International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 9 - Apr 2014 An Empirical Model of Data Integrity in Multi Cloud Data Storage T.Ravi Kiran1, G.Roshini2, K.Swetha Harshini3, G.Aparna Gayathri4 Assistant Professor1,B.Tech Scholar2,3,4 Dept of CSE, VITS College of Engineering, Sontyam, Visakhapatnam, Andhra Pradesh Abstract: In present cloud storage services integrity became major problem. For these traditional researchers implemented so many approaches, but still its facing major problem of security and data owners storing data in multiple clouds. We implemented the security of our scheme based on zeroknowledge proof system and which can satisfy completeness and knowledge soundness and zeroknowledge properties. The performance optimization mechanisms for our scheme and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. I. INTRODUCTION In present days the concept of third-party data warehousing and more generally the data outsourcing has becomequite popular. Outsourcing of data essentially means that the data owner that client moves its data to a third-party provider that means trusted server which is supposed to presumablyfor a fee faithfully store the data and make it available to the owner and perhaps others on demand.Appealing features of outsourcing include reducedcosts from savings in storage, maintenance andpersonnel as well as increased availability and transparentup-keep of data. A number of security-related research issues in dataoutsourcing have been studied in the past decade. Previous researches concentrated on data authentication and integrity and how to efficiently and securely ensure that theserver returns correct and complete results in response to its clients and their queries. Later research focusedon outsourcing encrypted data which is placing even less trust in the server and associated difficult problems mainlyhaving to do with efficient querying over encrypted domain. More recently, however, the problem of Provable Data Possession (PDP) –is also sometimes referred to as Proof of Data Retrieval (POR) has popped upin the research literature. The central goal in PDP isto allow a client to efficiently and frequently and securelyverify that a server who purportedly stores client’s potentiallyvery large amount of datais not cheating the client. In this situation cheating means that the servermight delete some of the data ISSN: 2231-5381 or it might not store alldata in fast storageplace it on CDs or other tertiaryoff-line media. It is important to note that a storage server might not be malicious instead and it might be simplyunreliable and lose or inadvertently corrupt hosteddata. An effective PDP technique must be equally applicableto malicious and unreliable servers. The problemis further complicated by the fact that the client mightbe a small device withlimited CPU, battery power and communication facilities. The need to minimize bandwidth and localcomputation overhead for the client in performing every verification. Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the software as a service computing architecture, are transforming data centres into pools of computing service on a huge scale. Mean-while, the increasing network bandwidth and reliable yet flexible network connections make it even possible that clients can now subscribe high quality services from data and software that reside solely on remote data centres. Although envisioned as a promising service platform for the Internet, this new data storage paradigm in “Cloud” brings about many challenging design issues which have profound influence on the security and performance of the overall system. One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. For example, the storage service provider, which experiences Byzantine failures occasionally, may decide to hide the data errors from the clients for the benefit of their own. What is more serious is that for saving money and storage space the service provider might neglect to keep or deliberately delete rarely accessed data files which belong to an ordinary client. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical integrity verifications without the local copy of data files. http://www.ijettjournal.org Page 466 International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 9 - Apr 2014 II. RELATED WORK infrastructures to meet the needs of diverse partners and customers. The research has demonstrated scheme such as Interactive Protocol for Mobile Networks (IPMN) which can offer completely edge intelligence based mobility with faster hand-off, low delay, and low jitter. Not only can interactive proof systems solve problems not believed to be in NP, but under assumptions about the existence of one-way functions, a prover can convince the verifier of the solution without ever giving the verifier information about the solution. This is important when the verifier cannot be trusted with the full solution. At first it seems impossible that the verifier could be convinced that there is a solution