Ensuring Privacy and Integrity of User’s Data on Public Cloud (original) (raw)

IJERT-Secure Auditing of the User Data in Cloud Storage System

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/secure-auditing-of-the-user-data-in-cloud-storage-system https://www.ijert.org/research/secure-auditing-of-the-user-data-in-cloud-storage-system-IJERTV3IS060335.pdf Cloud computing because of its wide range of applications and shared pool of resources, it has become a next generation IT technology, user stores their data in the cloud and enjoy the cloud resources involving on demand applications and services. Although Cloud has a full-fledged security resources there are so many security issues because of its distributed manner. The user does not having any control of their outsourced data. In this paper in order check the correctness of their outsourced data user takes the assistance of the Third Party Auditor who verifies of the data and sends the desired results to the requested user. In particularly maintaining privacy in the TPA verification so that he should not read the actual content of the user data which is outsourced in the cloud.

Rigorous Public Auditing Support On Shared Data Stored In The Cloud By Privacy-Preserving Mechanism

2015

Cloud storage systems allow data owners to host their data on cloud servers and users (data consumers) can access their data from cloud servers. The paradigm of data hosting service also introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud server. Generally security in cloud is achieved by signing the data block before sending to the cloud server. Moreover, users should use cloud storage like the local storage and they didn't worry about the integrity of the data. In large-scale cloud storage systems, the data may be updated dynamically, so existing remote integrity checking methods served for static archive data are no longer applicable to check the data integrity. Thus, efficient and secure dynamic auditing protocols desired to convince data owners that the data is correctly stored in the cloud. The public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of stored data when needed. To securely introduce an effective third party auditor (TPA), these are : 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we propose a secure cloud storage system supporting privacy-preserving and public auditing.

Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor

2016

Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud.

Ensuring Data Security In Cloud Using Auditor

— Cloud storage is a basic concept in which the data is stored in terms of logical pools on multiple servers. PCs are generally used to process and store clients information utilizing cloud and can be found anywhere on the web by ensuring the security of the available data. Many organizations and communities utilize cloud storage for put away their helpful data because of some necessary elements of cloud computing [1]. The data and information stored on cloud can be put away remotely in the cloud by the clients and can be stored to utilizing customers as per their prerequisite. Cloud storage security is administration service given by Cloud computing. This service provides facilities such as data maintenance, data management, data back up and made accessible to users over a specific network. Data security is the main concern in cloud as the clients data can be attacked or modified by any third party. Therefore, the concept data auditing is introduced for checking and ensuring data security with the help of an entity called Third Party Auditor (TPA). The main aim of this work is to build up an auditing scheme which is more secure, efficient to use and possess the capabilities such as privacy conserving, public auditing along with maintaining the data security and data confidentiality. Therefore we have a tendency to develop a brand new auditing scheme by considering all the general prerequisites. Our proposed scheme consists of three basic entities named as data owner, TPA and cloud server. The data owner performs numerous tasks like dividing the data into blocks, encryption of data, generate a hash value for data, concatenating it and generate a signature on it. The auditor performs the most important task of checking the security of data by verifying both the signatures using hash maps of java. Generally, the auditor is used to perform tasks like hash value generation for encrypted blocks accepted from cloud, concatenate those blocks and provide signature on that. After that it compares both the signatures of data to verify whether the data stored on cloud is attacked by any third party or not. On the basis of demand of the users [2], it verifies the security and safety of data .The main purpose of cloud server is to save the encrypted blocks of data. This proposed examining scheme make use of RSA algorithm for encryption, SHA-1 for security check and RSA signature for digital signature matching of the data.

