SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701
ISSN: 2249-6645

An Optimal Cooperative Provable Data Possession
Scheme for Distributed Cloud Storage
Shaik Faizulla1, G. Sreedevi2
1

M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.

2

ABSTRACT: In recent years, cloud storage services has become a faster growth and makes large profits by providing the
services to the customer for their needs on the internet and data sharing. Cloud environment provides the services at low
cost, scalable position independent platform for the storage of client’s data. Though it provides good services, cloud
environment is based on the open architecture and with interfaces. It has capabilities to incorporate with multiple internal
or external services together to provide the ability to exchange data’s and use information so that we call such a distributed
cloud environments as a multi- cloud or hybrid cloud. Provable data possession (PDP) is a technique for ensuring the
integrity of data in cloud environment. Provable data possession is such a probabilistic proof technique for a storage
provider to prove the integrity and ownership of the clients’ data without downloading data. We present an optimal
cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.

Keywords: Cloud storage, Hash index, Hybrid cloud, PDP.
I.

INTRODUCTION

Cloud computing environment is made on the basis of exposed designs and boundaries, it has the proficiency to
integrate numerous interior or exterior cloud computing services together to offer great interoperability and such a dispersed
cloud environment is known as a multi-Cloud [1]. By means of virtual infrastructure management a distributed permits
clients to effortlessly access their resources distantly over boundaries. Cloud storage package has developed into a quicker
profit progression point by providing low-cost, accessible, position self-determining stage for the customers’ records. It
would fetch irreversible sufferers to the clients if a hybrid cloud storage platform is susceptible to safety attacks. The secured
data in an enterprise may be illegitimately opened over a remote edge delivered by a distributed cloud and documentations
may be mislaid with when they are deposited into an undefined storage group external to the enterprise [2] [3].
Several implements and skills were present for hybrid cloud which aid cloud providers to build a distributed cloud
storage platform for handling customers’ statistics [4]. The proof checking without moving makes it particularly significant
for very large- size files and folders to check whether these data have been interfered with or deleted without transferring the
latest version of data. As a consequence, it is able to substitute outdated hash and signature functions in the storage
outsourcing. It is necessary for cloud computing providers to offer safety practices for handling their storage facilities.
Provable data possession (PDP) or proofs of retrievability is a probabilistic proof system for a storage provider to
demonstrate the integrity and ownership of clients’ data without transferring data [5].

II.

RELATED WORK

In [6], the authors proposed the first proof-of-retrievability schemes with full proofs of security. Their first scheme,
built from BLS signatures and secure in the random oracle model has the shortest query as well as response of any proof-ofretrievability with public verifiability. Their second scheme, which builds elegantly on the pseudorandom functions (PRFs)
and is secure in the standard model, has shortest response of any proof-of-retrievability scheme with private verifiability but
a longer query. In [4], the authors constructed a highly efficient and provably secure PDP technique based entirely on
symmetric key cryptography. Also, our data possession technique allows outsourcing of dynamic data, it efficiently supports
operations, such as block modification, append and deletion. In [2], the authors introduced a model for provable data
possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original
data without retrieving it. The model generates probabilistic proofs of data possession by sampling random sets of blocks
from the server, which significantly reduces I/O costs.
In [3], the authors constructed a dynamic provable data possession (DPDP), which extends the PDP model to
support provable updates on the stored data. DPDP solution is based on a new variant of the authenticated dictionaries which
use rank information to organize dictionary entries. Thus we can support efficient authenticated operations on the files at
block level, such as authenticated insert and delete. They proved the security of their constructions using some standard
assumptions. In [7], the authors proposed an innovative authentication scheme for mobile devices. While creating the
password, the user chooses a theme of snapshots in thumbnail size and the sequence of those snapshots is fixed as a
password. In [8], passface is an approach proposed by the Real User Corporation in which the user is allowed to choose four
images of human faces from the face database as their password. During the verification step, the user is provided with a grid
of nine faces, one already chosen during the registration and eight decoy faces. The user identifies the selected face and then
clicks anywhere over it.

www.ijmer.com

2698 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701
ISSN: 2249-6645

III.