when the verifier has not seen a certificate, but such proofs, known as zeroknowledge proofs are in fact believed to exist for all problems in NP and are valuable in cryptography. While the designers of IP considered generalizations interactive proof systems, others considered restrictions. A very useful interactive proof system is PCP(f(n), g(n)), which is a restriction of MA where Arthur can only use f(n) random bits and can only examine g(n) bits of the proof certificate sent by Merlin (essentially using random access). There are a number of easy-to-prove results about various PCP classes. PCP(0,poly), the class of polynomialtime machines with no randomness but access to a certificate, is just NP. PCP(poly,0), the class of polynomial-time machines with access to polynomially many random bits is co-RP. first major result was that PCP(log, log) = NP; put another way, if the verifier in the NP protocol is constrained to choose only O(log n) bits of the proof certificate to look at, this won't make any difference as long as it has O(log n) random bits to use. Furthermore, the PCP theorem asserts that the number of proof accesses can be brought all the way down to a constant. That is, NP = PCP(log, O(1)).They used this valuable characterization of NP to prove that approximation algorithms do not exist for the optimization versions of certain NP-complete problems unless P = NP. Such problems are now studied in the field known as hardness of approximation. Multi-cloud strategy is the concomitant use of two or more cloud services to minimize the risk of widespread data loss or downtime due to a localized component failure in a cloud computing environment. Such a failure can occur in hardware, software, or infrastructure. A multi-cloud strategy can also improve overall enterprise performance by avoiding "vendor lock-in" and using different ISSN: 2231-5381 Reasons for an adverse cloud event can vary from a single cable connector failure to an EMP (electromagnetic pulse), or from a natural disaster to an act of cyber-war-fare. Even the failure of a single hard disk/drive unit can result in a large-scale network outage if the malfunction takes place at a critical point in the system such as a host computer. As customer bases and device types grow increasingly diverse (yet at the same time increasingly specialized), organizations face a complex array of challenges in their quest to satisfy the demands of all end users. In particular, the speed with which a given Website loads has a huge impact on customer satisfaction. Recent research has revealed that the average user expects a Webpage to load just as fast on a mobile device as it would on their home computer (two seconds or less). Because faster page loading results in more frequent and longer visits to a given Website, page loading time can indirectly affect rankings in search engines. A multi-cloud strategy can help an organization to minimize page loading times for all types of content. A multi-cloud approach can offer not only the hardware, software and infrastructure redundancy necessary to optimize fault tolerance, but it can also steer traffic from different customer bases or partners through the fastest possible parts of the network. Some clouds are better suited than others for a particular task. For example, a certain cloud might handle large numbers of requests per unit time requiring small data transfers on the average, but a different cloud might perform better for smaller numbers of requests per unit time involving large data transfers on the average. Some organizations use a public cloud to make resources available to consumers over the Internet and a private cloud to provide hosted services to a limited number of people behind a firewall. A third type of cloud, called a hybrid cloud, may also be used to manage miscellaneous internal and external services. III. PROPOSED WORK Zero Knowledge Proof method: An archetypical \cryptographic" problem consists of providing mutually distrustful parties with a means of \exchanging" (predetermined) \pieces of information". The setting consists of several parties, each wishing to obtain some predetermined partial information concerning the secrets of the other parties. Yet each party wishes to reveal http://www.ijettjournal.org Page 467 International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 9 - Apr 2014 as little information as possible about its own secret. To clarify the issue, let us consider a specific example. Suppose that all users in a system keep backups of their entire system, encrypted using their public-key encryption, in a publicly accessible storage media. Suppose that at some point, one user, called Alice, wishes to reveal to another user, called Bob, the clear text of one of her files (which appears in one f her backups). A trivial \solution" is for Alice just to send the (clear text) file to Bob. The problem with this \solution" is that Bob has no way of verifying that Alice really sent him a file from her public