E045026031

Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.

Research Inventy: International Journal of Engineering And Science
Vol.4, Issue 5 (May 2014), PP 26-31
Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com
26
Co-Operative Multiple Replica Provable Data Possession for
Integrity Verification in Multi-Cloud Storage
Mr.Susheel George Joseph M.C.A, M,Tech, M.Phil(CS)
(Assistant Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Changanassery,susheelgj@gmail.com)
ABSTRACT : Many storage systems rely on replication to increase the availability and durability of data on
untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of
the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the
data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica
provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a
file in a storage system to verify through a challenge-response protocol that each unique replica can be
produced at the time of the challenge and that the storage system uses t times the storage required to store a
single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a
client/server storage system.
KEYWORDS: Availability, Data Possession, Homomorphic, Integrity, Multi-Cloud, Multi-Replica,Zero-
Knowledge
I. INTRODUCTION
This is a study that combines the advantages of both CPDP (Co operative PDP) and MRPDP (Multiple
Replica PDP). The proposed paper manages user‟s data in multiple cloud storage by ensuring the integrity and
availability of user‟s data. To describe this we should have to describe both MRPDP and CPDP.Provable data
possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this scheme, we
address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of
service and data migration, in which we consider the existence of multiple cloud service providers to
cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on
homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on
multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-
knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in
particular present an efficient method for selecting optimal parameter values to minimize the computation costs
of clients and storage service providers. Our experiments show that our solution introduces lower computation
and communication overheads in comparison with non-cooperative approaches.
Using multiple-replica provable data possession(MR-PDP) to store t replicas is computationally much
more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting
each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on
demand, at little expense, when some of the existing replicas fail. The generation of replicas is on demand by
the user‟s request that is based on the security choice selected by the user at the time of file upload. The user can
choose three options Low, Medium, High at the time of file upload. The uploaded file is divided in to N blocks
of different sizes to achieve the efficiency in storage and is also used to improve security, here N represent the
number of clouds we are using. Low means the file is divided into N blocks (here 3), and each block is stored in
N different location of the single cloud. Medium means the file is divided into N blocks and each block is stored
in N different clouds which improves the security of data but reduce the availability. High means the file is
divided into N blocks and each N block is stored in N different clouds that are we are keeping the replicas of file
in N different clouds. The system maintains a download count to dynamically create the replicas in accordance
with the users demand.The system which consists of three users namely User who have the access rights to
upload, download and delete file, TPA (Third Party Auditor) who verifies the files that are uploaded by the
registered user and the user can download the file only after this verification, Admin who own the system and
who have the full access right, can create or delete TPAs and can view the uploaded files and details about the
uploads. A single cloud can have different TPA‟s and the work load is divided among by using the random
function to select the corresponding files from the cloud.
The creation and deletion of TPA is based on the work load and efficiency of TPA which is monitored by
the administrator. The data uploaded by the user is temporarily stored in an encrypted form by using the
Co-Operative Multiple Replica Provable…
27
homomorphic encryption algorithm. We can use any kind of encryption algorithms along with this applications
but it is better to choose a zero knowledge proof algorithm. This uses an encryption key which is automatically
supplied to the user at the time of file upload. The data is stored in cloud only after it is verified by TPA. The
actual storage of data is in an encrypted form called Meta Data, which ensures additional security measure for
the cloud data. The user gets the original file when he/she downloads the needed file from the cloud storage,
which ensures the integrity of data. The user is unaware of the background processes. This system reduces the
overload of admin by creating TPAs. The TPA can be of any number for each cloud depending on the number
of clouds we are using.
II. NEED FOR THE SYSTEM
The main objective of this paper is to provide an insight to build a system at low-cost, scalable, location
independent platform for managing clients‟ data, current cloud storage systems adopt several new distributed
file systems, for example, Apache Hadoop Distribution File System (HDFS), Google File System (GFS),
Amazon S3 File System, CloudStore etc. These file systems share some similar features: a single metadata
server provides centralized management by a global namespace; files are split into blocks or chunks and stored
on block servers; and the systems are comprised of interconnected clusters of block servers. Those features
enable cloud service providers to store and process large amounts of data. However, it is crucial to offer an
