of
Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which
relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and
models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system
that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code
(IP-ECC), which improves the security and efficiency of the existing tools, like POR.
An Efficient PDP Scheme for Distributed Cloud Storage
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2318 | Page
III. PROPOSED METHOD
In this section, we introduce the principles of our cooperative provable data possession for distributed clouds,
including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme.
A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that
f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This
notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and
mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj.
B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and
an interactive proof system, S′ = (K, T, P).
KeyGen(
k
1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk);
TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file
F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H)
is a set of verification parameters u and an index hierarchy
H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk.
Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that
is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk
and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit
{0|1} denoting false and true where,  pPK
denotes the collaborative computing in Pk  P.
C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1,
which has following characters:
 A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature
tags can be reduced with the order of s.
 The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost
importance for large or huge files.
 This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response,
which minimizes network communication overheads.
Figure 1: The fragment structure of Cooperative PDP model
The above structure, considered as a common representation for some existing schemes in [1][7], can be converted
to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical
CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates
favorable conditions for the architecture of the CSPs.
D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This
architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored
resources. Three layers can be described as follows:
 First Layer (Express Layer): It offers an abstract representation of the stored resources
 Second Layer (Service Layer): It promptly offers and manages cloud storage services
 Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2319 | Page
Figure 2: The architecture of Cooperative PDP model
This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a
simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the
differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three
CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage
Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1.
Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some
special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in
dashed line) and discontinuous blocks (as shown on a non continuous color).
IV. CONCLUSION
With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable
data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge
proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing
their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new
method for data integrity verification in out sourcing data storage on distributed cloud environment.
REFERENCES
[1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications
Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
[3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.
[4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference
onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
[5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on
Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.
[6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in
Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127.
[7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.

Recomendados

International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 visualizações5 slides
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... por
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
411 visualizações4 slides
Cryptographic Cloud Storage with Hadoop Implementation por
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationIOSR Journals
430 visualizações7 slides
Data integrity proof techniques in cloud storage por
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
831 visualizações5 slides
Mn3422372248 por
Mn3422372248Mn3422372248
Mn3422372248IJERA Editor
360 visualizações12 slides
Ijcnc050208 por
Ijcnc050208Ijcnc050208
Ijcnc050208IJCNCJournal
283 visualizações9 slides

Mais conteúdo relacionado

Mais procurados

Iaetsd secured and efficient data scheduling of intermediate data sets por
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
166 visualizações5 slides
A Hybrid Cloud Approach for Secure Authorized Deduplication por
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
369 visualizações11 slides
Seed block algorithm por
Seed block algorithmSeed block algorithm
Seed block algorithmDipak Badhe
4.5K visualizações24 slides
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
21 visualizações5 slides
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
70 visualizações13 slides
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases por
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
300 visualizações4 slides

Mais procurados(20)

Iaetsd secured and efficient data scheduling of intermediate data sets por Iaetsd Iaetsd
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd166 visualizações
A Hybrid Cloud Approach for Secure Authorized Deduplication por 1crore projects
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects369 visualizações
Seed block algorithm por Dipak Badhe
Seed block algorithmSeed block algorithm
Seed block algorithm
Dipak Badhe4.5K visualizações
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por IRJET Journal
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal21 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects70 visualizações
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases por ijircee
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee300 visualizações
seed block algorithm por Dipak Badhe
seed block algorithmseed block algorithm
seed block algorithm
Dipak Badhe2.4K visualizações
Performance evaluation and estimation model using regression method for hadoo... por redpel dot com
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
redpel dot com307 visualizações
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio... por IJAAS Team
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team29 visualizações
Energy and Load Aware Routing Protocol for Internet of Things por IJAAS Team
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
IJAAS Team35 visualizações
An efficient, secure deduplication data storing in cloud storage environment por eSAT Journals
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals134 visualizações
An asynchronous replication model to improve data available into a heterogene... por Alexander Decker
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...
Alexander Decker377 visualizações
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method por IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal33 visualizações
Enabling efficient multi keyword ranked por Sakthi Sundaram
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram160 visualizações
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio... por Ericsson
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Ericsson518 visualizações
Toward a real time framework in cloudlet-based architecture por redpel dot com
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
redpel dot com514 visualizações
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por IRJET Journal
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal11 visualizações
Frequency and similarity aware partitioning for cloud storage based on space ... por redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
redpel dot com212 visualizações
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage por IRJET Journal
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal39 visualizações
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage por 1crore projects
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects55 visualizações

Destaque

Ijmer 46053040 por
Ijmer 46053040Ijmer 46053040
Ijmer 46053040IJMER
363 visualizações11 slides
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ... por
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...IJMER
893 visualizações4 slides
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ... por
Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...IJMER
630 visualizações6 slides
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E... por
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...IJMER
420 visualizações5 slides
Design of Neural Network Controller for Active Vibration control of Cantileve... por
Design of Neural Network Controller for Active Vibration control of Cantileve...Design of Neural Network Controller for Active Vibration control of Cantileve...
Design of Neural Network Controller for Active Vibration control of Cantileve...IJMER
621 visualizações8 slides
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ... por
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...IJMER
548 visualizações7 slides

