Objective:
This paper a flexible distributed
storage integrity auditing mechanism, utilizing the distributed erasure-coded
data. The proposed design allows users to audit the cloud storage with very
lightweight communication and computation cost.
Abstract:
Cloud computing is
the delivery of computing and storage capacity as a service to a community of
end-recipients. Cloud computing entrusts services with a user's data, software
and computation over a network. Cloud storage enables users to remotely store their data and enjoy
the on-demand high quality cloud applications without the burden of local
hardware and software management. Though the benefits are clear, such a service
is also relinquishing users, physical possession of their outsourced data,
which unavoidably poses new security risks toward the correctness of the data
in cloud. In order to address this new problem and further achieve a secure and
dependable cloud storage service, we propose in this paper a flexible
distributed storage integrity auditing mechanism, utilizing the homomorphism
token and distributed erasure-coded data.
The proposed design allows users to audit the cloud storage with
very lightweight communication and computation cost. The auditing result not
only ensures strong cloud storage correctness guarantee, but also
simultaneously achieves fast data error localization, i.e., the identification
of misbehaving server. Considering the cloud data are dynamic in nature, the
proposed design further supports secure and efficient dynamic operations on
outsourced data, including block modification, deletion, and append. Analysis
shows the proposed scheme is highly efficient and resilient against Byzantine
failure, malicious data modification attack, and even server scheming attacks.
Existing
system:
1.
User: an entity,
who has data to be stored in the cloud and relies on the cloud for data storage
and computation, can be either enterprise or individual customers.
2.
Data redundancy
can be employed with a technique of erasure correcting code to further tolerate
faults or server crash as user’s data grow in size and importance.
3.
The existing
system user to audit the cloud storage for very high communication and cost.
4.
To easily attack
the cloud data using different intrusion attacks such as,
Ø Malicious attack.
Ø Data modification attack.
Ø Server clouding attack.
Disadvantages:
1.
Less control comes
with handing over your data and information.
2.
Dependence on a
third party to ensure security and confidentiality of data and information.
- Long-term dependence on cloud host for maintenance of your information.
Proposed
system:
1.
The proposed design
allows users to audit the cloud storage with very lightweight communication and
computation cost.
2.
The proposed
design further supports secure and efficient dynamic operations on outsourced
data, including managed control such as
- Block modification.
- Deletion.
- Append.
3.
The cloud data to securely introduce an effective
TPA, the auditing process should bring in no new vulnerabilities toward user
data privacy.
Advantages:
1.
Access your data
at all times – not just while in the office.
2.
A physical storage center is no longer needed.
3.
Cloud storage cost is low, and then most have
any pay structure that only calls for payment when used.
4.
Relieves burden on IT professionals and frees up their time in the
office.
5.
Easily scalable so companies can add or subtract resources based
on their own
No comments:
Post a Comment