efficient verification on the integrity and availability of stored data for detecting faults and automatic recovery.
Moreover, this verification is necessary to provide reliability by automatically maintaining multiple copies of
data and automatically redeploying processing logic in the event of failures.
Some of the Objectives can be summarized as
Usability aspect: A client should utilize the integrity check in the way of collaboration services. The scheme
should conceal the details of the storage to reduce the burden on clients.
Security aspect: The scheme should provide adequate security features to resist some existing attacks, such as
data leakage attack and tag forgery attack.
Performance aspect: The scheme should have the lower communication and computation overheads than non-
cooperative solution.
III. EXISTING ARCHITECTURE
There exist various tools and technologies for multicloud, such as Platform VM Orchestrator,
VMwarevSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform for
managing clients‟ data. However, if such an important platform is vulnerable to security attacks, it would bring
irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed
through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered
with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for
cloud service providers to provide security techniques for managing their storage services.More Moreover
another limitations of the existing system is that it is not suitable for multicloud storage services.To check the
availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches
called Provable Data Possession and Proofs of Retrievability. Ateniese et al. first proposed the PDP model for
ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that
achieves the communication cost.
They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge
the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function
and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses
due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in
advance and users cannot perform block insertions anywhere.
Co-Operative Multiple Replica Provable…
28
Fig 1. Existing Architecture
IV. PROPOSED ARCHITECTURE
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing.
In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the
scalability of service and data migration, in which we consider the existence of multiple cloud service providers
to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on
homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on
multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-
knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in
particular present an efficient method for selecting optimal parameter values to minimize the computation costs
of clients and storage service providers. Our experiments show that our solution introduces lower computation
and communication overheads in comparison with non-cooperative approaches.
Fig 2. Proposed Architecture
V. ARCHITECTURE DETAILS – MODULARIZATION
The modules are formed on the basis of the functionalities that are found in the proposed system. The
functionalities are performed by three users namely Admin, TPA, and registered User.
Cooperative accessing
We can access data from multiple clouds by using the CPDP scheme, it is based on homomorphic verifiable
response (HVR) and hash index hierarchy (HIH). We prove the security of our scheme based on multi-prover
zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge
properties.
Co-Operative Multiple Replica Provable…
29
Replica generation
The replica generation can be performed by the MR-PDP scheme. This scheme allows a client to stores t
replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can
be produced at the time of the challenge and that the storage system uses t times the storage required to store a
single replica.
Integrity verification
Integrity requires that authorized changes must be detected and tracked, and changes must be limited to a
specific scope. Due to the increased number of entities and access points in a cloud environment, authorization
is crucial in assuring that only authorized entities can interact with data. A cloud computing provider is trusted
to maintain data integrity and accuracy. To verify integrity, we must examine the net effects on the cloud data
related to data integrity. There will be a set of standards for monitoring the integrity of data. Integrity
monitoring is essential in cloud storage as data integrity is critical for any data centre. Here, we consider the
existence of multiple CSPs to collaboratively store and maintain the clients‟ data. The traditional cryptographic
primitives for data integrity and availability based on hashing and signature schemes are not applicable on the
outsourced data. Hence lots of new techniques have been found out for integrity verification. This technique
too doesn‟t guarantee the expected security in clouds. Here we use the CPDP scheme for integrity verification.
.
Fig 3 .Integrity Verification in Hybrid Cloud
File Division
The Cloud User who has a large amount of data to be stored in multiple clouds and has the permissions
to access and manipulate stored data. The User‟s Data is converted into data blocks of different sizes for
improving the efficiency of storage and as well as to improve the security of file.
Registration
The user can store the file into the cloud storage only if he/she is a registered owner of this web
application. The registration can be made as either free or a paid registration depending on the organization‟s
requirement.
File Upload
Not all files are directly stored in multiple clouds, but only the files that are verified by the trusted TPA
are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the
TPA. The File may be encrypted using the cryptographic key which is randomly generated.
File verification
Using the cryptographic key the file is encrypted and by using this key the file contents may be decrypted by
