SlideShare a Scribd company logo
1 of 12
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD
COMPUTING SYSTEMS
Abstract—Increasingly more and more organizations are opting for outsourcing
data to remote cloud service providers (CSPs). Customers can rent the CSPs
storage infrastructure to store and retrieve almost unlimited amount of data by
paying fees metered in gigabyte/month. For an increased level of scalability,
availability, and durability, some customers may want their data to be replicated on
multiple servers across multiple data centers. The more copies the CSP is asked to
store, the more fees the customers are charged. Therefore, customers need to have
a strong guarantee that the CSP is storing all data copies that are agreed upon in the
service contract, and all these copies are consistent with the most recent
modifications issued by the customers. In this paper, we propose a map-based
provable multicopy dynamic data possession (MB-PMDDP) scheme that has the
following features: 1) it provides an evidence to the customers that the CSP is not
cheating by storing fewer copies; 2) it supports outsourcing of dynamic data, i.e., it
supports block-level operations, such as block modification, insertion, deletion,
and append; and 3) it allows authorized users to seamlessly access the file copies
stored by the CSP. We give a comparative analysis of the proposed MB-PMDDP
scheme with a reference model obtained by extending existing provable possession
of dynamic single-copy schemes. The theoretical analysis is validated through
experimental results on a commercial cloud platform. In addition, we show the
security against colluding servers, and discuss how to identify corrupted copies by
slightly modifying the proposedscheme.
EXISTING SYSTEM:
One of the core design principles of outsourcing data is to provide dynamic
behavior of data for various pplications. This means that the remotely stored data
can be not only accessed by the authorized users, but also updated and scaled
(through block level operations) by the data owner. PDP schemes presented focus
on only static or warehoused data, where the outsourced data is kept unchanged
over remote servers. Examples of PDP constructions that deal with dynamic data
are. The latter are however for a single copy of the data file. Although PDP
schemes have been presented for multiple copies of static data, ,to the best of our
knowledge, this work is the first PDP scheme directly dealing with multiple copies
of dynamic data. In Appendix A, we provide a summary of related work. When
verifying multiple data copies, the overall system integrity check fails if there is
one or more corrupted copies. To address this issue and recognize which copies
have been corrupted, we discuss a slight modification to be applied to the proposed
scheme.
PROPOSED SYSTEM:
Our contributions can be summarized as follows:
• We propose a map-based provable multi-copy dynamic data possession (MB-
PMDDP) scheme. This scheme
provides an adequate guarantee that the CSP stores all copies that are agreed upon
in the service contract. Moreover, the scheme supports outsourcing of dynamic
data, i.e., it supports block-level operations such as block modification, insertion,
deletion, and append. The authorized users, who have the right to access the
owner’s file, can seamlessly access the copies received from the CSP.
• We give a thorough comparison of MB-PMDDP with a reference scheme, which
one can obtain by extending existing PDP models for dynamic single-copy data.
We also report our implementation and experiments using Amazon cloud platform.
• We show the security of our scheme against colluding servers, and discuss a
slight modification of the proposed cheme to identify corrupted copies Remark 1:
Proof of retrievability (POR) is a complementary approach to PDP, and is stronger
than PDP in the sense that the verifier can reconstruct the entire file from responses
that are reliably transmitted from the server. This is due to encoding of the data
file, for example using erasure codes, before outsourcing to remote servers.
Various POR schemes can be found in the literature, for example, which focus on
static data. In this work, we do not encode the data to be outsourced for the
following reasons. First, we are dealing with dynamic data, and hence if the data
file is encoded before outsourcing, modifying a portion of the file requires re-
encoding the data file which may not be acceptable in practical applications due to
high computation overhead. Second, we are considering economically-motivated
CSPs that may attempt to use less storage than required by the service contract
through deletion of a few copies of the file. The CSPs have almost no financial
benefit by deleting only a small portion of a copy of the file. Third, and more
importantly, unlike erasure codes, duplicating data files across multiple servers
achieves scalability which is a fundamental customer requirement in CC systems.
A file that is duplicated and stored strategically on multiple servers – located at