PROPOSED WORK

A. Verification Framework for Multi- Cloud
In the proposed work, we consider a data storage service involving three different entities: Granted clients, who
have a large amount of data to be stored in multi-clouds and have the permissions to access and manipulate the stored data;
Cloud service providers (CSPs), who work together for providing data storage services and have enough storage space sand
computation resources; and Trusted third parties (TTPs),who are trusted to store the verification parameters and offer the
query services for these parameters. Figure 1 shows the architecture.

Figure 1: Verification architecture for data integrity
In this architecture, we consider the existence of many CSPs to collaboratively store and maintain the client‟ s data.
Moreover, a cooperative PDP is used to verify the integrity and availability of the stored data in CSPs. The verification
process is described as follows: Firstly, the client (data owner) uses the shared secret key to pre-process the file, which
consists of a collection of n blocks. It generates a set of public verification information that is stored in TTP and then
transmits the file and some verification tags to CSPs, and may delete its local copy. Later by using a verification protocol for
cooperative PDP, the clients can issue a challenge for one CSP to check the integrity and the availability of outsourced data
in terms of public verification information stored in TTP.
B. Cooperative PDP
Based on zero knowledge proof system and interactive proof system, the integrity of data stored in a multi cloud is
maintained. A CPDP is a collection of two algorithms (Key Gen, Tag Gen) and the interactive proof system Proof.




Key Gen: It takes a security parameter as an input and then returns a secret key as output.
Tag Gen: It takes a shared secret key, file and set of cloud storage providers as input and returns triples.
Proof: It is a protocol of proof of provable data possession between the CSP's and verifier.

Let H = { Hk } be a family of hash functions where Hk : {0,1}  {0,1} index, where k ɛ K. This algorithm has a benefit
in breaking the collision resistance of hash H. In Collision-Resistance H, a hash family H(t, ɛ ) collision resistant if no tTime adversary has advantage atleast ɛ in breaking collision of H. First the KeyGen algorithm is run in this scheme to
obtain the private or the public key for users. Then TagGen is generated by the clients for the cloud outsourced data.
n

k

C. Homomorphic Verifiable Response
A homomorphism is a map function f : p → q between two groups such that f(g1  g2) = f(g1)  f(g2) for all g1,
g2  p, where  denotes the operation in p and  denotes the operation in q. This notation was used to define a

j

for two message mi and mj , anyone can combine

www.ijmer.com

2699 | Page

Homomorphic Verifiable Tags (HVTs) as : Given two values

i

and

them into a value  ′ corresponding to the sum of the message mi+mj . When provable data possession is considered as a
challenge response protocol, we also extend this notation to introduce the concept of a Homomorphic Verifiable Responses
(HVRs), which is used to integrate multiple responses from the various CSPs in cooperative PDP scheme, as follows:
A response is called homomorphic verifiable response in data possession protocol, if given two responses  i and
 j for two challenges Qi and Qj from two CSPs, there exists an efficient algorithm to combine them into a response 
corresponding to the sum of the challenges Qi uQj.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701
ISSN: 2249-6645
D. Fragment Structure of CPDP
We propose a fragment structure of our data possession scheme based on the above-mentioned model as shown in
Figure 2, which has following characters: 1) a file is split into n × s sectors and each block (s sectors) corresponds to a tag, so
that the storage of the signature tags can be reduced with the order of s; 2) the verifier can check the integrity of a file by
random sampling approach, which is a matter of the utmost importance for large or huge files; and 3) this structure relies on
the homomorphic properties to aggregate the data and tags into a constant size response, which minimizes network
communication overheads. The above structure, considered as a common representation for some of the existing schemes,
can be converted to MAC-based, ECC or RSA schemes. By using BLS signatures and random oracle model, it is easy to
design a practical data possession scheme with the shortest homomorphic verifiable responses for public verifiability. This
structure also creates some favorable conditions for the architecture of CSPs.