the TPA for the verification process. He can view the file contents by the decryption process and can verify the
files.
File download
Only the verified Files can be downloaded by the File Owner. If the user wants to download their files, the
data stored in multi-cloud is integrated and downloaded. Here the downloading count is saved for generating the
replicas of the file by ensuring the demand of file. The user could get acknowledgement about the server which
the file is saved, it is also an additional provision which is depends on the client‟s requirement. We can increase
the security of downloading by verifying the key along with downloading process. One problem can arise is in
the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be
considered as an optional module along with file downloading and deletion modules.
Co-Operative Multiple Replica Provable…
30
File Deletion
The Uploaded file can be deleted by the File Owner. The security can be increased if we are making
key verification along with the deletion process. One problem can arise is in the case of key remembrance. But
this can be solved if we are using Grid Security along with it. It can be considered as an optional module along
with file downloading and deletion.
File Storage
Verified File is stored in the cloud in an Encrypted format using the Cryptographic key. So file security
is ensured and no one can decrypt or hack the file. The Verified File can be stored in three Clouds. The uploaded
file is split in to different blocks based on the number of clouds we are using. When user uploads the file there is
a choice of file security-Low, Medium, High. If the security is „Low‟ then it is stored in Cloud1 and it is of
„Medium‟ then the encrypted file blocks are saved in each cloud individually. If the security option is „High‟
then the same file blocks are saved in each Clouds independently.
TPA Creation and deletion
TPA is one of the users in this application. TPA is used to verify the files that are uploaded by the
User. The User file is uploaded to the cloud storage by the TPA only after the verification process. TPA can
view the file content without downloading; he can decrypt the information by using the corresponding encrypted
key. TPA creation is done by the Administrator for reducing the overhead in managing each cloud user. The
deletion task can be used if the TPA is no longer needed for the particular cloud.
View All Files
All the Files in the web including verified and not-verified are viewed by the Administrator
View File Owners
Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file
owners and can monitor the storage space used by the file owners.
VI. CONCLUSION
The aim of this article entitled “Co-Operative Provable Data Possession For Integrity Verification In
Multi-Cloud Storage” was to demonstrate the combined effect of two efficient and well known concepts CPDP
and MR-PDP. This could achieve the user‟s requirements in the multi cloud environment such as availability
and security of data. These are the two major concerns in a distributed environment.As we are using multi cloud,
so there are multiple cloud service provider‟s for multiple clouds. As we want to store block in each cloud so the
request has to go from each Cloud Service Provider, so to reduce the complexity we can use the Centralized
Cloud Service Provider. Therefore, every request is managed by centralized Cloud Service Provider. This
research can be treated as a new technique for data integrity verification in data possession. As part of future
enhancement, I would like extend my work to explore more effective MR-CPDP constructions. Finally, it is still
a challenging problem for the generation of tags with the length irrelevant to the size of data blocks and various
file formats.
VII. ACKNOWLEDGEMENT
I would like to thank GOD Almighty for the valuable support throughout this research phase to
complete this paper successfully. I would like to express my sincere thanks to my Guide for his valuable
suggestions. I also like to thank my family members and my college authorities as well as co-workers for their
consistence support and motivation.
REFERENCES
[1] O. Rahamathunisa Begam,, T. Manjula,, T. Bharath Manohar,, B. Susrutha, “Cooperative Schedule Data Possession for
Integrity Verification in Multi-Cloud Storage” in International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5,
Sep - Oct. 2013, pp.2726-2741.
[2] Yan Zhu ,Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China; Hongxin Hu ; Gail-Joon Ahn ; Mengyang
Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage” in Parallel and Distributed Systems,
IEEE Transactions on (Volume:23 , Issue: 12 ), Dec. 2012,pp.2231 – 2244.
[3] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech.
Rep., Feb 2009.
Co-Operative Multiple Replica Provable…
31
[5] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology (CRYPTO‟2001), vol.
2139 of LNCS, 2001, pp. 213–229.
[6] Megha Patil , Prof. G.R.Rao, “Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession ” in
Megha Patil et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp.982-
985
[7] Vaibhav Bharati and M R Patil., “Advanced Cooperative Provable Data Possession based Data Integrity Verification for Multi-
Cloud Storage” in International Journal of Computer Applications, Foundation of Computer Science, New York, USA, ,November
2013,pp.25-28
[8] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[9] A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for Large files,” in ACM Conference on Computer and Communications
Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
[10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in Communication networks, SecureComm, 2008, pp. 1–10.
B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster,“Virtual infrastructure management in private and hybrid Clouds,”
IEEE Internet Computing, vol. 13, no. 5,2009, pp. 14–22.
[11] K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on
Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.

