Secured Storage for Dynamic Data in Cloud
Abstract
Cloud is a growing computing paradigm in which the services and resources are provisioned dynamically through internet. In cloud, the users’ data can be stored in the remotely located data servers that are maintained by cloud service providers to relieve the users from the local storage and maintenance. The major security challenge with cloud computing is that the users cannot have direct control over the remotely stored data. The imperative security concerns in cloud are the integrity and confidentiality of data. Many existing remote integrity checking methods fail to serve for the data that can be dynamically updated. To preserve the privacy of dynamically changing data, an efficient approach maintaining the confidentiality and assuring the integrity of data is proposed. In this scheme, public auditability is enabled by introducing a Third Party Auditor (TPA) for verifying the data integrity. It is ensured that the data stored in the untrusted cloud server is confidential and consistent by using a data encryption algorithm called 2-Keys Symmetric Encryption. Unlike other encryption algorithms, this encryption algorithm needs lesser computation overhead. Encryption and decryption algorithms are developed in java and Remote Method Invocation (RMI) concepts are used for communication between client and server. Simulation environment is set up with the eucalyptus tool. The performance analysis and simulation results prove that our proposed scheme is secure and proficient and it reduces the computation cost of server and verifier.References
A.Juels and B.S.Kaliski, (2007), “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, USA: ACM, pp. 584–597.
C.Wang., Q.Wang., S.S.M.Chow., K.Ren., and W.Lou, (2013), “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers , Vol 62, No.2.
C. Wang., Q. Wang., K. Ren., and W. Lou, (2009), “Ensuring Data Storage Security in Cloud Computing,” in Proc. Of IWQoS’ 09.
C. Wang., Q. Wang., K. Ren., and W. Lo, (2010) “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing” in Proc. IEEE INFOCOM, pp. 525-533.
E.-C.Chang., and J. Xu, (2008), “Remote integrity check with dishonest storage server” in Proc. Of ESORICS’08.Berlin, Heidelberg: Springer-verlag, pp. 223– 237.
G. Ateniese., R. Burns., R. Curtmola., J. Herring., L. Kissner., Z. Peterson., and D. Song, (2007), “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on computer and communications security. New York, NY, USA, pp. 598– 609.
H. Shacham., and B. Waters., (2008), “Compact Proofs of Retrievability” in Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security:Advances in Cryptology , pp. 90-107.
Kan Yang ,and Xiaohua, (2013), ” An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, IEEE Transactions On Parallel and Distributed systems, VOL 24, NO. 9, pp.1717-1726.
Lifei Wei., Haojin Zhu., Zhenfu Cao., and Weiwei Jia, (2010), “SecCloud: Bridging secure storage and computation in cloud”, in ICDCS’10.
M. Armbrust et al., (2009), "Above the clouds: A berkeley view of cloud computing", ECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28,.
M. Jensen et al., (2009), "On Technical Security Issues in Cloud Computing," in IEEE International Conference on Cloud Computing, Bangalore, India, pp. 109-116.
Pearson (2009), “Taking Account of Privacy when Designing Cloud Computing Services”, in Proceedings of ICSE-Cloud’09, Vancouver.
Ponnuramu Veeralakshmi, and Latha Tamilselvan, (2012), “Data Integrity Proof and Secure Computation in Cloud Computing’. J. Comput.Sci., 8: 1987-1995.
Q. Wang., C. Wang., J. Li, K. Ren., and W. Lou, (2012), “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions On Services Computing, VOL. 5, NO. 2, pp.220-232.
Q. Wang., C. Wang., J. Li, K. Ren., and W. Lou, (2011), “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions On Parallel and Distributed systems,VOL. 22, NO. 5, pp.847-858.
W. Stallings, (2007), Cryptography and network security principles and practice, Fourth edition, Prentice hall
Y. Zhu., H. Hu., G. Ahn., and M. Yu, (2012) “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage”, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244.
Veeralakshmi Ponnuramu., and Latha Tamilselvan, (2014), ”Encryption for Massive Storage in Cloud” in Computational intelligence in Data Mining, Volume 2,pp 27-38, Smart Innovation, Systems ,and Technologies(Springer), volume 32.
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







