Pages

Friday, December 20, 2013

Toward Secure and Dependable Storage Services in Cloud Computing


Objective:
This paper a flexible distributed storage integrity auditing mechanism, utilizing the distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost.
Abstract:
Cloud computing is the delivery of computing and storage capacity as a service to a community of end-recipients. Cloud computing entrusts services with a user's data, software and computation over a network. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users, physical possession of their outsourced data, which unavoidably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphism token and distributed erasure-coded data.
The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server scheming attacks.



Existing system:
1.      User: an entity, who has data to be stored in the cloud and relies on the cloud for data storage and computation, can be either enterprise or individual customers.
2.      Data redundancy can be employed with a technique of erasure correcting code to further tolerate faults or server crash as user’s data grow in size and importance.
3.      The existing system user to audit the cloud storage for very high communication and cost.
4.      To easily attack the cloud data using different intrusion attacks such as,
Ø  Malicious attack.
Ø  Data modification attack.
Ø  Server clouding attack.

Disadvantages:
1.      Less control comes with handing over your data and information.
2.      Dependence on a third party to ensure security and confidentiality of data and information.
  1. Long-term dependence on cloud host for maintenance of your information.

Proposed system:
1.      The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost.
2.      The proposed design further supports secure and efficient dynamic operations on outsourced data, including managed control such as
  • Block modification. 
  •   Deletion.
  •  Append.
3.      The cloud data to securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy.

Advantages:
1.      Access your data at all times – not just while in the office.
2.      A physical storage center is no longer needed.
3.      Cloud storage cost is low, and then most have any pay structure that only calls for payment when used.
4.      Relieves burden on IT professionals and frees up their time in the office.
5.      Easily scalable so companies can add or subtract resources based on their own


No comments:

Post a Comment