Recomendados

J0212065068 por
J0212065068J0212065068
J0212065068researchinventy
321 visualizações4 slides
Improving availability and reducing redundancy using deduplication of cloud s... por
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
185 visualizações29 slides
iaetsd Controlling data deuplication in cloud storage por
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
95 visualizações6 slides
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S... por
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...dbpublications
28 visualizações10 slides
A hybrid cloud approach for secure authorized por
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedNinad Samel
143 visualizações5 slides
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES... por
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
33 visualizações4 slides

Mais conteúdo relacionado

Mais procurados

Guaranteed Availability of Cloud Data with Efficient Cost por
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
84 visualizações4 slides
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
42 visualizações8 slides
Improved deduplication with keys and chunks in HDFS storage providers por
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
29 visualizações5 slides
Iaetsd secured and efficient data scheduling of intermediate data sets por
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
166 visualizações5 slides
Assigment 2 por
Assigment 2Assigment 2
Assigment 2NidhiGupta8431
56 visualizações4 slides
Data integrity proof techniques in cloud storage por
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
831 visualizações5 slides

Mais procurados(17)

Guaranteed Availability of Cloud Data with Efficient Cost por IRJET Journal
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal84 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 visualizações
Improved deduplication with keys and chunks in HDFS storage providers por IRJET Journal
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal29 visualizações
Iaetsd secured and efficient data scheduling of intermediate data sets por Iaetsd Iaetsd
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd166 visualizações
Assigment 2 por NidhiGupta8431
Assigment 2Assigment 2
Assigment 2
NidhiGupta843156 visualizações
Data integrity proof techniques in cloud storage por IAEME Publication
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication831 visualizações
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –... por IRJET Journal
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal31 visualizações
S.A.kalaiselvan toward secure and dependable storage services por kalaiselvanresearch
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
kalaiselvanresearch339 visualizações
Crypto multi tenant an environment of secure computing using cloud sql por ijdpsjournal
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal302 visualizações
Towards Secure and Dependable Storage Services in Cloud Computing por IJMER
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER840 visualizações
Towards secure and dependable storage por Khaja Moiz Uddin
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin1.7K visualizações
Data Deduplication: Venti and its improvements por Umair Amjad
Data Deduplication: Venti and its improvementsData Deduplication: Venti and its improvements
Data Deduplication: Venti and its improvements
Umair Amjad931 visualizações
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St... por IRJET Journal
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET Journal20 visualizações
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS... por ijcsit
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
A META DATA VAULT APPROACH FOR EVOLUTIONARY INTEGRATION OF BIG DATA SETS: CAS...
ijcsit14 visualizações
MataNui - Building a Grid Data Infrastructure that "doesn't suck!" por Guy K. Kloss
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
MataNui - Building a Grid Data Infrastructure that "doesn't suck!"
Guy K. Kloss562 visualizações
Ensuring secure transfer, access and storage over the cloud storage por eSAT Publishing House
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
eSAT Publishing House293 visualizações

Similar a E045026031

International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 visualizações5 slides
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou... por
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
1.4K visualizações16 slides
Mn3422372248 por
Mn3422372248Mn3422372248
Mn3422372248IJERA Editor
360 visualizações12 slides
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... por
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
411 visualizações4 slides
Dynamic Resource Allocation and Data Security for Cloud por
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
272 visualizações5 slides
Enabling Integrity for the Compressed Files in Cloud Server por
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
348 visualizações5 slides

Similar a E045026031(20)

International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline275 visualizações
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou... por IJMER
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER1.4K visualizações
Mn3422372248 por IJERA Editor
Mn3422372248Mn3422372248
Mn3422372248
IJERA Editor360 visualizações
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... por IJMER
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER411 visualizações
Dynamic Resource Allocation and Data Security for Cloud por AM Publications
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications272 visualizações
Enabling Integrity for the Compressed Files in Cloud Server por IOSR Journals
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals348 visualizações
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor22 visualizações
An Efficient PDP Scheme for Distributed Cloud Storage por IJMER
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER279 visualizações
Secure distributed deduplication systems with improved reliability 2 por Rishikesh Pathak
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak583 visualizações
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 visualizações
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing por AIRCC Publishing Corporation
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation28 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation42 visualizações
Preserving Privacy Policy- Preserving public auditing for data in the cloud por inventionjournals
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals266 visualizações
Improving Data Storage Security in Cloud using Hadoop por IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 visualizações
Provable multicopy dynamic data possession in cloud computing systems por Pvrtechnologies Nellore
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
Pvrtechnologies Nellore674 visualizações
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing por IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor359 visualizações
Providing user security guarantees in public infrastructure clouds por Kamal Spring
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring54 visualizações
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD por ijsptm
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
ijsptm214 visualizações
Cooperative provable data possession for por IMPULSE_TECHNOLOGY
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
IMPULSE_TECHNOLOGY2.7K visualizações
An Auditing Protocol for Protected Data Storage in Cloud Computing por ijceronline
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline69 visualizações

