Sie sind auf Seite 1von 15

Public Integrity Auditing for Shared

Dynamic Cloud Data with Group


User Revocation

Objectives
we propose a novel public auditing mechanism for the
integrity of shared data with efficient user revocation in mind.
By utilizing the idea of proxy re-signatures, we allow the
cloud to resign blocks on behalf of existing users during user
revocation.
so that existing users do not need to download and re-sign blocks
by themselves.

Provable Data Possession at


Untrusted Stores
In addition, a public verifier is always able to audit the

integrity of shared data without retrieving the entire data from


the cloud, even if some part of shared data has been re-signed
by the cloud.
Advantages:
High speed data communication with cryptographic
computation.
Best provable-secure scheme for remote data checking.
Drawbacks:
Data Dynamics is not possible.
Less security.
More encryption key is needed.

Ensuring Data Storage Security


in Cloud Computing
This work utilizing the homomorphism token with distributed
verification of erasure-coded data, our scheme achieves the
integration of storage correctness insurance and data error
localization, i.e., the identification of misbehaving server(s).
Advantages:
Unlike most prior works, the new scheme further supports
secure.
efficient dynamic operations on data blocks, including: data
update, delete and append.
Drawbacks:
it may also attempt to hide a data loss incident
due to management errors.
Weak Adversary.

Enabling Public Verifiability and Data Dynamics


for Storage Security in Cloud Computing
This work studies the problem of ensuring the
integrity of data storage in Cloud Computing. In particular,
we consider the task of allowing a third party auditor
(TPA), on behalf of the cloud client, to verify the integrity
of the dynamic data stored in the cloud.
Advantages:

data operation, such as block modification, insertion and


deletion, is also a significant step to ward practicality

high remote data integrity often lacks the support of either


public verifiability or dynamic data operations.

It achieves to identify the difficulties and potential security .


Disadvantages:
Low Security.
Poor Performance.

Privacy-Preserving Public Auditing for


Secure Cloud Storage
This paper is TPA enabling public auditability for cloud storage is of
critical importance so that users can resort to a third party auditor
(TPA) to check the integrity of outsourced data and be worry-free. To
securely introduce an effective TPA, the auditing process should bring
in no new vulnerabilities towards user data privacy, and introduce no
additional online burden to user.
Advantages:
perform audits for multiple users simultaneously and efficiently.
Extensive security and performance analysis show the proposed

schemes are provably secure and highly efficient.


Drawbacks:
Storage correctness does not ensure that there exists no cheating
cloud server that can pass the TPAs audit without indeed storing
users data intact.
It is not to ensure that the TPA cannot derive users data content
from the information collected during the auditing process.
High in communication and computation overhead.

Dynamic Audit Services for Integrity Verification


of Outsourced Storages in Clouds
This paper prposes public verifiability without help of a third party
auditor. To provide security between the client and server by using
TPV(Third party verifier)in cloud.
Advantages:
The client can store data without keeping any local copy in cloud server
The proposed system does not leak any private information to third party

verifiers.
Drawbacks:
High in Maintance.
Every data communication depends TPV. So it takes more time to deliver
and busy time of server.

EXISTING SYSTEM
The clients store the data in server
That server is trustworthy and after the third party auditor

can audit the client files.


The possibility to the

client files.

third party auditor can stolen the

PROPOSED SYSTEM
The client stores their data in the server without keeping a

local copy
The proposed system inherits the support of data

dynamics, and supports public verifiability and privacy


against third-party verifiers.
Doesnt need to use a third-party auditor.

MODULES
There are four modules that is
Data Dynamics
public verifiability
Metadata Generation
Privacy User Revocation

DATA DYNAMICS
Data dynamics means after clients store their data at
the remote server, they can dynamically update their data at
later times.
Block Insertion
The Server can insert anything on the clients file.
Block Deletion
The Server can delete anything on the clients file.
Block Modification
The Server can modify anything on the clients file.

PUBLIC VERIFIABILITY
Each and every time the secret key sent to the clients

email and can perform the integrity checking operation.


Client doesnt ask any secret key from third party.

METADATA KEY GENERATION


Initially preprocess the file and create metadata to be
appended to the file.
Each of the Meta data from the data blocks mi is encrypted
by using a RSA algorithm to give a new modified Meta data
M i.

User Data Revocation


KeyGen: Every user in the group produces their public key and
private key.
Ring Sign: User in the group identifies with sign a square with her
private key and all group members open keys.
Ring confirm: The verifier can be utilized to test if the given square
is marked by the group part here ring confirmation applies CP-ABE
Scheme to give the access rights if there is any data trace appeared
it automatically revocate the user and informed to clud server.

THANK YOU

Das könnte Ihnen auch gefallen