various geographic locations – can help reduce access time and communication
cost for users. Besides, a server’s copy can be reconstructed even from a complete
damage using duplicated copies on other servers.
Module 1
Cloud Computing
Cloud computing refers to both the applications delivered as services over the
Internet and the hardware and systems software in the datacenters that provide
those services. There are four basic cloud delivery models, as outlined by NIST
(Badger et al., 2011), based on who provides the cloud services. The agencies may
employ one model or a combination of different models for efficient and optimized
delivery of applications and business services. These four delivery models are: (i)
Private cloud in which cloud services are provided solely for an organization and
are managed by the organization or a third party. These services may exist off-site.
(ii) Public cloud in which cloud services are available to the public and owned by
an organization selling the cloud services, for example, Amazon cloud service. (iii)
Community cloud in which cloud services are shared by several organizations for
supporting a specific community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). These services may be
managed by the organizations or a third party and may exist offsite. A Special case
of Community cloud is The Government or G-Cloud. This type of cloud
computing is provided by one or more agencies (service provider role), for use by
all, or most, government agencies (user role). (iv) Hybrid cloud which is a
composition of different cloud computing infrastructure (public, private or
community). An example for hybrid cloud is the data stored in private cloud of a
travel agency that is manipulated by a program running in the public cloud.
Module 2
Data Replication
Database replication is the frequent electronic copying data from a database in one
computer or server to a database in another so that all users share the same level of
information. The result is a distributed database in which users can access data
relevant to their tasks without interfering with the work of others. The
implementation of database replication for the purpose of eliminating data
ambiguity or inconsistency among users is known as normalization. In data
replication across datacenters with the objective of reducing access delay is
proposed. The Optimal replication site is selected based on the access history of
the data. A weighted k-means clustering of user locations is used to determine
replica site location. The replica is deployed closer to the central part of each
cluster. A cost-based data replication in cloud datacenter is proposed. This
approach analyzes data storage failures and data loss probability that are in the
direct relationship and builds a reliability model. Then, replica creation time is
determined by solving reliability function.
Module 3
Overview and Rationale
Generating unique differentiable copies of the data file is the core to design a
provable multi-copy data possession scheme. Identical copies enable the CSP to
simply deceive the owner by storing only one copy and pretending that it stores
multiple copies. Using a simple yet efficient way, the proposed scheme generates
distinct copies utilizing the diffusion property of any secure encryption scheme.
The diffusion property ensures that the output bits of the ciphertext depend on the
input bits of the plaintext in a very complex way, i.e., there will be an
unpredictable complete change in the ciphertext, if there is a single bit change in
the plaintext. The interaction between the authorized users and the CSP is
considered through this methodology of generating distinct copies, where the
former can decrypt/access a file copy received from the CSP. In the proposed
scheme, the authorized users need only to keep a single secret key (shared with the
data owner) to decrypt the file copy, and it is not necessarily to recognize the index
of the received copy. In this work, we propose a MB-PMDDP scheme allowing the
data owner to update and scale the blocks of file copies outsourced to cloud servers
which may be untrusted. Validating such copies of dynamic data requires the
knowledge of the block versions to ensure that the data blocks in all copies are
consistent with the most recent modifications issued by the owner. Moreover, the
verifier should be aware of the block indices to guarantee that the CSP has inserted
or added the new blocks at the requested positions in all copies.
Module 4
Map-VersionTable
The map-version table (MVT) is a small dynamic data structure stored on the
verifier side to validate the integrity and consistency of all file copies outsourced to
the CSP. The MVT consists of three columns: serial number (SN), block number
(BN), and block version (BV). The SN is an indexing to the file blocks. It indicates
the physical position of a block in a data file. The BN is a counter used to make a