Figure 2: The fragment structure of CPDP model
E. Hash Index Hierarchy
A representative architecture for data storage in distributed is illustrated as follows: this architecture is a
hierarchical structure H on 3 layers to represent the relationships among all blocks for stored resources. Three layers are as
follows:




First-Layer (Express Layer): It offers an abstract representation of the stored resources;
Second-Layer (Service Layer): It immediately offers and manages cloud storage services;
Third-Layer (Storage Layer): It practicably realizes data storage on many physical devices

Figure 3: Index-hash hierarchy of CPDP model
Figure 3 shows index hash hierarchy of our model. This kind of architecture is a nature representation of the file
storage. We make use of this simple hierarchy to organize many CSP services, which involve private clouds or public clouds,
by shading the differences between these clouds. In this architecture, the resources in Express Layer are split and stored into
www.ijmer.com

2700 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701
ISSN: 2249-6645
3 CSPs in Service Layer. Each CSP fragments and stores the assigned data into the cloud storage servers in Storage Layer.
We follow the logical order of the data blocks to organize the cloud Storage Layer. Moreover, this proposed architecture
could provide some special functions for data storage and management.

IV.

CONCLUSION

In this paper, we proposed the scheme of optimal cooperative provable data possession and its distributed cloud
storage to support the qualities of the services provides. In this work, we consider and maintains the existence of multiple
cloud service providers to the cooperatively stores and it’s also maintain the clients data in safe and security. We presented
the scheme based on homomorphic verifiable response and hash index hierarchy. The security of our scheme is based on the
multi- prover zero-knowledge proof performance optimization mechanisms for our scheme. In particularly, increasing the
efficiency for our proposed scheme and minimize the system, which can satisfy completeness, knowledge soundness, and
zero-knowledge properties.

REFERENCES
[1]
[2]

[3]
[4]
[5]
[6]
[7]
[8]

B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, “Virtual infrastructure management in private and hybrid clouds,”
IEEE Internet Computing, vol. 13, no. 5, pp. 14–22, 2009.
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
C.C.Erway, A.Ku¨pc¸u¨, C.Papamanthou, and R.Tamassia, “Dynamic provable data possession,” in ACM Conference on Computer
and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scal- able and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.
H. Shacham and B. Waters, “Compact proofs of retrievabil- ity,” in ASIACRYPT, ser. Lecture Notes in Computer Science, J.
Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90–107.
H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int‟ l Conf. Theory and Application of Cryptology and
Information Security: Advances in Cryptology (ASIACRYPT ‟ 08), pp. 90-107, 2008.
W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
Real User Corporation: Passfaces. www.passfaces.com

www.ijmer.com

2701 | Page

Más contenido relacionado

La actualidad más candente

NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
Ninad Samel
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit process
Iaetsd Iaetsd
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
IJCNCJournal
 

La actualidad más candente (20)

BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
 
Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with Vortex
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex GatewayIoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex Gateway
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit process
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
 
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
 

Destacado

Fd2427822788
Fd2427822788Fd2427822788
Fd2427822788
IJMER
 
Ac32618621
Ac32618621Ac32618621
Ac32618621
IJMER
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
IJMER
 
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
Orientation Effects of Stress Concentrators on the Material  Deformation Beha...Orientation Effects of Stress Concentrators on the Material  Deformation Beha...
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
IJMER
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
IJMER
 
Ijmer 46050715
Ijmer 46050715Ijmer 46050715
Ijmer 46050715
IJMER
 
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
Pathogenic Bacteria in Corals from Veracruz Reef System  National Park Pathogenic Bacteria in Corals from Veracruz Reef System  National Park
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
IJMER
 
Ijmer 46063339
Ijmer 46063339Ijmer 46063339
Ijmer 46063339
IJMER
 

Destacado (20)

SISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsSISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systems
 
Vibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case StudyVibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case Study
 
Fatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactorFatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactor
 
