A Simple Storage Assessment Protocol for Multiple Owners Kodukulla Sireesha

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume15Number 7 – Sep 2014
A Simple Storage Assessment Protocol for Multiple
Owners
1
Kodukulla Sireesha
1
1
M.Tech Scholar
Dept of CSE, MVGR of Engineering College, Chintavalasa,AP,India.
Abstract:-In cloud computing data owners store or host their
information and users access that information from cloud. Some
traditional integrity verifying methods and then cannot be applied
to the auditing service until the data in the cloud service can be
dynamically updated. Therefore an efficient and secure dynamic
multi- owner auditing protocol is designed to serve data owners
that the data are correctly stored in the cloud. We designed a
framework that provides privacy preserving and secure storage
and secure verifying protocol. This framework is designed for
auditing multi-owner data storage in cloud service by using
cryptographic methods.
frequently outward and inward commensurate with request.
The capacities are available for providing appear to be limit
less and can be appropriated in any quantity at any time.
e) Measured service. Cloud systems are control and
configure the resource used by a metering capacity at a
point of level of abstraction appropriate to the type of
service such as storageand active user accounts. Resource
usage can be verified and managed by providing the
transparency for both the provider and consumer of the
utilized service.
I. INTRODUCTION
C) Deployment Models
Cloud computing is a representation for sanctioning
flexible on-demand network access to a shared set of
configurable computing resources and that can frequently
provisioned and introduced with minimum maintenance
effort. This model includes of five featuresand three service
models and four deployment models.
A) Private cloud. This topology is given for the usage of
the cloud by unique organization consists of multiple users.
This type of cloud is owned and operated by the
organization or company only.
A)Essential Features:
a)On-demand self-service. A consumer can provide
provision computing capacity such as server processing
time and storage required automatically without human
communication with each service provider.
B)Broad network access.The capacities are available in the
network and accessed using standard methods that is used
by different client domainssuch as mobile phones and
laptops etc.
C)Resource pooling. The service provider computing
resources are grouped to serve different users using a
multi-users model with various physical and virtual
resources dynamically assigned and reassigned based on
consumer demand. There is some idea of location
independence in that the usernormally has no control or
knowledge oncorrect location of the given resources but
may be able to declare the location at a higher level of
extraction such as country, state, or datacenter. There are
some examples of resources consists of storage and
processing, memory and network bandwidth.
d)Rapid elasticity. Capacities are elastically given and
released in some other situations automatically to measure
B) Community cloud. This topology provided for particular
group of customers those are using sharing concerns and
those are maintained by one or more organizations in that
group only.
C) Public cloud.This cloud architecture is provided for
public usage by public users. This type of cloud is
maintained by any organization.
D) Hybrid cloud. Thisarchitecture is the combination of
different architectures including above explained
architectures. It contains unique features and objects gives
data and application portability. It maintains load balancing
and store more amounts of data.
II. RELATED WORK
A) Un-cheatable data transfer
Let us consider request for bandwidth content
distributed network. Consider that Alice has existing
downloaded data and that is requested by Bob. Alice shares
that data with bob by taking currency. This type of data
exchanging is more attractive that leads to increase the
ISSN: 2231-5381http://www.ijettjournal.org
Page 340
International Journal of Engineering Trends and Technology (IJETT) – Volume15Number 7 – Sep 2014
scalability of users and that relieves the network operators
from bandwidth charges. There are two situations such as
1. Alice has lots of static bandwidth but not interesting to
use this in static bandwidth. Therefore she claims to
possess a highly requesteddata but when it is requested by
bob she sends non-relevant data.
2. Bob don’t want to be a part with his bandwidth credits
so the successful receipt ofdata he will claim that the data
was corrupted and don’t agree to handover the credits.
The first situation is avoided by new techniques. Even the
users are able to know the correct data or incorrect data out
of Alice.
1. A centralized server frequently verifies the
hashes for each and every block of data in communication
network. Bob converts the received that data to hash and
store in the server. If the hash values are matched perfectly
he predicts that the data was corrupted and there is no
credits not going to exchange.
2. Alice encodes the data before sending top bob.
After sending of data bob hashes the received data and
compares with the Alice hash value of encrypted data. If it
matches correctly Alice send decryption key to bob. This
scheme is secure againstscenario 2 but not 1 and since
Alice might have encrypted random or unrequesteddata.
This could be combined with the first protocol by hashing
the decrypteddata; however the scheme would again be
insecure against scenario 2.
Method 1: It is purely secure method but further it
leads to overload for the server and it requirestoring a
correct copy of every block of data being trade in the
network. Here we show howintra hashing and block
ciphers can be used to remove this requirement.Let d be the
data of interest and f(k) be a stream cipher. It gives
abitstring s of arbitrary length which is based on k. For our
requirement this bitstring is compressedto match the size of
d. d and s would be merged by the XOR operationSince we
have a hash H which is under integer addition.We
willinterpret both d and s as bitwise integers, and we define
c = s + d as the ciphertext where +is integer addition.