logical numbering/indexing to the file blocks. Thus, the relation between BN and
SN can be viewed as a mapping between the logical number BN and the physical
position SN. The BV indicates the current version of file blocks. When a data file is
initially created the BV of each block is 1. If a specific block is being updated, its
BV is incremented by 1. Remark 2: It is important to note that the verifier keeps
only one table for unlimited number of file copies, i.e., the storage requirement on
the verifier side does not depend on the number of file copies on cloud servers. For
n copies of a data file of size |F|, the storage requirement on the CSP side is
O(n|F|), while the verifier’s overhead is O(m) for all file copies (m is the number of
file blocks).
CONCLUSION:
Outsourcing data to remote servers has become a growing trend for many
organizations to alleviate the burden of local data storage and maintenance. In this
work we have studied the problem of creating multiple copies of dynamic data file
and verifying those copies stored on untrusted cloud servers. We have proposed a
new PDP scheme referred to as MB-PMDDP), which supports outsourcing of
multi-copy dynamic data, where the data owner is capable of not only archiving
and accessing the data copies stored by the CSP, but also updating and scaling
these copies on the remote servers. To the best of our knowledge, the proposed
scheme is the first to address multiple copies of dynamic data. The interaction
between the authorized users and the CSP is considered in our scheme, where the
authorized users can seamlessly access a data copy received from the CSP using a
single secret key shared with the data owner. Moreover, the proposed scheme
supports public verifiability, enables arbitrary number of auditing, and allows
possession-free verification where the verifier has the ability to verify the data
integrity even though he neither possesses nor retrieves the file blocks from the
server. Through performance analysis and experimental results, we have
demonstrated that the proposed MB-PMDDP scheme outperforms the TB-PMDDP
approach derived from a class of dynamic single-copy PDP models. The TB-
PMDDP leads to high storage overhead on the remote servers and high
computations on both the CSP and the verifier sides. The MB-PMDDP scheme
significantly reduces the computation time during the challenge-response phase
which makes it more practical for applications where a large number of verifiers
are connected to the CSP causing a huge computation overhead on the servers.
Besides, it has lower storage overhead on the CSP, and thus reduces the fees paid
by the cloud customers. The dynamic block operations of the map-based approach
are done with less communication cost than that of the tree-based approach. A
slight modification can be done on the proposed scheme to support the feature of
identifying the indices of corrupted copies. The corrupted data copy can be
reconstructed even from a complete damage using duplicated copies on other
servers. Through security analysis, we have shown that the proposed scheme is
provably secure.
REFERENCES
[1] G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th
ACM Conf. Comput. Commun. Secur. (CCS), New York, NY, USA, 2007, pp.
598–609.
[2] K. Zeng, “Publicly verifiable remote data integrity,” in Proc. 10th Int. Conf.
Inf. Commun. Secur. (ICICS), 2008, pp. 419–434.
[3] Y. Deswarte, J.-J. Quisquater, and A. Saïdane, “Remote integrity checking,” in
Proc. 6th Working Conf. Integr. Internal Control Inf. Syst. (IICIS), 2003, pp. 1–11.
[4] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating data possession and
uncheatable data transfer,” IACR (International Association for Cryptologic
Research) ePrint Archive, Tech. Rep. 2006/150, 2006.
[5] F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J.
Quisquater, “Efficient remote data possession checking in critical information
infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038,
Aug. 2008.
[6] P. Golle, S. Jarecki, and I. Mironov, “Cryptographic primitives enforcing
communication and storage complexity,” in Proc. 6th Int. Conf. Financial
Cryptograph. (FC), Berlin, Germany, 2003, pp. 120–135.
[7] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep
online storage services honest,” in Proc. 11th USENIX Workshop Hot Topics Oper.
Syst. (HOTOS), Berkeley, CA, USA, 2007, pp. 1–6.
[8] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and
extraction of digital contents,” IACR Cryptology ePrint Archive, Tech. Rep.
2008/186, 2008.
[9] E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in
outsourced databases,” ACM Trans. Storage, vol. 2, no. 2, pp. 107–138, 2006.
[10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and
efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy
Commun. Netw. (SecureComm), New York, NY, USA, 2008, Art. ID 9.
[11] C. Wang, Q. Wang, K. Ren, and W. Lou. (2009). “Ensuring data storage
security in cloud computing,” IACR Cryptology ePrint Archive, Tech. Rep.
2009/081. [Online]. Available: http://eprint.iacr.org/

