Annexure Privacy Preserving Public Auditing for Data Storage
Security in Cloud Computing
Komal Gajanan Nadekar*,
Siddhata Hushar Ramteke, Priyanka Suresh Babulkar, Jotesh R. Dhuriya, Prof. Nikesh Aote
Dept. of Computer Science and Engineering Nagpur Institute of Technology, Nagpur, India,
*Corresponding Author Email: komalnadekar50@gmail.com, rsiddhataramteke@gmail.com,
priyanka.babulakar@gmail.com, joteshdhuriyadj@gmail.com, nikeshaote@gmail.com
ABSTRACT:
Cloud computing is the long dreamed vision of computing as a utility,
where users can remotely store their data into the cloud so as to enjoy the
on-demand high quality applications and services from a shared pool of
configurable computing resources. By data outsourcing, users can be relieved
from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical
importance so that users can resort to an external audit party to check the
integrity of outsourced data when needed. To securely introduce an effective
third party auditor (TPA), the following two fundamental requirements have to
be met: 1) TPA should be able to
efficiently audit the cloud data storage without demanding the local copy of
data, and introduce no additional on-line burden to the cloud user.
Specifically, our contribution in this work can be summarized as the following
three aspects. 2) We motivate the public auditing system of data storage
security in Cloud Computing and provide a privacy-preserving auditing protocol,
i.e., our scheme supports an external auditor to audit user’s outsourced data
in the cloud without learning knowledge on the data content. 3) To the best of
our knowledge, our scheme is the first to support scalable and
efficient public auditing in the Cloud Computing. In particular, our scheme
achieves batch auditing where multiple delegated auditing tasks from different
users can be performed simultaneously by the TPA. 4) We prove the security and
justify the performance of our proposed schemes through concrete experiments
and comparisons with the state-of-the-art.
KEYWORDS: Auditability, third party auditor
(TPA), Cloud computing, privacy-preserving auditing protocol.
I. INTRODUCTION:
Cloud Computing has been envisioned as the next-generation architecture
of IT enterprise, due to its long list of unprecedented advantages in the IT
history: on-demand self-service, ubiquitous network access, location
independent resource pooling, rapid resource elasticity, usage-based pricing
and transference of risk. As a disruptive technology with profound
implications, Cloud Computing is transforming the very nature of how businesses
use information technology.
One Fundamental aspect of this paradigm shifting is that data is being
centralized or outsourced into the Cloud. From users’ perspective, including
both individuals and IT enterprises, storing data remotely into the cloud in a
flexible on-demand manner brings appealing benefits: relief of the burden for
storage management, universal data access with independent of geographical
locations and avoidance of capital expenditure on hardware, software, and
personnel maintenances.
As users no longer physically possess the storage of their data,
traditional cryptographic primitives for the purpose of data security
protection can’t be directly adopted. Thus, how to efficiently verify the
correctness of outsourced cloud data without the local copy of data files
becomes a big challenge for data storage security in Cloud Computing. Note that
simply downloading the data for its integrity verification is not a practical
solution due to the expensiveness in I/O cost and transmitting the file across
the network.
II. Key policy-attribute
based encryption algorithm:
Broadcast Encryption (BE) scheme
is allows the sender to securely distribute a data to a dynamically changing
set of users over a unsecure channel. Attribute based
Broadcast Encryption (ABBE) is a excellent approach
for broadcasting. Existing BE classical BE approach required an explicitly
specified decrypter list. In ABBE differentiate
groups of users by their attribute. In ABBE encrypter
enforces an expressive access policy composed of one or more attributes. ABBE
is more flexible and efficient with reduce storage overhead. Proposed algorithm
is ABBE using RSA. Merge the advantage of both the algorithm. Using this scheme
reduce the burden of key calculation of ABBE. RSA provide secure transmission
over transmission channel. Main advantage of RSA is prime factorization. In this scheme use attribute as a prime number.