backup, rather than just sending him an arbitrary le. Alice can simply prove that she sends the correct file by revealing to Bob her private encryption key. However, doing so, will reveal toBob the contents of all her files, which is certainly something that Alice doesnot want to happen. The question is whether Alice can convince Bob that sheindeed revealed the correct le without yielding any additional knowledge". An analogous question can be phrased formally as follows. Let f be a one-waypermutation, and b a hard-core predicate with respect to f. Suppose that oneparty, A, has a string x, whereas another party, denoted B, only has f(x).Furthermore, suppose that A wishes to reveal b(x) to party B, without yieldingany further information. The trivial \solution" is to let A send b(x) to B, but,as explained above, B will have no way of verifying whether A has really sentthe correct bit (and not its complement). Party A can indeed prove that it sendsthe correct bit (i.e., b(x)) by sending x as well, but revealing x to B is muchmore than what A had originally in mind. Again, the question is whether A canconvince B that it indeed revealed the correct bit (i.e., b(x)) without yieldingany additional \knowledge". In general, the question is whether it is possible to prove a statement without yieldinganything beyond its validity. Such proofs, whenever they exist, are called zeroknowledge,and play a central role (as we shall see in the subsequent chapter) in the construction of\cryptographic" protocols. An archetypical \cryptographic" problem consists of providing mutually distrustful parties with a means of \exchanging" (predetermined) \pieces of information". The setting consists of several parties, each wishing to obtain some predetermined partial information concerning the secrets of the other parties. Yet each party wishes to reveal as little information as possible about its own secret. To clarify the issue, let us consider a specific example. ISSN: 2231-5381 Suppose that all users in a system keep backups of their entire file system, encrypted using their public-key encryption, in a publicly accessible storage media. Suppose that at some point, one user, called Alice, wishes to reveal to another user, called Bob, the clear text of one of her les (which appears in one of her backups). A trivial \solution" is for Alice just to send the (clear text) le to Bob. The problem with this \solution" is that Bob has no way of verifying that Alice really sent him a le from her public backup, rather than just sending him an arbitrary file. Alice can simply prove that she sends the correct file by revealing to Bob her private encryption key. However, doing so, will reveal to Bob the contents of all her les, which is certainly something that Alice does not want to happen. The question is whether Alice can convince Bob that she indeed revealed the correct file without yielding any additional \knowledge". An analogous question can be phrased formally as follows. Let f be a one-waypermutation, and b a hard-core predicate with respect to f. Suppose that oneparty, A, has a string x, whereas another party, denoted B, only has f(x).Furthermore, suppose that A wishes to reveal b(x) to party B, without yieldingany further information. The trivial \solution" is to let A send b(x) to B, but,as explained above, B will have no way of verifying whether A has really sentthe correct bit (and not its complement). Party A can indeed prove that it sendsthe correct bit (i.e., b(x)) by sending x as well, but revealing x to B is muchmore than what A had originally in mind. Again, the question is whether A canconvince B that it indeed revealed the correct bit (i.e., b(x)) without yieldingany additional \knowledge". In general, the question is whether it is possible to prove a statement without yieldinganything beyond its validity. Such proofs, whenever they exist, are called zeroknowledge,and play a central role in the construction of\cryptographic" protocols. Prover and Verifier The notion of a prover is implicit in all discussions of proofs, be it in mathematics or inreal-life situations. Instead, the emphasis is placed on the verification process, or in otherwords on (the role of ) the verifier. Both in mathematics and in real-life situations, proofsare defined in terms of the verification procedure. Typically, the verification procedure isconsidered to be relatively simple, and the burden is placed on the party/person supplyingthe proof (i.e., the prover). http://www.ijettjournal.org Page 468 International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 9 - Apr 2014 Prover and VerifierThe notion of a prover is implicit in all discussions of proofs, be it in mathematics or inreal-life situations. Instead, the emphasis is placed on the verification process, or in otherwords on (the role of ) the verifier. Both in mathematics and in real-life situations, proofsare defined in terms of the verification procedure. Typically, the verification procedure isconsidered to be relatively simple, and