More Related Content

What's hot

IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeYogeshIJTSRD
 
Charm a cost efficient multi cloud data hosting scheme with high availability
Charm a cost efficient multi cloud data hosting scheme with high availabilityCharm a cost efficient multi cloud data hosting scheme with high availability
Charm a cost efficient multi cloud data hosting scheme with high availabilityKamal Spring
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...INFOGAIN PUBLICATION
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...ijcseit
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networkingJohn Berkmans
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
 
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET Journal
 
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction Systemchennaijp
 
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Editor IJCATR
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesEswar Publications
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GEricsson
 

What's hot (18)

[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
E0332427
E0332427E0332427
E0332427
 
Charm a cost efficient multi cloud data hosting scheme with high availability
Charm a cost efficient multi cloud data hosting scheme with high availabilityCharm a cost efficient multi cloud data hosting scheme with high availability
Charm a cost efficient multi cloud data hosting scheme with high availability
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
 
I0935053
I0935053I0935053
I0935053
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
 
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting FilesIRJET -  	  Torcloud - An Energy-Efficient Public Cloud for Imparting Files
IRJET - Torcloud - An Energy-Efficient Public Cloud for Imparting Files
 
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-C...
 
17 51-1-pb
17 51-1-pb17 51-1-pb
17 51-1-pb
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment Services
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Conference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5GConference Paper: Towards High Performance Packet Processing for 5G
Conference Paper: Towards High Performance Packet Processing for 5G
 

Viewers also liked

Dstu b v.2 7-44-96 zmina
Dstu b v.2 7-44-96 zminaDstu b v.2 7-44-96 zmina
Dstu b v.2 7-44-96 zminabraga william
 
The 7th China International Hair expo
The 7th China International Hair expoThe 7th China International Hair expo
The 7th China International Hair exposunny zhang
 
Recipes on citrus lemon fruit
Recipes on citrus lemon fruitRecipes on citrus lemon fruit
Recipes on citrus lemon fruitlee shin
 
The Legacy Plan - Cunningham Dance Foundation
The Legacy Plan - Cunningham Dance FoundationThe Legacy Plan - Cunningham Dance Foundation
The Legacy Plan - Cunningham Dance FoundationKit Baker
 
Things to check in the translated document before the submission
Things to check in the translated document before the submissionThings to check in the translated document before the submission
Things to check in the translated document before the submissionlee shin
 
resume burt for Saudi pdf
resume burt for Saudi pdfresume burt for Saudi pdf
resume burt for Saudi pdfBurt Bat-og
 
Home run: strategies & tactics to maximize your selling price
Home run:  strategies & tactics to maximize your selling priceHome run:  strategies & tactics to maximize your selling price
Home run: strategies & tactics to maximize your selling priceBuyAndSellABusiness.com
 
Maintaining confidentiality during a competitive sale process
Maintaining confidentiality during a competitive sale processMaintaining confidentiality during a competitive sale process
Maintaining confidentiality during a competitive sale processBuyAndSellABusiness.com
 
Title card planning
Title card planningTitle card planning
Title card planningDIDI1998sdf
 
05. Франция и Италия
05. Франция и Италия05. Франция и Италия
05. Франция и ИталияAnastasiyaF
 
LA COGNOTECNOLOGIA
LA COGNOTECNOLOGIALA COGNOTECNOLOGIA
LA COGNOTECNOLOGIAauridis
 
Undang-Undang No.14 Tentang Keterbukaan Informasi Publik
Undang-Undang No.14 Tentang Keterbukaan Informasi PublikUndang-Undang No.14 Tentang Keterbukaan Informasi Publik
Undang-Undang No.14 Tentang Keterbukaan Informasi PublikMuhammad Sirajuddin
 
RESULTS SUMMARY
RESULTS SUMMARYRESULTS SUMMARY
RESULTS SUMMARYBekki Tagg
 

Viewers also liked (15)

Pedoman Upacara Harkitnas 2016
Pedoman Upacara Harkitnas 2016Pedoman Upacara Harkitnas 2016
Pedoman Upacara Harkitnas 2016
 
Dstu b v.2 7-44-96 zmina
Dstu b v.2 7-44-96 zminaDstu b v.2 7-44-96 zmina
Dstu b v.2 7-44-96 zmina
 
The 7th China International Hair expo
The 7th China International Hair expoThe 7th China International Hair expo
The 7th China International Hair expo
 
Recipes on citrus lemon fruit
Recipes on citrus lemon fruitRecipes on citrus lemon fruit
Recipes on citrus lemon fruit
 
The Legacy Plan - Cunningham Dance Foundation
The Legacy Plan - Cunningham Dance FoundationThe Legacy Plan - Cunningham Dance Foundation
The Legacy Plan - Cunningham Dance Foundation
 
LarekRes_0521
LarekRes_0521LarekRes_0521
LarekRes_0521
 
Things to check in the translated document before the submission
Things to check in the translated document before the submissionThings to check in the translated document before the submission
Things to check in the translated document before the submission
 
resume burt for Saudi pdf
resume burt for Saudi pdfresume burt for Saudi pdf
resume burt for Saudi pdf
 
Home run: strategies & tactics to maximize your selling price
Home run:  strategies & tactics to maximize your selling priceHome run:  strategies & tactics to maximize your selling price
Home run: strategies & tactics to maximize your selling price
 