A Study on the Public Auditing Mechanisms for Privacy Preserving and Maintaining Data Integrity in Cloud Computing

International Journal of Database Theory and Application, 2016

Cloud computing in its various forms allows users to store their information at remote location and reduce the burden at their local systems. Even though this is an advantage for users but there are also many drawbacks because of this remote storage. The main drawback which needs to be dealt with is security. Recently, security is the major concern which most of the cloud service providers are facing. The users store their information in remote location with the hope of maintaining the privacy and integrity of data. In order, to maintain the privacy and integrity of users' data auditing has to be done by the Cloud Service Providers (CSP). CSP uses the Third Party Auditor (TPA) for performing the auditing. The TPA performs auditing on behalf of the data owner using different auditing mechanisms. Many auditing mechanisms have been introduced in literature. Each mechanism varies from one another in one or more characteristics. In this paper we have provided a study on the different auditing mechanisms required to preserve the privacy and integrity of data in cloud. We have presented the advantages and flaws in each mechanism compared to another. Many auditing mechanisms are arising in literature with the aim to maintain the integrity of users' data and preserve the privacy. This paper remains as the basis for different auditing mechanisms that are arising in literature. With the help of auditing mechanisms the TPA can best satisfy the needs of the users.

Cloud Data Security Using Third Party Auditor

Recently, cloud computing changed rapidly the way computing takes place. without any investment the user use cloud storage and other facilities. The user store data on remote server in the data center so there is a security problem concern to the cloud server. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. we also focused on third party auditor (TPA), on the side of the cloud client for verifying the integrity of dynamically stored data on the cloud. Through the auditing eliminates the involvement of the client. General forms of data operation supports the data dynamics such as insertion, and deletion, block modification. Cloud Computing services are not limited to archive or backup data only. so the prior work on remote data integrity frequently lacks the support of either public auditability or dynamic data operations, this paper achieves both. In this firstly we identity the direct extensions security problems with the updated data. and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. For archiving the data dynamic efficiently, manipulating the classic Merkle Hash Tree construction for block tag authentication to improve the storage model of existing system. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

Public Auditing for Secure and Efficient Cloud Data Storage: A Comprehensive Survey

IJARIIE, 2021

Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.

Implementation On Privacy-Preserving Public Auditing for Shared Data in the Cloud

In cloud computing, the way that organizations manage their data, due to its low cost and ubiquitous nature. Users access the application and enjoy the on-demand high quality information's and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. This paper introduces a cloud database storage architecture, this approach prevents the risk of both external and internal attack to the outsourced data. the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. Enhanced and secured third-party auditing, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. furthermore, TPA is trusted and capable of accessing the cloud storage to performed auditing. extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

DATA INTEGRITY PROTECTION IN CLOUD COMPUTING A FORMIDABLE TASK, ESPECIALLY USERS

The cloud storage is the one of the large data storage. It is used for security for the stored data, especially users. Cloud is the centralized computing is called cloud computing. Cloud computing provides the security from the hackers. Using cloud storage , users data or information store on demand high quality applications and services. It gives the original data for the register users on without loss store data in cloud storage. Here we have to use Third party auditor(TPA) for given information to the users any type of modification can include our data. It provides different applications and services to use a shared pool of configurable computing resources. A Third Party auditor(TPA) is to check the integrity of another data add or not in user data. Third party auditor is to just a mediator for users, like a informer. In this paper, we propose a secure cloud storage system by supporting public privacy-preserving auditor service to the user data. so, here enable the TPA performance for multiple users efficiently. We motivate the best knowledge and our best scheme. The first support scalable and efficient public auditing in cloud. It introduce secure and efficient TPA, the auditing process should takes in no new another user data privacy. In this project a propose scheme is highly efficient.

Implementation of Public Auditing for Privacy Preserving in Secure Cloud Storage

Cloud computing area provides solution to the problem of limited storage using which a user can remotely store his or her data and enjoy the on demand high quality applications and services from a shared pool of configurable computing resources without handling the burden of local data that is being stored and maintained but the major fact is a user no longer possess the outsourced data that makes the data integrity protection in cloud computing environment as a formidable task for the users who posses constrained computing resources which pretends to use the cloud storage as if it is local without worrying about the need to verifying the data integrity by enabling public audit ability for cloud storage as it is considered to be critical where a user can resort to a third party auditor (TPA) to check the integrity of the outsourced data and be worry free. The vulnerabilities toward user data privacy introduce no additional online burden to user and in this paper we propose a secure cloud storage system that supports privacy preserving public auditing technique which is further extended to perform audits for multiple users simultaneously and efficiently by implementing extensive security and performance analysis which is proved in the proposed scheme which is provably secure and highly efficient.