Fd2427822788
Fd2427822788Fd2427822788
Fd2427822788
 
Ac32618621
Ac32618621Ac32618621
Ac32618621
 
On Some Integrals of Products of H -Functions
On Some Integrals of Products of  H -FunctionsOn Some Integrals of Products of  H -Functions
On Some Integrals of Products of H -Functions
 
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareImplementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
 
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
Probabilistic Modeling and Performance Analysis of A 2(K)-Out-Of-3(N) System ...
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar Energy
 
Pilot Assistive Safe Landing Site Detection System, an Experimentation Using...
Pilot Assistive Safe Landing Site Detection System, an  Experimentation Using...Pilot Assistive Safe Landing Site Detection System, an  Experimentation Using...
Pilot Assistive Safe Landing Site Detection System, an Experimentation Using...
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
 
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
Orientation Effects of Stress Concentrators on the Material  Deformation Beha...Orientation Effects of Stress Concentrators on the Material  Deformation Beha...
Orientation Effects of Stress Concentrators on the Material Deformation Beha...
 
Total Harmonic Distortion Alleviation by using Shunt Active Filter
Total Harmonic Distortion Alleviation by using Shunt Active FilterTotal Harmonic Distortion Alleviation by using Shunt Active Filter
Total Harmonic Distortion Alleviation by using Shunt Active Filter
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Ijmer 46050715
Ijmer 46050715Ijmer 46050715
Ijmer 46050715
 
Reliable Hydra SSD Architecture for General Purpose Controllers
Reliable Hydra SSD Architecture for General Purpose ControllersReliable Hydra SSD Architecture for General Purpose Controllers
Reliable Hydra SSD Architecture for General Purpose Controllers
 
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
Pathogenic Bacteria in Corals from Veracruz Reef System  National Park Pathogenic Bacteria in Corals from Veracruz Reef System  National Park
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
 
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adderAn efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
 
Ijmer 46063339
Ijmer 46063339Ijmer 46063339
Ijmer 46063339
 

Similar a An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud Storage

Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
 

Similar a An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud Storage (20)

E045026031
E045026031E045026031
E045026031
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
H1803035056
H1803035056H1803035056
H1803035056
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
V04405122126
V04405122126V04405122126
V04405122126
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 