Destaque(20)

Ijmer 46053040 por IJMER
Ijmer 46053040Ijmer 46053040
Ijmer 46053040
IJMER363 visualizações
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ... por IJMER
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
IJMER893 visualizações
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ... por IJMER
Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...
IJMER630 visualizações
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E... por IJMER
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
IJMER420 visualizações
Design of Neural Network Controller for Active Vibration control of Cantileve... por IJMER
Design of Neural Network Controller for Active Vibration control of Cantileve...Design of Neural Network Controller for Active Vibration control of Cantileve...
Design of Neural Network Controller for Active Vibration control of Cantileve...
IJMER621 visualizações
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ... por IJMER
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
IJMER548 visualizações
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi... por IJMER
Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
IJMER1.1K visualizações
Ijmer 46062932 por IJMER
Ijmer 46062932Ijmer 46062932
Ijmer 46062932
IJMER323 visualizações
Bh32793797 por IJMER
Bh32793797Bh32793797
Bh32793797
IJMER262 visualizações
Da31456462 por IJMER
Da31456462Da31456462
Da31456462
IJMER197 visualizações
A Novel Switch Mechanism for Load Balancing in Public Cloud por IJMER
A Novel Switch Mechanism for Load Balancing in Public CloudA Novel Switch Mechanism for Load Balancing in Public Cloud
A Novel Switch Mechanism for Load Balancing in Public Cloud
IJMER514 visualizações
Ae32626632 por IJMER
Ae32626632Ae32626632
Ae32626632
IJMER251 visualizações
Dj31514517 por IJMER
Dj31514517Dj31514517
Dj31514517
IJMER242 visualizações
Helicopter Flapping Under Dynamic Stall por IJMER
Helicopter Flapping Under Dynamic StallHelicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic Stall
IJMER667 visualizações
Ce32944948 por IJMER
Ce32944948Ce32944948
Ce32944948
IJMER340 visualizações
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy por IJMER
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
IJMER272 visualizações
Dd3210971099 por IJMER
Dd3210971099Dd3210971099
Dd3210971099
IJMER487 visualizações
Aw32736738 por IJMER
Aw32736738Aw32736738
Aw32736738
IJMER317 visualizações
Optimization of machining parameters of Electric Discharge Machining for 202 ... por IJMER
Optimization of machining parameters of Electric Discharge Machining for 202 ...Optimization of machining parameters of Electric Discharge Machining for 202 ...
Optimization of machining parameters of Electric Discharge Machining for 202 ...
IJMER396 visualizações
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma por IJMER
Optimal Control Problem and Power-Efficient Medical Image Processing Using PumaOptimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
IJMER422 visualizações

Similar a An Efficient PDP Scheme for Distributed Cloud Storage

An4201262267 por
An4201262267An4201262267
An4201262267IJERA Editor
386 visualizações6 slides
E045026031 por
E045026031E045026031
E045026031researchinventy
390 visualizações6 slides
Improving availability and reducing redundancy using deduplication of cloud s... por
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
185 visualizações29 slides
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
57 visualizações8 slides
A novel cloud storage system with support of sensitive data application por
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
333 visualizações9 slides
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
42 visualizações8 slides

Similar a An Efficient PDP Scheme for Distributed Cloud Storage(20)

An4201262267 por IJERA Editor
An4201262267An4201262267
An4201262267
IJERA Editor386 visualizações
E045026031 por researchinventy
E045026031E045026031
E045026031
researchinventy390 visualizações
Improving availability and reducing redundancy using deduplication of cloud s... por dhanarajp
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
dhanarajp185 visualizações
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 visualizações
A novel cloud storage system with support of sensitive data application por ijmnct
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct333 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 visualizações
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing por AIRCC Publishing Corporation
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation28 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation42 visualizações
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou... por IJMER
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER1.4K visualizações
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 visualizações
Improving Data Storage Security in Cloud using Hadoop por IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 visualizações
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal103 visualizações
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 visualizações
iaetsd Controlling data deuplication in cloud storage por Iaetsd Iaetsd
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd95 visualizações
IRJET-Auditing and Resisting Key Exposure on Cloud Storage por IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal31 visualizações
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal49 visualizações
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 visualizações
Privacy preserving public auditing for secured cloud storage por dbpublications
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications32 visualizações
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ... por IRJET Journal
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal8 visualizações
A hybrid cloud approach for secure authorized por Ninad Samel
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
Ninad Samel143 visualizações

Mais de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F... por
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
3K visualizações5 slides
Developing Cost Effective Automation for Cotton Seed Delinting por
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
2.8K visualizações8 slides
Study & Testing Of Bio-Composite Material Based On Munja Fibre por
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
2.3K visualizações6 slides
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor) por
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
2.1K visualizações9 slides
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F... por
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
2.4K visualizações8 slides
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu... por
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
1.7K visualizações8 slides