Maintaining confidentiality during a competitive sale process
Maintaining confidentiality during a competitive sale processMaintaining confidentiality during a competitive sale process
Maintaining confidentiality during a competitive sale process
 
Title card planning
Title card planningTitle card planning
Title card planning
 
05. Франция и Италия
05. Франция и Италия05. Франция и Италия
05. Франция и Италия
 
LA COGNOTECNOLOGIA
LA COGNOTECNOLOGIALA COGNOTECNOLOGIA
LA COGNOTECNOLOGIA
 
Undang-Undang No.14 Tentang Keterbukaan Informasi Publik
Undang-Undang No.14 Tentang Keterbukaan Informasi PublikUndang-Undang No.14 Tentang Keterbukaan Informasi Publik
Undang-Undang No.14 Tentang Keterbukaan Informasi Publik
 
RESULTS SUMMARY
RESULTS SUMMARYRESULTS SUMMARY
RESULTS SUMMARY
 

Similar to Provable multicopy dynamic data possession

Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsPvrtechnologies Nellore
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsNagamalleswararao Tadikonda
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSIRJET Journal
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET Journal
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
Dynamic Resource Provisioning with Authentication in Distributed Database
Dynamic Resource Provisioning with Authentication in Distributed DatabaseDynamic Resource Provisioning with Authentication in Distributed Database
Dynamic Resource Provisioning with Authentication in Distributed DatabaseEditor IJCATR
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
 

Similar to Provable multicopy dynamic data possession (20)

Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
Aw4103303306
Aw4103303306Aw4103303306
Aw4103303306
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Dynamic Resource Provisioning with Authentication in Distributed Database
Dynamic Resource Provisioning with Authentication in Distributed DatabaseDynamic Resource Provisioning with Authentication in Distributed Database
Dynamic Resource Provisioning with Authentication in Distributed Database
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
H017144148
H017144148H017144148
H017144148
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
 
Toward secure and dependable
Toward secure and dependableToward secure and dependable
Toward secure and dependable
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Provable multicopy dynamic data possession

