Secured Storage for Dynamic Data in Cloud
Cloud is a growing computing paradigm in which the services and resources are provisioned dynamically through internet. In cloud, the users’ data can be stored in the remotely located data servers that are maintained by cloud service providers to relieve the users from the local storage and maintenance. The major security challenge with cloud computing is that the users cannot have direct control over the remotely stored data. The imperative security concerns in cloud are the integrity and confidentiality of data. Many existing remote integrity checking methods fail to serve for the data that can be dynamically updated. To preserve the privacy of dynamically changing data, an efficient approach maintaining the confidentiality and assuring the integrity of data is proposed. In this scheme, public auditability is enabled by introducing a Third Party Auditor (TPA) for verifying the data integrity. It is ensured that the data stored in the untrusted cloud server is confidential and consistent by using a data encryption algorithm called 2-Keys Symmetric Encryption. Unlike other encryption algorithms, this encryption algorithm needs lesser computation overhead. Encryption and decryption algorithms are developed in java and Remote Method Invocation (RMI) concepts are used for communication between client and server. Simulation environment is set up with the eucalyptus tool. The performance analysis and simulation results prove that our proposed scheme is secure and proficient and it reduces the computation cost of server and verifier.
A.Juels and B.S.Kaliski, (2007), “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, USA: ACM, pp. 584–597.
C.Wang., Q.Wang., S.S.M.Chow., K.Ren., and W.Lou, (2013), “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers , Vol 62, No.2.
C. Wang., Q. Wang., K. Ren., and W. Lou, (2009), “Ensuring Data Storage Security in Cloud Computing,” in Proc. Of IWQoS’ 09.
C. Wang., Q. Wang., K. Ren., and W. Lo, (2010) “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing” in Proc. IEEE INFOCOM, pp. 525-533.
E.-C.Chang., and J. Xu, (2008), “Remote integrity check with dishonest storage server” in Proc. Of ESORICS’08.Berlin, Heidelberg: Springer-verlag, pp. 223– 237.
G. Ateniese., R. Burns., R. Curtmola., J. Herring., L. Kissner., Z. Peterson., and D. Song, (2007), “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on computer and communications security. New York, NY, USA, pp. 598– 609.
H. Shacham., and B. Waters., (2008), “Compact Proofs of Retrievability” in Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security:Advances in Cryptology , pp. 90-107.
Kan Yang ,and Xiaohua, (2013), ” An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, IEEE Transactions On Parallel and Distributed systems, VOL 24, NO. 9, pp.1717-1726.
Lifei Wei., Haojin Zhu., Zhenfu Cao., and Weiwei Jia, (2010), “SecCloud: Bridging secure storage and computation in cloud”, in ICDCS’10.
M. Armbrust et al., (2009), "Above the clouds: A berkeley view of cloud computing", ECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28,.
M. Jensen et al., (2009), "On Technical Security Issues in Cloud Computing," in IEEE International Conference on Cloud Computing, Bangalore, India, pp. 109-116.
Pearson (2009), “Taking Account of Privacy when Designing Cloud Computing Services”, in Proceedings of ICSE-Cloud’09, Vancouver.
Ponnuramu Veeralakshmi, and Latha Tamilselvan, (2012), “Data Integrity Proof and Secure Computation in Cloud Computing’. J. Comput.Sci., 8: 1987-1995.
Q. Wang., C. Wang., J. Li, K. Ren., and W. Lou, (2012), “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions On Services Computing, VOL. 5, NO. 2, pp.220-232.
Q. Wang., C. Wang., J. Li, K. Ren., and W. Lou, (2011), “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions On Parallel and Distributed systems,VOL. 22, NO. 5, pp.847-858.
W. Stallings, (2007), Cryptography and network security principles and practice, Fourth edition, Prentice hall
Y. Zhu., H. Hu., G. Ahn., and M. Yu, (2012) “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage”, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244.
Veeralakshmi Ponnuramu., and Latha Tamilselvan, (2014), ”Encryption for Massive Storage in Cloud” in Computational intelligence in Data Mining, Volume 2,pp 27-38, Smart Innovation, Systems ,and Technologies(Springer), volume 32.
This work is licensed under a Creative Commons Attribution 3.0 License.