Mais de IJMER(20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F... por IJMER
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER3K visualizações
Developing Cost Effective Automation for Cotton Seed Delinting por IJMER
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER2.8K visualizações
Study & Testing Of Bio-Composite Material Based On Munja Fibre por IJMER
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER2.3K visualizações
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor) por IJMER
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER2.1K visualizações
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F... por IJMER
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER2.4K visualizações
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu... por IJMER
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER1.7K visualizações
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in... por IJMER
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER1.6K visualizações
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A... por IJMER
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER1.7K visualizações
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation por IJMER
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER2.9K visualizações
High Speed Effortless Bicycle por IJMER
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER1.6K visualizações
Integration of Struts & Spring & Hibernate for Enterprise Applications por IJMER
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER1.7K visualizações
Microcontroller Based Automatic Sprinkler Irrigation System por IJMER
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER1.5K visualizações
On some locally closed sets and spaces in Ideal Topological Spaces por IJMER
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER1.1K visualizações
Intrusion Detection and Forensics based on decision tree and Association rule... por IJMER
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER1.1K visualizações
Natural Language Ambiguity and its Effect on Machine Learning por IJMER
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER1.7K visualizações
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess por IJMER
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER503 visualizações
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders por IJMER
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER622 visualizações
Studies On Energy Conservation And Audit por IJMER
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER642 visualizações
An Implementation of I2C Slave Interface using Verilog HDL por IJMER
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER2.9K visualizações
Discrete Model of Two Predators competing for One Prey por IJMER
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER649 visualizações

Último

SAP Automation Using Bar Code and FIORI.pdf por
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
22 visualizações38 slides
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ... por
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
25 visualizações9 slides
Report 2030 Digital Decade por
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
15 visualizações41 slides
The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
79 visualizações25 slides
Piloting & Scaling Successfully With Microsoft Viva por
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
12 visualizações160 slides
Scaling Knowledge Graph Architectures with AI por
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
28 visualizações15 slides

Último(20)

SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP22 visualizações
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia15 visualizações
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge12 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge28 visualizações
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 visualizações
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada126 visualizações
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 visualizações
Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 visualizações
Top 10 Strategic Technologies in 2024: AI and Automation por AutomationEdge Technologies
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and Automation
AutomationEdge Technologies18 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 visualizações
Black and White Modern Science Presentation.pptx por maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291616 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver27 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil298 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining41 visualizações
ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman187 visualizações

An Efficient PDP Scheme for Distributed Cloud Storage

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2317 | Page Jimnisha Shaik1 , Syed Gulam Gouse2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. INDEX TERMS: Cloud, Hash index, Integrity, PDP. I. INTRODUCTION In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level, task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi- processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that each processing element can execute its part of the algorithm simultaneously with others. There is another important concept which is responsible for the effective and efficient computation of our problem is, distributed system. Using high performance computers connected by using high speed communication links, it is possible to build a single system consisting of multiple computers and using it as a single consolidated system. In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage and all the processing is done locally. All systems are interconnected using a LAN. In any kind of computer system which involves data storage and retrieval, availability is one of the major security issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of client‟s data without being downloading it. The proof-checking of the data without being downloading is very important, especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only for single cloud storage, but not for the distributed-cloud storage environment. II. RELATED WORK To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of the randomness in the challenges. In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n) communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code (IP-ECC), which improves the security and efficiency of the existing tools, like POR. An Efficient PDP Scheme for Distributed Cloud Storage
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2318 | Page III. PROPOSED METHOD In this section, we introduce the principles of our cooperative provable data possession for distributed clouds, including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme. A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj. B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and an interactive proof system, S′ = (K, T, P). KeyGen( k 1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk); TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H) is a set of verification parameters u and an index hierarchy H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk. Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit {0|1} denoting false and true where,  pPK denotes the collaborative computing in Pk  P. C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1, which has following characters:  A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature tags can be reduced with the order of s.  The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost importance for large or huge files.  This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response, which minimizes network communication overheads. Figure 1: The fragment structure of Cooperative PDP model The above structure, considered as a common representation for some existing schemes in [1][7], can be converted to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates favorable conditions for the architecture of the CSPs. D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored resources. Three layers can be described as follows:  First Layer (Express Layer): It offers an abstract representation of the stored resources  Second Layer (Service Layer): It promptly offers and manages cloud storage services  Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2319 | Page Figure 2: The architecture of Cooperative PDP model This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1. Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in dashed line) and discontinuous blocks (as shown on a non continuous color). IV. CONCLUSION With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new method for data integrity verification in out sourcing data storage on distributed cloud environment. REFERENCES [1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597. [3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10. [4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222. [5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198. [6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127. [7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.