the burden is placed on the party/person supplyingthe proof (i.e., the prover). Completeness and Validity Two fundamental properties of a proof system (i.e., a verification procedure) are its validityand completeness. The validity property asserts that the verification procedure cannot be\tricked" into accepting false statements. In other words, validity captures the verifierability of protecting itself from being convinced of false statements (no matter what theprover does in order to fool it). On the other hand, completeness captures the ability ofsome prover to convince the verifier of true statements (belonging to some predeterminedset of true statements). Note that both properties are essential to the very notion of a proofsystem. IV. CONCLUSION In this paper, we presented the construction of an efficient PDP scheme for distributed cloud storage. Based on homomorphism verifiable response and hash index hierarchy, we have proposed a cooperative PDP scheme to support dynamic scalability on multiple storage servers. We also showed that our scheme provided all security properties required by zeroknowledge interactive proof system, so that it can resist various attacks even if it is deployed as a public audit service in clouds. Furthermore, we optimized the probabilistic query and periodic verification to improve the audit performance. Our experiments clearly demonstrated that our approaches only introduce a small amount of computation and communication overheads. Therefore, our solution can be treated as a new candidate for data integrity verification in outsourcing data storage systems. [4] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalableand efficient provable data possession,” in Proceedingsof the 4th international conference on Security and privacy incommunication netowrks, SecureComm, 2008, pp. 1–10. [5] C. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia,“Dynamic provable data possession,” in ACM Conference onComputer and Communications Security, E. Al-Shaer, S. Jha, andA. D. Keromytis, Eds. ACM, 2009, pp. 213–222. [6] H. Shacham and B. Waters, “Compact proofs of retrievability,”in ASIACRYPT, ser. Lecture Notes in Computer Science,J. Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90–107. [7] Q. Wang, C.Wang, J. Li, K. Ren, and W. Lou, “Enabling publicverifiability and data dynamics for storage security in cloudcomputing,” in ESORICS, ser. Lecture Notes in ComputerScience, M. Backes and P. Ning, Eds., vol. 5789. Springer,2009, pp. 355–370. [8] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamicaudit services for integrity verification of outsourcedstorages in clouds,” in SAC, W. C. Chu, W. E. Wong, M. J.Palakal, and C.-C. Hung, Eds. ACM, 2011, pp. 1550–1557. [9] K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availabilityand integrity layer for cloud storage,” in ACM Conference onComputer and Communications Security, E. Al-Shaer, S. Jha, andA. D. Keromytis, Eds. ACM, 2009, pp. 187–198. [10] Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievabilityvia hardness amplification,” in TCC, ser. Lecture Notes inComputer Science, O. Reingold, Ed., vol. 5444. Springer, 2009,pp. 109–127. BIOGRAPHIES T.Ravi Kiran is an Assistant Professor in the Department of Computer Science & Engineering, VITS College of Engineering, Sontyam, Visakhapatnam, Andhra Pradesh. He has 5 years of experience in Teaching. His research interests include Cloud Computing, Web Technologies, Information Security, Data Mining, Search Engines, Information Retrieval, Network Security, Database Systems, Data Privacy, Image Processing, Computer Networks. G.Roshini is currently pursuing B.Tech. degree in Computer Science & Engineering, VITS College of Engineering, Sontyam, Visakhapatnam, Andhra Pradesh. Her research interests include Cloud Computing, Information Security. K.Swetha Harshini is currently pursuing B.Tech. degree in Computer Science & Engineering, VITS College of Engineering, Sontyam, Visakhapatnam, Andhra Pradesh. Her research interests include Cloud Computing, Information Security. REFRENCES [1] B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster,“Virtual infrastructure management in private and hybridclouds,” IEEE Internet Computing, vol. 13, no. 5, pp. 14–22,2009. [2] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner,Z. N. J. Peterson, and D. X. Song, “Provable data possessionat untrusted stores,” in ACM Conference on Computer andCommunications Security, P. Ning, S. D. C. di Vimercati, andP. F. Syverson, Eds. ACM, 2007, pp. 598–609. [3] A. Juels and B. S. K. Jr., “Pors: proofs of retrievability forlarge files,” in ACMConference on Computer and CommunicationsSecurity, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds.ACM, 2007, pp. 584–597. ISSN: 2231-5381 G.Aparna Gayathri is currently pursuing B.Tech. degree in Computer Science & Engineering, VITS College of Engineering, Sontyam, Visakhapatnam, Andhra Pradesh. Her research interests include Cloud Computing, Information Security. http://www.ijettjournal.org Page 469