Más de IJMER

Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 

Más de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud Storage

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701 ISSN: 2249-6645 An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud Storage Shaik Faizulla1, G. Sreedevi2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 ABSTRACT: In recent years, cloud storage services has become a faster growth and makes large profits by providing the services to the customer for their needs on the internet and data sharing. Cloud environment provides the services at low cost, scalable position independent platform for the storage of client’s data. Though it provides good services, cloud environment is based on the open architecture and with interfaces. It has capabilities to incorporate with multiple internal or external services together to provide the ability to exchange data’s and use information so that we call such a distributed cloud environments as a multi- cloud or hybrid cloud. Provable data possession (PDP) is a technique for ensuring the integrity of data in cloud environment. Provable data possession is such a probabilistic proof technique for a storage provider to prove the integrity and ownership of the clients’ data without downloading data. We present an optimal cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. Keywords: Cloud storage, Hash index, Hybrid cloud, PDP. I. INTRODUCTION Cloud computing environment is made on the basis of exposed designs and boundaries, it has the proficiency to integrate numerous interior or exterior cloud computing services together to offer great interoperability and such a dispersed cloud environment is known as a multi-Cloud [1]. By means of virtual infrastructure management a distributed permits clients to effortlessly access their resources distantly over boundaries. Cloud storage package has developed into a quicker profit progression point by providing low-cost, accessible, position self-determining stage for the customers’ records. It would fetch irreversible sufferers to the clients if a hybrid cloud storage platform is susceptible to safety attacks. The secured data in an enterprise may be illegitimately opened over a remote edge delivered by a distributed cloud and documentations may be mislaid with when they are deposited into an undefined storage group external to the enterprise [2] [3]. Several implements and skills were present for hybrid cloud which aid cloud providers to build a distributed cloud storage platform for handling customers’ statistics [4]. The proof checking without moving makes it particularly significant for very large- size files and folders to check whether these data have been interfered with or deleted without transferring the latest version of data. As a consequence, it is able to substitute outdated hash and signature functions in the storage outsourcing. It is necessary for cloud computing providers to offer safety practices for handling their storage facilities. Provable data possession (PDP) or proofs of retrievability is a probabilistic proof system for a storage provider to demonstrate the integrity and ownership of clients’ data without transferring data [5]. II. RELATED WORK In [6], the authors proposed the first proof-of-retrievability schemes with full proofs of security. Their first scheme, built from BLS signatures and secure in the random oracle model has the shortest query as well as response of any proof-ofretrievability with public verifiability. Their second scheme, which builds elegantly on the pseudorandom functions (PRFs) and is secure in the standard model, has shortest response of any proof-of-retrievability scheme with private verifiability but a longer query. In [4], the authors constructed a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography. Also, our data possession technique allows outsourcing of dynamic data, it efficiently supports operations, such as block modification, append and deletion. In [2], the authors introduced a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of data possession by sampling random sets of blocks from the server, which significantly reduces I/O costs. In [3], the authors constructed a dynamic provable data possession (DPDP), which extends the PDP model to support provable updates on the stored data. DPDP solution is based on a new variant of the authenticated dictionaries which use rank information to organize dictionary entries. Thus we can support efficient authenticated operations on the files at block level, such as authenticated insert and delete. They proved the security of their constructions using some standard assumptions. In [7], the authors proposed an innovative authentication scheme for mobile devices. While creating the password, the user chooses a theme of snapshots in thumbnail size and the sequence of those snapshots is fixed as a password. In [8], passface is an approach proposed by the Real User Corporation in which the user is allowed to choose four images of human faces from the face database as their password. During the verification step, the user is provided with a grid of nine faces, one already chosen during the registration and eight decoy faces. The user identifies the selected face and then clicks anywhere over it. www.ijmer.com 2698 | Page
  • 2. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701 ISSN: 2249-6645 III. PROPOSED WORK A. Verification Framework for Multi- Cloud In the proposed work, we consider a data storage service involving three different entities: Granted clients, who have a large amount of data to be stored in multi-clouds and have the permissions to access and manipulate the stored data; Cloud service providers (CSPs), who work together for providing data storage services and have enough storage space sand computation resources; and Trusted third parties (TTPs),who are trusted to store the verification parameters and offer the query services for these parameters. Figure 1 shows the architecture. Figure 1: Verification architecture for data integrity In this architecture, we consider the existence of many CSPs to collaboratively store and maintain the client‟ s data. Moreover, a cooperative PDP is used to verify the integrity and availability of the stored data in CSPs. The verification process is described as follows: Firstly, the client (data owner) uses the shared secret key to pre-process the file, which consists of a collection of n blocks. It generates a set of public verification information that is stored in TTP and then transmits the file and some verification tags to CSPs, and may delete its local copy. Later by using a verification protocol for cooperative PDP, the clients can issue a challenge for one CSP to check the integrity and the availability of outsourced data in terms of public verification information stored in TTP. B. Cooperative PDP Based on zero knowledge proof system and interactive proof system, the integrity of data stored in a multi cloud is maintained. A CPDP is a collection of two algorithms (Key Gen, Tag Gen) and the interactive proof system Proof.    