Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

PPP

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Proposed Architecture for Achieving

Third Party Auditor for Reliability Level of


Data set in Cloud
Mahesh kumar N
PG scholar
Department of CSE
Paavai engineering college
Namakkal
mahesh.vvcet@gmail.com

ABSTRACT - Cloud computing is the


concept of utilizing the remote servers
hosted on to the network to manage and
process the user data. The increasing
network bandwidth and consistent network
connections provides a gateway for the user
to subscribe the high quality services and
software. The service level agreement (SLA)
provides the security for the outsourced
data. But the data integrity and availability
of the outsourced data is not guaranteed in
the large scale data storage in cloud
environment. Because the resources and the
delivery models belonging to the cloud
environment is maintained by the externally
hosted Cloud Service Providers (CSP). To
provide the privacy for users data the data
integrity is ensured and the cloud users
computation resources are safe guarded by
means of implementing the Failure aware
Third Party Auditor (FTPA) in the cloud
infrastructure. The resource allocated by the
Cloud Service Providers (CSP) for the FTPA
is to provide the correctness on the cloud
data that is transferred between the user and
the cloud data centers. The FTPA efficiently
performs multiple auditing tasks in a batch
manner, i.e., simultaneously and support
scalable and efficient privacy-preserving

Sathishkumar P
PG scholar
Department of CSE
Paavai engineering college
Namakkal
sunsathishp@gmail.com
public
storage
environment.

auditing

in

cloud

Keywords: Third Party Auditor, HLA.


1. INTRODUCTION
Cloud computing has a great
tendancy of providing stout computational
power to the society at reduced cost. The
wide
adoption
of
this
promising
computation model is prevented by security
which is the primary obstacle especially for
customers when their confidential data are
consumed and produced during the
computation.
The main objective of this paper is to
fully ensure the data integrity and save the
cloud users computation resources as well as
solve online mess by means of
implementing the Failure Aware Third Party
Auditor (FTPA) in the cloud infrastructure.
This work utilizes the technique of public
key-based homomorphic linear authenticator
(HLA), which enables FTPA to perform the
auditing without demanding the local copy
of data and thus drastically reduces the
communication and computation overhead

as compared to the straightforward data


auditing approaches. By integrating the
HLA with random masking, this schema
guarantees that the TPA could not learn any
knowledge about the users data content
stored in the cloud server (CS) during the
efficient auditing process.

environment rely on the Cloud Service


Provider for data storage and computation.

2. SYSTEM MODEL

Third Party Auditor (TPA): It has


proficiency and capabilities that users may
not have, and is trusted to assess and expose
risk of cloud storage services on behalf of
the users upon request.

In cloud environment, a user stores


his data through a CSP Data redundancy can
be employed with technique of erasure
correcting code to tolerate faults or crash in
the server as the data of users grows. The
user interacts with the cloud servers via CSP
to access his data. In some cases, the user
may need to perform block level operations
on his data. The cloud is not expected to be
rapidly changing in a relative short period.
The users will not have their data
locally, it is of critical importance to
guarantee users that their data are being
stored and maintained correctly. Users
should be equipped with security means so
that they can make continuous correctness
assurance of their stored data even without
the existence of local copies of the data.
User do not necessarily have the time and
other resources to monitor their data online,
they can delegate the data auditing tasks to a
trusted TPA of their respective choices. To
securely introduce such a TPA, any possible
leakage of users outsourced data towards
TPA through the auditing protocol should be
prohibited.
2.1 Entities
The following are the main entities for
establishing this architecture
User: They are the consumers of this service
whose informations to be stored in the cloud

Cloud service provider (CSP) provides


data storage service to the consumers and
will allocate a separate resource for the user
based on the Service Level Aggrement
(SLA).

3. EXISTING SYSTEM
The users will not have physical
control of the outsourced data makes the
data integrity protection in cloud computing
a formidable task, especially for the
constrained computing resources. To fully
ensure the data integrity and save the cloud
users computation resources as well as
online burden, the users may resort to an
independent third party auditor (TPA) to
audit the outsourced data when needed.The
TPA has expertise and capabilities that users
do not and periodically check the integrity
of all the data stored in the cloud on behalf
of the users, which provides a much more
easier and affordable way for the users to
ensure their storage correctness in the cloud.
In existing the TPA is integrated with
the homomorphic linear authenticator with
random masking technique. With random
masking, the TPA cannot derive the users
data content. On the other hand, the
correctness validation of the block
authenticator pairs can still be carried out
with the presence of the randomness. This
design makes use of a public key based
HLA, to equip the auditing protocol with
public auditability

3.1 Problems Focused

The existing TPA is hosted externally


requires separate resource for its
management which adds additional
cost to the users.

Due to the lack of virtualized TPA


resource it will leads to the
downtime during multiple auditing
that may cause the other auditing
process during data transfer.

4. PROPOSED SYSTEM
The proposed system focuses on
implementing a Failure Aware TPA (FTPA)
inside the cloud infrastructure. A separate
resource is allocated by the cloud service
provider (CSP) for the FTPAs usage and is
managed by the FTPA as well. The resource
allocated for FTPA will be extended
automatically based on the requirement.
FTPA consist of two sections such as

Primary TPA and


Reserved TPA.

The primary TPA is allowed to verify


the correctness of the cloud data on
demand without retrieving a copy of the
whole data belonging to the users. This
ensures that there exists no cheating
cloud server that can pass the primary
TPAs audit without indeed storing users
data intact.

The reserved TPA will remain idle until


the occurrence of downtime in primary
TPA. It will be automatically initiated
during the downtime of primary TPA.
Live migration process will be followed
in order to move the auditing support
from primary TPA to reserved TPA.