  • 1. PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS Abstract—Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount of data by paying fees metered in gigabyte/month. For an increased level of scalability, availability, and durability, some customers may want their data to be replicated on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more fees the customers are charged. Therefore, customers need to have a strong guarantee that the CSP is storing all data copies that are agreed upon in the service contract, and all these copies are consistent with the most recent modifications issued by the customers. In this paper, we propose a map-based provable multicopy dynamic data possession (MB-PMDDP) scheme that has the following features: 1) it provides an evidence to the customers that the CSP is not cheating by storing fewer copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level operations, such as block modification, insertion, deletion, and append; and 3) it allows authorized users to seamlessly access the file copies stored by the CSP. We give a comparative analysis of the proposed MB-PMDDP scheme with a reference model obtained by extending existing provable possession
  • 2. of dynamic single-copy schemes. The theoretical analysis is validated through experimental results on a commercial cloud platform. In addition, we show the security against colluding servers, and discuss how to identify corrupted copies by slightly modifying the proposedscheme. EXISTING SYSTEM: One of the core design principles of outsourcing data is to provide dynamic behavior of data for various pplications. This means that the remotely stored data can be not only accessed by the authorized users, but also updated and scaled (through block level operations) by the data owner. PDP schemes presented focus on only static or warehoused data, where the outsourced data is kept unchanged over remote servers. Examples of PDP constructions that deal with dynamic data are. The latter are however for a single copy of the data file. Although PDP schemes have been presented for multiple copies of static data, ,to the best of our knowledge, this work is the first PDP scheme directly dealing with multiple copies of dynamic data. In Appendix A, we provide a summary of related work. When verifying multiple data copies, the overall system integrity check fails if there is one or more corrupted copies. To address this issue and recognize which copies
  • 3. have been corrupted, we discuss a slight modification to be applied to the proposed scheme. PROPOSED SYSTEM: Our contributions can be summarized as follows: • We propose a map-based provable multi-copy dynamic data possession (MB- PMDDP) scheme. This scheme provides an adequate guarantee that the CSP stores all copies that are agreed upon in the service contract. Moreover, the scheme supports outsourcing of dynamic data, i.e., it supports block-level operations such as block modification, insertion, deletion, and append. The authorized users, who have the right to access the owner’s file, can seamlessly access the copies received from the CSP. • We give a thorough comparison of MB-PMDDP with a reference scheme, which one can obtain by extending existing PDP models for dynamic single-copy data. We also report our implementation and experiments using Amazon cloud platform. • We show the security of our scheme against colluding servers, and discuss a slight modification of the proposed cheme to identify corrupted copies Remark 1: Proof of retrievability (POR) is a complementary approach to PDP, and is stronger than PDP in the sense that the verifier can reconstruct the entire file from responses that are reliably transmitted from the server. This is due to encoding of the data
  • 4. file, for example using erasure codes, before outsourcing to remote servers. Various POR schemes can be found in the literature, for example, which focus on static data. In this work, we do not encode the data to be outsourced for the following reasons. First, we are dealing with dynamic data, and hence if the data file is encoded before outsourcing, modifying a portion of the file requires re- encoding the data file which may not be acceptable in practical applications due to high computation overhead. Second, we are considering economically-motivated CSPs that may attempt to use less storage than required by the service contract through deletion of a few copies of the file. The CSPs have almost no financial benefit by deleting only a small portion of a copy of the file. Third, and more importantly, unlike erasure codes, duplicating data files across multiple servers achieves scalability which is a fundamental customer requirement in CC systems. A file that is duplicated and stored strategically on multiple servers – located at various geographic locations – can help reduce access time and communication cost for users. Besides, a server’s copy can be reconstructed even from a complete damage using duplicated copies on other servers. Module 1 Cloud Computing
  • 5. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. There are four basic cloud delivery models, as outlined by NIST (Badger et al., 2011), based on who provides the cloud services. The agencies may employ one model or a combination of different models for efficient and optimized delivery of applications and business services. These four delivery models are: (i) Private cloud in which cloud services are provided solely for an organization and are managed by the organization or a third party. These services may exist off-site. (ii) Public cloud in which cloud services are available to the public and owned by an organization selling the cloud services, for example, Amazon cloud service. (iii) Community cloud in which cloud services are shared by several organizations for supporting a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). These services may be managed by the organizations or a third party and may exist offsite. A Special case of Community cloud is The Government or G-Cloud. This type of cloud computing is provided by one or more agencies (service provider role), for use by all, or most, government agencies (user role). (iv) Hybrid cloud which is a composition of different cloud computing infrastructure (public, private or community). An example for hybrid cloud is the data stored in private cloud of a travel agency that is manipulated by a program running in the public cloud.
  • 6. Module 2 Data Replication Database replication is the frequent electronic copying data from a database in one computer or server to a database in another so that all users share the same level of information. The result is a distributed database in which users can access data relevant to their tasks without interfering with the work of others. The implementation of database replication for the purpose of eliminating data ambiguity or inconsistency among users is known as normalization. In data replication across datacenters with the objective of reducing access delay is proposed. The Optimal replication site is selected based on the access history of the data. A weighted k-means clustering of user locations is used to determine replica site location. The replica is deployed closer to the central part of each cluster. A cost-based data replication in cloud datacenter is proposed. This approach analyzes data storage failures and data loss probability that are in the direct relationship and builds a reliability model. Then, replica creation time is determined by solving reliability function. Module 3