Último

Melek BEN MAHMOUD.pdf por
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
14 visualizações1 slide
Ransomware is Knocking your Door_Final.pdf por
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
55 visualizações46 slides
Democratising digital commerce in India-Report por
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
15 visualizações161 slides
HTTP headers that make your website go faster - devs.gent November 2023 por
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
22 visualizações151 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
263 visualizações86 slides
Tunable Laser (1).pptx por
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptxHajira Mahmood
24 visualizações37 slides

Último(20)

Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud14 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp55 visualizações
Democratising digital commerce in India-Report por Kapil Khandelwal (KK)
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)15 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software263 visualizações
Tunable Laser (1).pptx por Hajira Mahmood
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptx
Hajira Mahmood24 visualizações
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil368 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining52 visualizações
Mini-Track: Challenges to Network Automation Adoption por Network Automation Forum
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation Adoption
Network Automation Forum12 visualizações
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 visualizações
Voice Logger - Telephony Integration Solution at Aegis por Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 visualizações
STPI OctaNE CoE Brochure.pdf por madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 visualizações
Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum31 visualizações
Serverless computing with Google Cloud (2023-24) por wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 visualizações
PRODUCT LISTING.pptx por angelicacueva6
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptx
angelicacueva614 visualizações

E045026031

  • 1. Research Inventy: International Journal of Engineering And Science Vol.4, Issue 5 (May 2014), PP 26-31 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com 26 Co-Operative Multiple Replica Provable Data Possession for Integrity Verification in Multi-Cloud Storage Mr.Susheel George Joseph M.C.A, M,Tech, M.Phil(CS) (Assistant Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology, Changanassery,susheelgj@gmail.com) ABSTRACT : Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can be produced at the time of the challenge and that the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system. KEYWORDS: Availability, Data Possession, Homomorphic, Integrity, Multi-Cloud, Multi-Replica,Zero- Knowledge I. INTRODUCTION This is a study that combines the advantages of both CPDP (Co operative PDP) and MRPDP (Multiple Replica PDP). The proposed paper manages user‟s data in multiple cloud storage by ensuring the integrity and availability of user‟s data. To describe this we should have to describe both MRPDP and CPDP.Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this scheme, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero- knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches. Using multiple-replica provable data possession(MR-PDP) to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail. The generation of replicas is on demand by the user‟s request that is based on the security choice selected by the user at the time of file upload. The user can choose three options Low, Medium, High at the time of file upload. The uploaded file is divided in to N blocks of different sizes to achieve the efficiency in storage and is also used to improve security, here N represent the number of clouds we are using. Low means the file is divided into N blocks (here 3), and each block is stored in N different location of the single cloud. Medium means the file is divided into N blocks and each block is stored in N different clouds which improves the security of data but reduce the availability. High means the file is divided into N blocks and each N block is stored in N different clouds that are we are keeping the replicas of file in N different clouds. The system maintains a download count to dynamically create the replicas in accordance with the users demand.The system which consists of three users namely User who have the access rights to upload, download and delete file, TPA (Third Party Auditor) who verifies the files that are uploaded by the registered user and the user can download the file only after this verification, Admin who own the system and who have the full access right, can create or delete TPAs and can view the uploaded files and details about the uploads. A single cloud can have different TPA‟s and the work load is divided among by using the random function to select the corresponding files from the cloud. The creation and deletion of TPA is based on the work load and efficiency of TPA which is monitored by the administrator. The data uploaded by the user is temporarily stored in an encrypted form by using the