Key Gen: It takes a security parameter as an input and then returns a secret key as output. Tag Gen: It takes a shared secret key, file and set of cloud storage providers as input and returns triples. Proof: It is a protocol of proof of provable data possession between the CSP's and verifier. Let H = { Hk } be a family of hash functions where Hk : {0,1}  {0,1} index, where k ɛ K. This algorithm has a benefit in breaking the collision resistance of hash H. In Collision-Resistance H, a hash family H(t, ɛ ) collision resistant if no tTime adversary has advantage atleast ɛ in breaking collision of H. First the KeyGen algorithm is run in this scheme to obtain the private or the public key for users. Then TagGen is generated by the clients for the cloud outsourced data. n k C. Homomorphic Verifiable Response A homomorphism is a map function f : p → q between two groups such that f(g1  g2) = f(g1)  f(g2) for all g1, g2  p, where  denotes the operation in p and  denotes the operation in q. This notation was used to define a j for two message mi and mj , anyone can combine www.ijmer.com 2699 | Page Homomorphic Verifiable Tags (HVTs) as : Given two values i and them into a value  ′ corresponding to the sum of the message mi+mj . When provable data possession is considered as a challenge response protocol, we also extend this notation to introduce the concept of a Homomorphic Verifiable Responses (HVRs), which is used to integrate multiple responses from the various CSPs in cooperative PDP scheme, as follows: A response is called homomorphic verifiable response in data possession protocol, if given two responses  i and  j for two challenges Qi and Qj from two CSPs, there exists an efficient algorithm to combine them into a response  corresponding to the sum of the challenges Qi uQj.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701 ISSN: 2249-6645 D. Fragment Structure of CPDP We propose a fragment structure of our data possession scheme based on the above-mentioned model as shown in Figure 2, which has following characters: 1) a file is split into n × s sectors and each block (s sectors) corresponds to a tag, so that the storage of the signature tags can be reduced with the order of s; 2) the verifier can check the integrity of a file by random sampling approach, which is a matter of the utmost importance for large or huge files; and 3) this structure relies on the homomorphic properties to aggregate the data and tags into a constant size response, which minimizes network communication overheads. The above structure, considered as a common representation for some of the existing schemes, can be converted to MAC-based, ECC or RSA schemes. By using BLS signatures and random oracle model, it is easy to design a practical data possession scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates some favorable conditions for the architecture of CSPs. Figure 2: The fragment structure of CPDP model E. Hash Index Hierarchy A representative architecture for data storage in distributed is illustrated as follows: this architecture is a hierarchical structure H on 3 layers to represent the relationships among all blocks for stored resources. Three layers are as follows:    First-Layer (Express Layer): It offers an abstract representation of the stored resources; Second-Layer (Service Layer): It immediately offers and manages cloud storage services; Third-Layer (Storage Layer): It practicably realizes data storage on many physical devices Figure 3: Index-hash hierarchy of CPDP model Figure 3 shows index hash hierarchy of our model. This kind of architecture is a nature representation of the file storage. We make use of this simple hierarchy to organize many CSP services, which involve private clouds or public clouds, by shading the differences between these clouds. In this architecture, the resources in Express Layer are split and stored into www.ijmer.com 2700 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2698-2701 ISSN: 2249-6645 3 CSPs in Service Layer. Each CSP fragments and stores the assigned data into the cloud storage servers in Storage Layer. We follow the logical order of the data blocks to organize the cloud Storage Layer. Moreover, this proposed architecture could provide some special functions for data storage and management. IV. CONCLUSION In this paper, we proposed the scheme of optimal cooperative provable data possession and its distributed cloud storage to support the qualities of the services provides. In this work, we consider and maintains the existence of multiple cloud service providers to the cooperatively stores and it’s also maintain the clients data in safe and security. We presented the scheme based on homomorphic verifiable response and hash index hierarchy. The security of our scheme is based on the multi- prover zero-knowledge proof performance optimization mechanisms for our scheme. In particularly, increasing the efficiency for our proposed scheme and minimize the system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, “Virtual infrastructure management in private and hybrid clouds,” IEEE Internet Computing, vol. 13, no. 5, pp. 14–22, 2009. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. C.C.Erway, A.Ku¨pc¸u¨, C.Papamanthou, and R.Tamassia, “Dynamic provable data possession,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scal- able and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10. H. Shacham and B. Waters, “Compact proofs of retrievabil- ity,” in ASIACRYPT, ser. Lecture Notes in Computer Science, J. Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90–107. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int‟ l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ‟ 08), pp. 90-107, 2008. W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004. Real User Corporation: Passfaces. www.passfaces.com www.ijmer.com 2701 | Page