Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine-Grained Updates with MHT

Mayur Lokhande, JSPM's ICOER; Supriya Kapse ,JSPM's ICOER; Sonali Darekar ,JSPM's ICOER; Mahesh Sonawane ,JSPM's ICOER

Cloud computing, Data security, authorized public auditing, fine-grained updates.

One of the top technology concept is Cloud Computing. Cloud storage servers plays an important role in the technology buzz – cloud computing where clients can store their data at cloud servers and can access this data from anywhere and anytime. This opens up the threat on the data which client is storing on the cloud as it has to stored and accessed via Internet from any device. Here we came up with data Security which opens up lot of areas like authentication of clients, data integrity check and data privacy preserving. In our proposed work we are going to focus on data integrity area which is concerned about data security. When we consider about data security data auditing is concept of frequently auditing the integrity of the data to make sure that the data is not tampered and it is secured. Most of the times clients offload the auditing process of their data to Third Party Auditors (TPA) who are able to check the validity of the data without actually accessing the data on cloud. When the verification is done by a trusted third party called data auditing in which third party is called an auditor. There are several drawbacks of these techniques. One of the issue arises here is a necessary authentication process is missing between the auditor and cloud service provider it means that anyone can challenge the cloud service provider for a proof of integrity of certain file which puts auditing service at risk. In our work, we provide a legal Study for possible types of fine-grained data updates and suggest a scheme that can fully support authorized auditing and fine-grained update request.
    [1] Yuri Demchenko, Cees de Laat. Defining Architecture Components of the Big Data Ecosystem. [2] D. Zissis and D. Lekkas, ‘‘Addressing Cloud Computing Security Issues,’’ Future Gen. Comput. Syst., vol. 28, no. 3, pp. 583-592, Mar. 2011. [3] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, ‘‘Scalable and Efficient Provable Data Possession,’’ in Proc. 4th Int’l Conf. Security and Privacy in Commun. Netw. (SecureComm),2008, pp. 1-10. [4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, ‘‘Remote Data Checking Using Provable Data Possession,’’ ACM Trans. Inf. Syst. Security, vol. 14, no. 1, May 2011, Article 12. [5] G.Ateniese, R.B. Johns,R. Curtmola, J.Herring, L. Kissner,Z. Peterson and D. Song, ‘‘Provable Data Possession at Untrusted Stores,’’ in Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), 2007, pp. 598-609. [6] A. Juels and B.S. Kaliski Jr., ‘‘PORs: Proofs of Retrievability for Large Files,’’ in Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), 2007, pp. 584-597. [7] H. Shacham and B. Waters, ‘‘Compact Proofs of Retrievability,’’ in Proc. 14th Int’l Conf. on Theory and Appl. of Cryptol. And Inf. Security (ASIACRYPT), 2008, pp. 90-107. [8] S. Nepal, S. Chen, J. Yao, and D. Thilakanathan, ‘‘DIaaS: Data Integrity as a Service in the Cloud,’’ in Proc. 4th Int’l Conf. on Cloud Computing (IEEE CLOUD), 2011, pp. 308-315. [9] Y. He, S. Barman, and J.F. Naughton, ‘‘Preventing Equivalence Attacks in Updated, Anonymized Data,’’ in Proc. 27th IEEE Int’l Conf. on Data Engineering (ICDE), 2011, pp. 529-540. [10] E. Naone, ‘‘What Twitter Learns from All Those Tweets,’’ in Technology Review, Sept. 2010, accessed on: March 25, 2013. [Online]. Available: http://www.technologyreview.com/view/420968/what-twitter-learns-from-all-those tweets/ [11] X. Zhang, L.T. Yang, C. Liu, and J. Chen, ‘‘A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud,’’ IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 363-373, Feb. 2014. [12] S.E. Schmidt, ‘‘Security and Privacy in the AWS Cloud,’’ presented at the Presentation Amazon Summit Australia, Sydney, Australia, May 2012, accessed on: March 25, 2013. [Online]. Available: http://aws.amazon.com/apac/awssummit-au/.
Paper ID: GRDJEV01I060003
Published in: Volume : 1, Issue : 6
Publication Date: 2016-06-01
Page(s): 66 - 70