Implement Public Audit ability and Data Dynamics with Security in Cloud Computing
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 6
Abstract
Cloud Computing has been visualized as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are naturally intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public Auditability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an dignified verification scheme for the seamless -integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
Authors and Affiliations
P. Rao
Effect of SC5D Additive on the Performance and Emission Characteristics of CI Engine
In this experimental work polymer based additive are mixed in different proportions with diesel fuel. Their emissions and performance results are compared with base fuel diesel. By mixing of this additive, it is ob...
Design and Development of Passive Magnetic Bearing
Passive Magnetic Bearings (PMB) are known for their non-contact and negligible friction operations but these desirable characteristics of PMB can only be attained if proper designing of bearing is carried out b...
An Effective Strategy of Firewall Based Matching Algorithm
Here the perimeter oriented to the network based strategy where the crossing of the traffic plays a major role in its implementation based aspect in a well oriented fashion respectively. Therefore there is a neces...
Lexical Pattern- Based Approach for Extracting Name Aliases
Searching for information about people in the web is one of the most common activities of many internet users. Around 30% of search engine queries include person names. Retrieving information about people from web...
Synthesis and Characterization of Mn, Ce Co-Doped CDS Nanoparticles Synthesized Via Co-Precipitation Method
Mn, Ce co-doped CdS nanoparticles were prepared by chemical co-precipitation method at room temperature. The prepared samples were characterized by X- ray diffraction (XRD), scanning electron microscopy (SEM), energy dis...