  • 2. Co-Operative Multiple Replica Provable… 27 homomorphic encryption algorithm. We can use any kind of encryption algorithms along with this applications but it is better to choose a zero knowledge proof algorithm. This uses an encryption key which is automatically supplied to the user at the time of file upload. The data is stored in cloud only after it is verified by TPA. The actual storage of data is in an encrypted form called Meta Data, which ensures additional security measure for the cloud data. The user gets the original file when he/she downloads the needed file from the cloud storage, which ensures the integrity of data. The user is unaware of the background processes. This system reduces the overload of admin by creating TPAs. The TPA can be of any number for each cloud depending on the number of clouds we are using. II. NEED FOR THE SYSTEM The main objective of this paper is to provide an insight to build a system at low-cost, scalable, location independent platform for managing clients‟ data, current cloud storage systems adopt several new distributed file systems, for example, Apache Hadoop Distribution File System (HDFS), Google File System (GFS), Amazon S3 File System, CloudStore etc. These file systems share some similar features: a single metadata server provides centralized management by a global namespace; files are split into blocks or chunks and stored on block servers; and the systems are comprised of interconnected clusters of block servers. Those features enable cloud service providers to store and process large amounts of data. However, it is crucial to offer an efficient verification on the integrity and availability of stored data for detecting faults and automatic recovery. Moreover, this verification is necessary to provide reliability by automatically maintaining multiple copies of data and automatically redeploying processing logic in the event of failures. Some of the Objectives can be summarized as Usability aspect: A client should utilize the integrity check in the way of collaboration services. The scheme should conceal the details of the storage to reduce the burden on clients. Security aspect: The scheme should provide adequate security features to resist some existing attacks, such as data leakage attack and tag forgery attack. Performance aspect: The scheme should have the lower communication and computation overheads than non- cooperative solution. III. EXISTING ARCHITECTURE There exist various tools and technologies for multicloud, such as Platform VM Orchestrator, VMwarevSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform for managing clients‟ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with when they are stored into an uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers to provide security techniques for managing their storage services.More Moreover another limitations of the existing system is that it is not suitable for multicloud storage services.To check the availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession and Proofs of Retrievability. Ateniese et al. first proposed the PDP model for ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that achieves the communication cost. They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in advance and users cannot perform block insertions anywhere.
  • 3. Co-Operative Multiple Replica Provable… 28 Fig 1. Existing Architecture IV. PROPOSED ARCHITECTURE Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients‟ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero- knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches. Fig 2. Proposed Architecture V. ARCHITECTURE DETAILS – MODULARIZATION The modules are formed on the basis of the functionalities that are found in the proposed system. The functionalities are performed by three users namely Admin, TPA, and registered User. Cooperative accessing We can access data from multiple clouds by using the CPDP scheme, it is based on homomorphic verifiable response (HVR) and hash index hierarchy (HIH). We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties.
  • 4. Co-Operative Multiple Replica Provable… 29 Replica generation The replica generation can be performed by the MR-PDP scheme. This scheme allows a client to stores t replicas of a file in a storage system to verify through a challenge-response protocol that each unique replica can be produced at the time of the challenge and that the storage system uses t times the storage required to store a single replica. Integrity verification Integrity requires that authorized changes must be detected and tracked, and changes must be limited to a specific scope. Due to the increased number of entities and access points in a cloud environment, authorization is crucial in assuring that only authorized entities can interact with data. A cloud computing provider is trusted to maintain data integrity and accuracy. To verify integrity, we must examine the net effects on the cloud data related to data integrity. There will be a set of standards for monitoring the integrity of data. Integrity monitoring is essential in cloud storage as data integrity is critical for any data centre. Here, we consider the existence of multiple CSPs to collaboratively store and maintain the clients‟ data. The traditional cryptographic primitives for data integrity and availability based on hashing and signature schemes are not applicable on the outsourced data. Hence lots of new techniques have been found out for integrity verification. This technique too doesn‟t guarantee the expected security in clouds. Here we use the CPDP scheme for integrity verification. . Fig 3 .Integrity Verification in Hybrid Cloud File Division The Cloud User who has a large amount of data to be stored in multiple clouds and has the permissions to access and manipulate stored data. The User‟s Data is converted into data blocks of different sizes for improving the efficiency of storage and as well as to improve the security of file. Registration The user can store the file into the cloud storage only if he/she is a registered owner of this web application. The registration can be made as either free or a paid registration depending on the organization‟s requirement. File Upload Not all files are directly stored in multiple clouds, but only the files that are verified by the trusted TPA are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the TPA. The File may be encrypted using the cryptographic key which is randomly generated. File verification Using the cryptographic key the file is encrypted and by using this key the file contents may be decrypted by the TPA for the verification process. He can view the file contents by the decryption process and can verify the files. File download Only the verified Files can be downloaded by the File Owner. If the user wants to download their files, the data stored in multi-cloud is integrated and downloaded. Here the downloading count is saved for generating the replicas of the file by ensuring the demand of file. The user could get acknowledgement about the server which the file is saved, it is also an additional provision which is depends on the client‟s requirement. We can increase the security of downloading by verifying the key along with downloading process. One problem can arise is in the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be considered as an optional module along with file downloading and deletion modules.