A. Concept:
In proposed system define concept
is merge the advantage of ABBE less number of public key and RSA highly secure
using prime number. In this paper introduce one system which will work for one
or two attributes. In this system we will take attribute as a prime number.
Perform operation of RSA.
B. Proposed algorithm:
KPABE using RSA. Set up for proposed algorithm
In this algorithm we use k number
of attribute into the system. But here for convince this system will work for
one or two attributes. Take advantage of prime numbers. Here we take attribute
as a prime number.
Give one prime number as a ideal number. i.e
when user don’t want to restrict by any attribute. Here in this set up we have
taken two set of attributes which are describe below:
L is a list of attributes.
L={3=technical,5=nontechnical,7=regional,9=
ideal }
U= unique id to each user.
a) When user joins a process for
1st time it needs to register itself with two attributes which are listed in L.
b) Each user gets an unique id during the registration process.
First sender will specify the
access policy(w) for the intended receiver. Here we
restrict this policy by only two attributes.
U1(w)={3,9}
N=p*q; p=3 and q=9;
Ф(n)=(p-1)(q-1)
d = e-1 mod Ф(n).
e is chosen by user.
C= Me mod n;
Public key={e}
Private key={d,L}
In this proposed algorithm we
change RSA public and private key as per necessary of system. At the receiver
side receives ciphertext “C‟ and knows the
public key. Now receiver select proper number of attributes then only receiver
can calculate n and it can convert the formula M=Cd
mod n into intelligible form.
III. Implementation Methodology:
After analyzing the requirements of the task
to be performed, the next step is to analyze the problem and understand its
context. The first activity in the phase is studying the existing system and
other is to understand the requirements and domain of the new system. Both the
activities are equally important, but the first activity serves as a basis of
giving the functional specifications and then successful design of the proposed
system. Understanding the properties and requirements of a new system is more
difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead
diversion from solution.
a) The Privacy-Preserving
Public Auditing Scheme:
To effectively support public auditability
without having to retrieve the data blocks themselves, we resort to the homomorphic authenticator techniques. Homomorphic
authenticators are unforgeable verification metadata
generated from individual data blocks, which can be securely aggregated in such
a way to assure an auditor that a linear combination of data blocks is
correctly computed by verifying only the aggregated authenticator. However, the
direct adoption of these techniques is not suitable for our purposes, since the
linear combination of blocks may potentially reveal user data information, thus
violating the privacy-preserving guarantee. Specifically, if enough number of
the linear combinations of the same blocks are
collected, the TPA can simply derive the user’s data content by solving a
system of linear equations. Overview to achieve privacy-preserving public
auditing, we propose to uniquely integrate the homomorphic
authenticator with random mask technique. In our protocol, the linear
combination of sampled blocks in the server’s response is masked with
randomness generated by a pseudo random function (PRF). With random mask, the
TPA no longer has all the necessary information to build up a correct group of
linear equations and therefore cannot derive the user’s data content, no matter
how many linear combinations of the same set of file blocks can be collected.
Meanwhile, due to the algebraic property of the homomorphic
authenticator, the correctness validation of the block-authenticator pairs will
not be affected by the randomness generated from a PRF, which will be shown
shortly. Note that in our design, we use public key based homomorphic authenticator, specifically, the one in [11]
which is based on BLS signature [16], to equip the auditing protocol with
public auditability. Its flexibility in
signature aggregation will further benefit us for the multi-task auditing.
.
b) Design Goals:
To enable privacy-preserving public auditing for
cloud data storage under the aforementioned model, our protocol design should
achieve the following security and performance guarantee:
1.
Public auditability:
to allow TPA to verify the correctness of the cloud data on demand without
retrieving a copy of the whole data or introducing additional on-line burden to
the cloud users.
2.
Storage correctness: to
ensure that there exists no cheating cloud server that
can pass the audit from TPA without indeed storing users’ data intact.
3.
Privacy-preserving: to
ensure that there exists no way for TPA to derive users’ data content from the
information collected during the auditing process.
4.