The proposed system focuses on


implementing a Failure Aware TPA (FTPA)
inside the cloud infrastructure by means of
utilizing the idle resources allocated by the
cloud service provider (CSP). The primary
TPA inside FTPA undergoes the correctness
of the cloud data without retrieving the local
copy of the orignal users data. The reserved
TPA in FTPA stays idle till the failure or
downtime of primary TPA. It will be
automatically initiated during the failure or
downtime of the primary TPA.
FTPA is enabled with secure and
efficient auditing capability to cope with
multiple auditing delegations from possibly
large
number
of
different
users
simultaneously.The cost to maintain FTPA
inside
the
cloud
infrastructure
is
comparatively low rather than external TPA
management cost.
4.1 Algorithms Involved
It involves two phase setup and audit
Setup
KeyGen: is a key generation
algorithm that is run by the user to
setup the scheme.
SigGen: is used by the user to
generate
verification
metadata,
which may consist of MAC,
signatures,
or
other
related
information that will be used for
auditing.
Audit
GenProof: is run by the cloud server
to generate a proof of data storage
correctness.
VerifyProof: is run by the TPA to
audit the proof from the cloud server.

A) Provable Data Possession


It allows a client to store the data in
the untrusted server and make the server not
to retrieve the original copy of the data.

4.2 Architecture:

B) Resource Pooling
It involves the Collections of
previously used resource and can be reused
when needed instead of destroying it.

Figure.2. Proposed Architecture


5. PURPOSE
a) Trustable services:

Figure.1. Setup and Audit Phase

The consumers data will be kept


confidential in cloud data centers. The
resource allocated to the consumers will be
audited each time when they access the
resource. The key generation process will
takes place for each access. The newly
generated key will be compared with the
previous key to check the integrity level of
the cosumers resource.

b) Avoidance of loss of control:


6. CONCLUSION
In general consumers using the cloud
environment for the necessity of their
services such as storage are in need of
depending upon the cloud service providers.
Similarly if an organization is developing a
project under the help of cloud service and
they are storing it under the cloud
environment, they need to believe the
service provider ensures integrity, but still
there is no assurance that the data will be
safe. Hence the factor loss of control with
respect to the organizations data is made
complex.
This proposed architecture overcomes
this drawback by means of the Failure aware
TPA that is established for that organization
in the cloud environment. Another factor
that is giving additional confidence for their
security is the Reserve TPA that is
established behind the Primary TPA.
From the following graph the observed
result of this architecture is displayed. It
shows the comparison between the current
situation and the situation after the
architecture implementation.

Cloud Computing is a major


technology that provides services over the
internet in an efficient way. There are
various challenges which need to be
addressed for making cloud computing work
well in reality. The challenges like security
issues and storage issues are important for
the service providers to improve the
services.
The
homomorphic
linear
authenticator (HLA) and random masking
technique is used efficiently to guarantee
that the FTPA would not learn any
knowledge about the data content stored on
the cloud server during the efficient auditing
process, which not only eliminates the
burden of cloud user from the tedious and
possibly expensive auditing task, but also
alleviates the users fear of their outsourced
data leakage. Considering FTPA may
concurrently handle multiple audit sessions
from different users for their outsourced data
files. This public auditing protocol can be
extended into a multi-user setting, where the
FTPA can perform multiple auditing tasks in
a batch manner for better efficiency.
7. REFERENCES
[1] C. Wang, Q. Wang, K. Ren, and W. Lou,
in Privacy Preserving Public Auditing for
Storage Security in Cloud Computing in
Proc. IEEE INFOCOM 10, Mar. 2010.
[2] Achieving Secure, Scalable, and Finegrained Data Access Control in Cloud
Computing Shucheng Yu, Cong Wang, Kui
Ren, and Wenjing Lou Dept. of ECE,
Worcester Polytechnic Institute.
[3] Dynamic Provable Data Possession C.
Chris Erway Alptekin K upc Charalampos
Papamanthou Roberto Tamassia from

Graph 1: Future usage level

Brown University, Providence in November


29, 2009
[4] Cooperative Provable Data Possession
for Integrity Verification in Multicloud
Storage Yan Zhu, Member, IEEE, Hongxin
Hu, Member, IEEE, Gail-Joon Ahn, Senior
Member, IEEE, and Mengyang Yu in IEEE
Transactions on parallel and distributed
systems, vol. 23, no. 12, December 2012
[5] Detecting and Resolving Firewall
Policy Anomalies Hongxin Hu, Student
Member, IEEE, Gail-Joon Ahn, Senior
Member, IEEE, and Ketan Kulkarni.
[6] Privacy-Preserving Audit and Extraction
of Digital Contents Mehul A. Shah Ram
Swaminathan Mary Baker HP Labs, Nov
2007.
[7] Auditing to Keep Online Storage
Services Honest Mehul A. Shah, Mary
Baker, Jeffrey C. Mogul, Ram Swaminathan
Jun 2007
[8] The Security of an Efficient Dynamic
Auditing Protocol in Cloud Storage
Jianbing Ni, Yong Yu, Yi Mu, Senior
Member, IEEE, Qi Xia , in IEEE
Transactions on parallel and distributed
systems.
[9] Secure Overlay Cloud Storage with
Access Control and Assured Deletion Yang
Tang, Patrick P.C. Lee, Member, IEEE, John
C.S. Lui, Fellow, IEEE, and Radia Perlman,
Fellow, IEEE presented in IEEE
Transactions on dependable and secure
computing,
vol.
9,
no.
6,
November/December 2012
[10] K.B.Jachak, S.K.Korde, P.P.Ghorpade
and
G.J.Gagare
in
Homomorphic

Authentication with random


Technique Bioinfo publications

masking

You might also like