  • 7. Overview and Rationale Generating unique differentiable copies of the data file is the core to design a provable multi-copy data possession scheme. Identical copies enable the CSP to simply deceive the owner by storing only one copy and pretending that it stores multiple copies. Using a simple yet efficient way, the proposed scheme generates distinct copies utilizing the diffusion property of any secure encryption scheme. The diffusion property ensures that the output bits of the ciphertext depend on the input bits of the plaintext in a very complex way, i.e., there will be an unpredictable complete change in the ciphertext, if there is a single bit change in the plaintext. The interaction between the authorized users and the CSP is considered through this methodology of generating distinct copies, where the former can decrypt/access a file copy received from the CSP. In the proposed scheme, the authorized users need only to keep a single secret key (shared with the data owner) to decrypt the file copy, and it is not necessarily to recognize the index of the received copy. In this work, we propose a MB-PMDDP scheme allowing the data owner to update and scale the blocks of file copies outsourced to cloud servers which may be untrusted. Validating such copies of dynamic data requires the knowledge of the block versions to ensure that the data blocks in all copies are
  • 8. consistent with the most recent modifications issued by the owner. Moreover, the verifier should be aware of the block indices to guarantee that the CSP has inserted or added the new blocks at the requested positions in all copies. Module 4 Map-VersionTable The map-version table (MVT) is a small dynamic data structure stored on the verifier side to validate the integrity and consistency of all file copies outsourced to the CSP. The MVT consists of three columns: serial number (SN), block number (BN), and block version (BV). The SN is an indexing to the file blocks. It indicates the physical position of a block in a data file. The BN is a counter used to make a logical numbering/indexing to the file blocks. Thus, the relation between BN and SN can be viewed as a mapping between the logical number BN and the physical position SN. The BV indicates the current version of file blocks. When a data file is initially created the BV of each block is 1. If a specific block is being updated, its BV is incremented by 1. Remark 2: It is important to note that the verifier keeps only one table for unlimited number of file copies, i.e., the storage requirement on
  • 9. the verifier side does not depend on the number of file copies on cloud servers. For n copies of a data file of size |F|, the storage requirement on the CSP side is O(n|F|), while the verifier’s overhead is O(m) for all file copies (m is the number of file blocks). CONCLUSION: Outsourcing data to remote servers has become a growing trend for many organizations to alleviate the burden of local data storage and maintenance. In this work we have studied the problem of creating multiple copies of dynamic data file and verifying those copies stored on untrusted cloud servers. We have proposed a new PDP scheme referred to as MB-PMDDP), which supports outsourcing of multi-copy dynamic data, where the data owner is capable of not only archiving and accessing the data copies stored by the CSP, but also updating and scaling these copies on the remote servers. To the best of our knowledge, the proposed scheme is the first to address multiple copies of dynamic data. The interaction between the authorized users and the CSP is considered in our scheme, where the authorized users can seamlessly access a data copy received from the CSP using a single secret key shared with the data owner. Moreover, the proposed scheme supports public verifiability, enables arbitrary number of auditing, and allows possession-free verification where the verifier has the ability to verify the data
  • 10. integrity even though he neither possesses nor retrieves the file blocks from the server. Through performance analysis and experimental results, we have demonstrated that the proposed MB-PMDDP scheme outperforms the TB-PMDDP approach derived from a class of dynamic single-copy PDP models. The TB- PMDDP leads to high storage overhead on the remote servers and high computations on both the CSP and the verifier sides. The MB-PMDDP scheme significantly reduces the computation time during the challenge-response phase which makes it more practical for applications where a large number of verifiers are connected to the CSP causing a huge computation overhead on the servers. Besides, it has lower storage overhead on the CSP, and thus reduces the fees paid by the cloud customers. The dynamic block operations of the map-based approach are done with less communication cost than that of the tree-based approach. A slight modification can be done on the proposed scheme to support the feature of identifying the indices of corrupted copies. The corrupted data copy can be reconstructed even from a complete damage using duplicated copies on other servers. Through security analysis, we have shown that the proposed scheme is provably secure. REFERENCES
  • 11. [1] G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY, USA, 2007, pp. 598–609. [2] K. Zeng, “Publicly verifiable remote data integrity,” in Proc. 10th Int. Conf. Inf. Commun. Secur. (ICICS), 2008, pp. 419–434. [3] Y. Deswarte, J.-J. Quisquater, and A. Saïdane, “Remote integrity checking,” in Proc. 6th Working Conf. Integr. Internal Control Inf. Syst. (IICIS), 2003, pp. 1–11. [4] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” IACR (International Association for Cryptologic Research) ePrint Archive, Tech. Rep. 2006/150, 2006. [5] F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, Aug. 2008. [6] P. Golle, S. Jarecki, and I. Mironov, “Cryptographic primitives enforcing communication and storage complexity,” in Proc. 6th Int. Conf. Financial Cryptograph. (FC), Berlin, Germany, 2003, pp. 120–135. [7] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proc. 11th USENIX Workshop Hot Topics Oper. Syst. (HOTOS), Berkeley, CA, USA, 2007, pp. 1–6.
  • 12. [8] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents,” IACR Cryptology ePrint Archive, Tech. Rep. 2008/186, 2008. [9] E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” ACM Trans. Storage, vol. 2, no. 2, pp. 107–138, 2006. [10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw. (SecureComm), New York, NY, USA, 2008, Art. ID 9. [11] C. Wang, Q. Wang, K. Ren, and W. Lou. (2009). “Ensuring data storage security in cloud computing,” IACR Cryptology ePrint Archive, Tech. Rep. 2009/081. [Online]. Available: http://eprint.iacr.org/