Sie sind auf Seite 1von 18

SEMINAR PRESENTATION

DATA INTEGRITY CHECKING


BY
THIRD PARTY AUDITING
Submitted by
Sutirtha Chakraborty
Roll - T15CS015
National Institute of Technology

CLOUD STORAGE SYSTEMS


DATA OWNER
Introduction
Problem Statement

Cloud Service Providers


Operate large data centers
Virtualize storage pools

Architecture
Algorithm
Flow Diagram
Conclusion
References

Data Owners
Buy or rent storage in a pay-as-you-go model
Data stored in virtual storage

CLOUD STORAGE SYSTEMS


USERS

Introduction

Separation of data ownership


and service provider

Problem Statement
Architecture
Algorithm
Flow Diagram
Users can access data
from anywhere and
at anytime

Conclusion
References
Owners

Users

SECURITY CHALLENGES
Introduction

Cloud Servers are not fully trustable:

Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Data

Integrity

Data could be corrupted or even deleted in the


cloud.
Data

Access Control

Data may be given access to unauthorized users.

DESIGN GOALS
Introduction
Problem Statement

Integrity

of the data should not be compromised.

Architecture
Algorithm
Flow Diagram
Conclusion
References

Privacy

of the data should be maintained.

ARCHITECTURE OF
THIRD PARTY AUDITOR
Initialization:

Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram

Data owner sends


encrypted data & verification tags to server
data index to auditor
Challenge: Auditor sends Challenge to server
Proof: Server responses with Proof
Verification: Auditor verifies correctness of
the
Proof

Conclusion
Auditor

References

Owners

Cloud Servers

ARCHITECTURE OF
THIRD PARTY AUDITOR
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

AUDITING ALGORITHM
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Initialization

m
mi

m1
mi1

mi

mij

mn
mil

Divide m into n block


Split mi into l sectors

System Parameters:

G1, G2 , GT: multiplicative groups with the same prime


order p
e: pairing operation maps a pair of points from G1 and
G2 to a point in GT
g1: generator of G1; g2: generator of G2

AUDITING ALGORITHM
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Initialization
m1

m
mi

mi1

mi

mij

mn
mil

ti = (h(skh, FID||i)j=1->l g1xjmij)skt

Cloud
Servers

abstract information of m:
FID, # of blocks, index table, etc.
skt: secret tag key kept by owner
skh: secret hash key shared with auditor
g2skt : public tag key shared with auditor
g1xj : random key shared with the cloud

Auditor

AUDITING ALGORITHM
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Sampling Auditing
Challenge from auditor :

C = ({i, vi}iQ , R = (g2skt) r)


Proof by Cloud: P = (DP, TP)
Data Proof:

DP = j=1->l e(g1xj, R)MPj


where MPj = iQvimij
Tag Proof:
TP = iQ tivi

AUDITING ALGORITHM
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Sampling Auditing
Challenge from auditor :

C = ({i, vi}iQ , R = (g2skt) r)


Proof by Cloud: P = (DP, TP)
Data Proof:

DP = j=1->l e(g1xj, R)MPj


where MPj = iQvimij
Tag Proof:
TP = iQ tivi

AUDITING ALGORITHM
Introduction

Sampling Auditing

Problem Statement

Challenge from auditor : C = ({i, vi}iQ , R = (g2skt) r)

Architecture

Proof by Cloud: P = (DP, TP)


Data Proof:

Algorithm
Flow Diagram
Conclusion
References

DP = j=1->l e(g1xj, R)MPj where


MPj = iQvimij
Tag Proof:
TP = iQ tivi
Verification by auditor:

Hchal = iQh(skh, FID||i)rvi

DPe(Hchal , g2skt) = e(TP, g2r)

FLOW DIAGRAM OF
AUDITING
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

FLOW DIAGRAM OF
DYNAMIC AUDITING
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

CONCLUSION
Introduction
Problem Statement
Architecture
Algorithm

Privacy Preservation
Keep the data confidential against the
auditor
Dynamic Auditing
Allow dynamic updates of data in the cloud

Flow Diagram
Conclusion
References

Batch Auditing
Combine multiple auditing tasks together to
improve efficiency

REFERENCES
Introduction
Problem Statement
Architecture
Algorithm
Flow Diagram
Conclusion
References

Kan Yang and Xiaohua Jia. An Efficient and Secure


Dynamic Auditing Protocol for Data Storage in Cloud
Computing. IEEE Trans. on Parallel and Distributed
Systems (TPDS), Vol 24, Issue 9, September 2013.
Kan Yang and Xiaohua Jia. Data Storage Auditing
Service in Cloud Computing: Challenges, Methods and
Opportunities. World Wide Web, Vol 15, Issue 4, July
2012.
Kan Yang and Xiaohua Jia. Short Papers On the Security
of an Efficient Dynamic Auditing Protocol in Cloud
Storage

THANK YOU!

17

Das könnte Ihnen auch gefallen