Beruflich Dokumente
Kultur Dokumente
ABSTRACT
In cloud computing, data or information proprietors have
their data on cloud servers and users can get to the data
from cloud servers. Because of the information
outsourcing, in any case, this new worldview of
information facilitating benefit likewise presents new
security challenges, which requires a free inspecting
administration to check the information trustworthiness
in the cloud. Some current remote trustworthiness
checking strategies can serve for static document
information and, along these lines, can't be connected to
the reviewing administration since the information in the
cloud can be dynamically updated. Along these lines, an
efficient and secure dynamic auditing protocol is desired
to convince data owners that the data are correctly stored
in the cloud. It introduced an efficient and inherently
secure dynamic auditing protocol. It protects the data
privacy against the auditor by combining the
cryptography method with the bilinear property of
bilinear paring, rather than using the mask technique.
Furthermore,
auditing
scheme
incurs
less
communication cost and less computation cost of the
auditor by moving the computing loads of auditing from
the auditor to the server, which greatly improves the
auditing performance and can be applied to large-scale
cloud storage systems.
Keywords Cloud Computing, Privacy Preserving
Auditing, Storage Auditing.
I.
INTRODUCTION
www.ijsret.org
136
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 3, March 2016
1.3Public Cloud
The cloud infrastructure is provisioned for open use by
the overall population. It might be possessed, overseen,
and worked by a business, scholarly, or government
association, or some mix of them. It exists on the
premises of the cloud supplier.
1.4Hybrid Model
The cloud infrastructure is a is a synthesis of two or
more particular cloud bases (private, group, or open) that
stay one of a kind substances, yet are bound together by
institutionalized or exclusive innovation that empowers
information and application compactness (e.g., cloud
bursting for load balancing between clouds) [3].
II.
AUDITING PROTOCOL
III.
RELATED WORK
www.ijsret.org
137
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 3, March 2016
5) Verify (C, P,
,,
) = 0/1
The verification algorithm takes as inputs P from the
server, the secret hash key
, the public tag key
,
and the abstract information of the data
. It outputs
the auditing result as 0 or 1.
3.3Privacy Preserving Auditing Protocol
Figure 3 show framework of privacy preserving auditing
protocol. It consists of three phases: owner initialization,
confirmation auditing, and sampling auditing.
3.2Security Model
We accept the auditor is straightforward yet inquisitive.
It performs truly amid the entire inspecting technique,
yet it is inquisitive about the got information. Be that as
it may, the separate could be exploitative and might
dispatch the accompanying assaults:
1) KeyGen () =
This key era calculation takes no information other than
the understood security parameter . It outputs a secret
hash key
and a couple of secret-public tag key
(
).
2) TagGen (M,
)=T
The tag generation algorithm takes as inputs an
encrypted file M, the secret tag key
and the secret
hash key
. For each data block , it computes a data
tag based on
and
. It outputs a set of data tags
3) Chall (
)=C
The challenge algorithm takes as data the unique data of
information
(e.g., file identity, total number of
blocks, version number, time stamp, etc.). It outputs a
challenge C.
4) Prove (M, T, C) = P
The prove algorithm takes as inputs the file M, the tags
T, and the challenge from the auditor C. It outputs a
proof P.
www.ijsret.org
138
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 3, March 2016
IV.
CONCLUSION
REFERENCES
[1] Kan Yang and Xiaohua Jia, An Efficient and Secure
Dynamic Auditing Protocol for Data Storage in Cloud
Computing, IEEE Transactions on Parallel and
Distributed Systems, Volume.24, September 2013.
www.ijsret.org
139