Sie sind auf Seite 1von 5

Abstract

Cloud Computing is the long dreamed vision of computing as a


utility, where users can remotely store their data into the cloud so as to
enjoy the on-demand high quality applications and services from a
shared pool of configurable computing resources. By data
outsourcing, users can be relieved from the burden of local data
storage and maintenance. However, the fact that users no longer have
physical possession of the possibly large size of outsourced data
maes the data integrity protection in Cloud Computing a very
challenging and potentially formidable tas, especially for users with
constrained computing resources and capabilities. !hus, enabling
public auditability for cloud data storage security is of critical
importance so that users can resort to an e"ternal audit party to chec
the integrity of outsourced data when needed. !o securely introduce an
effective third party auditor #!$%&, the following two fundamental
requirements have to be met' (& !$% should be able to efficiently audit
the cloud data storage without demanding the local copy of data, and
introduce no additional on-line burden to the cloud user) *& he third
party auditing process should bring in no new vulnerabilities towards
user data privacy. +n this paper, we utilize and uniquely combine the
public ey based homomorphic authenticator with random masing to
achieve the privacy-preserving public cloud data auditing system,
which meets all above requirements. !o support efficient handling of
multiple auditing tass, we further e"plore the technique of bilinear
aggregate signature to e"tend our main result into a multi-user setting,
where !$% can perform multiple auditing tass simultaneously.
,"tensive security and performance analysis shows the proposed
schemes are provably secure and highly efficient.
Architecture:
EXISTING SYSTEM:
!he traditional cryptographic technologies for data integrity and availability,
based on Hash functions and signature schemes cannot wor on the outsourced data. it
is not a practical solution for data validation by downloading them due to the
e"pensive communications, especially for large size files. -oreover, the ability to
audit the correctness of the data in a cloud environment can be formidable and
e"pensive for the cloud users. !herefore, it is crucial to realize public audit ability for
C.., so that data owners may resort to a third party auditor, who has e"pertise and
capabilities that a common user does not have, for periodically auditing the
outsourced data. !his audit service is significantly important for digital forensics and
credibility in clouds. !o implement public audit ability, the notions of proof of
retrievability and provable data possession have been proposed by some researchers.
!heir approach was based on a probabilistic proof technique for a storage provider to
prove that clients/ data remain intact.
Disadvantages:
0ac of rigorous performance analysis for constructed audit system
greatly affects the practical application of this scheme.
it is crucial to develop a more efficient and secure mechanism for
dynamic audit services, in which possible adversary/s advantage
through dynamic data operations should be prohibited
.ingle !$% to audit for all files and to tae more time to auditing the
files.
PROPOSED SYSTEM:
+n this paper, we introduce a dynamic audit service for integrity verification of
untrusted and outsourced storages. 1ur audit system, based on novel audit system
architecture, can support dynamic data operations and timely abnormal detection with
the help of several effective techniques, such as fragment structure, random sampling,
and inde"-hash table. 2urthermore, we propose an efficient approach based on
probabilistic query and periodic verification for improving the performance of audit
services. % proof of- concept prototype is also implemented to evaluate the feasibility
and viability of our proposed approaches. 1ur e"perimental results not only validate
the effectiveness of our approaches, but also show our system has a lower
computation cost, as well as a shorter e"tra storage for integrity verification.
Advantages:
% fragment technique is introduced in this paper to improve
performance and reduce e"tra storage.
!he audit activities are efficiently scheduled in an audit period, and a
!$% needs merely access file to perform audit in each activity.
,ach !$% to audit for a batch of files and to save the times for auditing
the files.
MODUES'
(. !e" Generati#n:
!he owner generates a public3secret ey pair #p, s& by himself or the
system manager, and then sends his public ey p to !$%. 4ote that
!$% cannot obtain the client/s secret ey s) secondly, the owner
chooses the random secret.
*. Tag Generati#n:
!he client #data owner& uses the secret ey s to pre-process a file,
which consists of a collection of n blocs, generates a set of public
verification parameters and inde"-hash table that are stored in !$%,
and transmits the file and some verification tags to C.$.
5. Peri#dic Sa$%&ing 'atch Audit:
!he Batch !$% #or other applications& issues a 67andom
.ampling8 challenge to audit the integrity and availability of
outsourced data in terms of the verification information stored in !$%.
9. Audit (#r D"na$ic O%erati#ns:
%n authorized application, which holds data owner/s secret ey s, can
manipulate the outsourced data and update the associated inde" hash
table stored in !$%. !he privacy of s and the checing algorithm
ensure that the storage server cannot cheat the authorized applications
and forge the valid audit records.
S"ste$ S%eci(icati#n
System Requirements:
)ard*are Re+uire$ents:
$rocessor ' +ntel :uel Core.
Hard :is ' ;< =B.
2loppy :rive ' (.99 -b.
-onitor ' 0C: Colour.
-ouse ' 1ptical -ouse.
7%- ' >(* -b.
S#(t*are Re+uire$ents:
1perating system ' ?indows @$.
Coding 0anguage ' %.$.4et with CA
:ata Base ' .B0 .erver *<<>

Das könnte Ihnen auch gefallen