Batch auditing: to enable
TPA with secure and efficient auditing capability to cope with multiple
auditing delegations from possibly large number of different users
simultaneously.
5.
Lightweight: to allow TPA
to perform auditing with minimum communication and computation overhead.
Figure- 1. The proposed cloud storage model
IV. Fuzzy Search
Techniques:
This fuzzy search techniques includes following three main techniques
which we are using,
•
Wildcard – Based Technique :
In this technique, we are using
three Methods suppose we are Searching some Data File in Server and we Don’t the Exact Name.
Then this Three Methods will be used for applying Fuzzy Techniques
SCASTLE, 1 = {CASTLE, *CASTLE,*ASTLE, C*ASTLE, C*STLE, CASTL*E, CASTL*,
CASTLE*}.
Substitution: changing one
character to another in a word.
Deletion: deleting one
character from a word.
Insertion: inserting a
single character into a word.
•
Gram - Based Technique :
This technique is used by forming
various names of File name given by User for Searching the File.
For example, the gram-based fuzzy set SCASTLE, 1 for keyword CASTLE can
be constructed as
{CASTLE, CSTLE, CATLE, CASLE, CASTE, CASTL,
ASTLE}.
•
Symbol –
Based – traverse Search Scheme :
This Technique Is used to Search
the Data from Cloud Server based on the initial alphabets. Like for Cloud, If user enter file name “Cl” then
also it will Retrieve Cloud File because of This Technique.
V. Proposed System:
In this project we
utilize the public key based homomorphic
authenticator and uniquely integrate it with random mask technique to achieve a
privacy-preserving public auditing system for cloud data storage security while
keeping all above requirements in mind. Extensive security and performance analysis shows that the proposed
schemes are provably secure and highly efficient. We believe all these
advantages of the proposed schemes will shed light on economies of scale for
Cloud Computing. In this project we propose a scheme to achieve fine grainedness, data confidentiality, and scalability of
organizational data in cloud. Companies can have their own separate cloud or
they can get storage space from service providers such as Amazon, Google App
Engine, and Microsoft Azure etc. This reduces time and work load on a organization record administration block and cost for
storage.
VI.
System Module and Assumption:
The implementation of the system has been
described using block diagram and flow chart as follow.
Fig 2. Block Diagram
VII. APPLICATION:
1. By using privacy preserving public
auditing for data storage security in cloud computing most of the computational
work will be done by automatically.
2. Key generation techniques will reduce
computational overhead.
3. Fuzzy techniques will helps in fine
grained data access.
VIII. CONCLUSION:
Extensive security and
performance analysis shows that the proposed schemes are provably secure and
highly efficient. We believe all these advantages of the proposed schemes will
shed light on economies of scale for Cloud Computing. In this project we
propose a scheme to achieve fine grainedness, data
confidentiality, and scalability of organizational data in cloud. Companies can
have their own separate cloud or they can get storage space from service
providers such as Amazon, Google App Engine, and Microsoft Azure etc. This
reduces time and work load on a organization record
administration block and cost for storage.
IX. REFERENCES:
1.
P. Melland T. Grance , “Draft NIST working definition of cloud computing,”
Reference on June. 3rd, 2009 Online at 2009.
2.
S. Wilson, “Appengine
outage,” Online at http://www.cioweblog.com/50226711/appengine
php, June 2008.
3.
Pascal Junod,” Alexandre Karlov” An Efficient
Public-Key Attribute-Based Broadcast Encryption Scheme Allowing Arbitrary
Access Policies”.
4.
Yevgeniy Dodis, Nelly Fazio”
Public Key Broadcast Encryption for Stateless Receivers August 1, 2002.
5.
Amazon Web Services (AWS), online at http://aws. amazon.com.
Received on 12.04.2015 Accepted
on 15.05.2015
©A&V
Publications all right reserved
Research J. Engineering and Tech. 6(2): April-June,
2015 page 301-304
DOI: 10.5958/2321-581X.2015.00046.X