  • 5. Co-Operative Multiple Replica Provable… 30 File Deletion The Uploaded file can be deleted by the File Owner. The security can be increased if we are making key verification along with the deletion process. One problem can arise is in the case of key remembrance. But this can be solved if we are using Grid Security along with it. It can be considered as an optional module along with file downloading and deletion. File Storage Verified File is stored in the cloud in an Encrypted format using the Cryptographic key. So file security is ensured and no one can decrypt or hack the file. The Verified File can be stored in three Clouds. The uploaded file is split in to different blocks based on the number of clouds we are using. When user uploads the file there is a choice of file security-Low, Medium, High. If the security is „Low‟ then it is stored in Cloud1 and it is of „Medium‟ then the encrypted file blocks are saved in each cloud individually. If the security option is „High‟ then the same file blocks are saved in each Clouds independently. TPA Creation and deletion TPA is one of the users in this application. TPA is used to verify the files that are uploaded by the User. The User file is uploaded to the cloud storage by the TPA only after the verification process. TPA can view the file content without downloading; he can decrypt the information by using the corresponding encrypted key. TPA creation is done by the Administrator for reducing the overhead in managing each cloud user. The deletion task can be used if the TPA is no longer needed for the particular cloud. View All Files All the Files in the web including verified and not-verified are viewed by the Administrator View File Owners Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file owners and can monitor the storage space used by the file owners. VI. CONCLUSION The aim of this article entitled “Co-Operative Provable Data Possession For Integrity Verification In Multi-Cloud Storage” was to demonstrate the combined effect of two efficient and well known concepts CPDP and MR-PDP. This could achieve the user‟s requirements in the multi cloud environment such as availability and security of data. These are the two major concerns in a distributed environment.As we are using multi cloud, so there are multiple cloud service provider‟s for multiple clouds. As we want to store block in each cloud so the request has to go from each Cloud Service Provider, so to reduce the complexity we can use the Centralized Cloud Service Provider. Therefore, every request is managed by centralized Cloud Service Provider. This research can be treated as a new technique for data integrity verification in data possession. As part of future enhancement, I would like extend my work to explore more effective MR-CPDP constructions. Finally, it is still a challenging problem for the generation of tags with the length irrelevant to the size of data blocks and various file formats. VII. ACKNOWLEDGEMENT I would like to thank GOD Almighty for the valuable support throughout this research phase to complete this paper successfully. I would like to express my sincere thanks to my Guide for his valuable suggestions. I also like to thank my family members and my college authorities as well as co-workers for their consistence support and motivation. REFERENCES [1] O. Rahamathunisa Begam,, T. Manjula,, T. Bharath Manohar,, B. Susrutha, “Cooperative Schedule Data Possession for Integrity Verification in Multi-Cloud Storage” in International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013, pp.2726-2741. [2] Yan Zhu ,Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China; Hongxin Hu ; Gail-Joon Ahn ; Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage” in Parallel and Distributed Systems, IEEE Transactions on (Volume:23 , Issue: 12 ), Dec. 2012,pp.2231 – 2244. [3] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep., Feb 2009.
  • 6. Co-Operative Multiple Replica Provable… 31 [5] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology (CRYPTO‟2001), vol. 2139 of LNCS, 2001, pp. 213–229. [6] Megha Patil , Prof. G.R.Rao, “Integrity Verification in Multi-Cloud Storage Using Cooperative Provable Data Possession ” in Megha Patil et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp.982- 985 [7] Vaibhav Bharati and M R Patil., “Advanced Cooperative Provable Data Possession based Data Integrity Verification for Multi- Cloud Storage” in International Journal of Computer Applications, Foundation of Computer Science, New York, USA, ,November 2013,pp.25-28 [8] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [9] A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for Large files,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597. [10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in Communication networks, SecureComm, 2008, pp. 1–10. B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster,“Virtual infrastructure management in private and hybrid Clouds,” IEEE Internet Computing, vol. 13, no. 5,2009, pp. 14–22. [11] K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.