The centralized server must create an RSA
modulus n = pq, where p and q are primes and (n) =
(p−1)(q−1). The modulus n is public integer, but p, q, (n)
are kept as secret.Every block of data d is hashed as h(d) =
d mod (n) and this resulted value stored by theserver.
Alice sends data to Bob according to the following
protocol:
Method 1.1(Data transfer).
1. Alice selects a key k at randomly for stream cipher f(k),
and calculates thebitstring s and the ciphertext c = s + d
using this key.
2. Alice sends s and rA = H(c) to Bob.
3. Bob computes rB = H(c).
4. If rA = rB thenBob send request decryption key k from
Alice.
5. Bob decrypt the data by calculating the binarystring s
and d = c − s and verifiesthe combination of d by a
traditional hash function.
If a situation arises concerning the combination of
data transfer the belowprotocol is executed:
Method 1.2(Data transfer verification).
1. Alice or Bob sends k and r to the central server;
2. The server calculates the binarystring s and its hash H(s);
3. The server calculatesrS = H(c) = H(s). h(d);
4. If r = rS, the server predicts that Alice correctly sent the
data.
The remaining step is that may needproof then
Step 3. Recallthat (n) is the order of (Z/nZ) (the group
over which arithmetic takes place), and byabstraction
ofh(d) d (mod (n)), so that bh(d) .bd (mod n). Since H(d)
= bd mod n,we have that H(c) = H(s + d) = H(s)H(d) =
H(s)h(d) using the uniqueproperty of H.
We show that the server can reduce the
computation of H(s) by computingH(s mod (n)). We posit
that working is not an issue since thisprotocol will be
executed rapidly.
In our proposed system we introduced a novel
architecture for verifying the authentication and secure
transferring of data. Reducing the impersonation and data
leakage in transmission we adapted cryptographic methods
in our architecture. We introduced a trusted member to
verify the data is correct or not. We call that trusted
member as auditor or verifier. It verifies the signature
generated from the content stored in cloud and from the
data owner.
III. PROPOSED SYSTEM
In proposed work we designed a protocol that we have
three roles such as clients, cloud service provider, and
verifier. The client store data in cloud service provider.
There are multi-owners present in the network in the cloud.
The client store data in encrypted format in cloud service
provider.
It’sto be encrypted by random alphabetic encryption
process which is shown below:
Random Alphabetical Encryption and Decryption
Algorithm :
ISSN: 2231-5381http://www.ijettjournal.org
Page 341
International Journal of Engineering Trends and Technology (IJETT) – Volume15Number 7 – Sep 2014
Encryption: P=plain Text
Key with variable length (128,192, 256 bit)
• Rappresented with a matrix (array) of bytes with 4 rows
andNk columns, Nk=key length / 32
• key of 128 bits= 16 bytes Nk=4
• key of 192 bits= 24 bytes Nk=6
• key of 256 bits= 32 bytes Nk=8
Block of length 128 bits=16 bytes
• Represented with a matrix (array) of bytes with 4 rows
andNb columns, Nb=block length / 32
• Block of 128 bits= 16 bytes Nb=4
State = X
1. AddRound_Key(State, Key0)
for r = 1 to (Nr - 1)
a. Sub_Bytes(State, S-box)
b. Shift_Rows(State)
c. Mix-Columns(State)
d. Add-RoundKey(State, Keyr)
end for
2. Sub_Bytes(State, S-box)
3. Shift_Rows(State)
4. Add-RoundKey(State, KeyNr)
Y = State
5. Collect signatures from receivers
6. Monitor files
Auditor
User
7. Send Status
4. Receive signatures
from multiple
8. Decrypted file
7. Send Status
2. Send meta details
Data Owner 1
3. Send encrypted File
Cloud service
Data owner 2
1.Encrypt file, generate signature
Signature Generation Algorithm:
KeyGeneration(Ks)→(p k , sk , skh). The key generation
algorithm takes no input other than the implicit security
parameter Ks. It randomly chooses two random numbers
for selecting random numbers generate two prime numbers
from P. Then calculate primitive roots of the two prime
numbers and those two primitive roots are st ,shrepectively
and belongs to Prime number group as the tag key and the
hash key.
It outputs the public tag key as pt = gsKs mod G2,
the secret tag key st and the secret hash key sh. Then
generate hash for sh is calculated by using simple hash
function which means second random value given input to
hash function that explains as follows. For example
consider that each input is an integer I in the range 0 to
N−1, and the output must be an integer h in the range 0 to
n−1, where N is much larger than n. Then the hash function
could be h = I mod n (the remainder of I divided by n), or h
………..
= (I × n) ÷N (the value z scaled down by n/N and truncated
to an integer) or so many other formulas.
Signature Generation (M, st ,sh) → T. The
signature generation algorithm takes each data component
M, the secret tag key st and the secret hash key sh as inputs.
It first chooses s random values r1, r2, …. , xn є I and
computes uj = gxj mod G1 for all j є [1, n]. For each data
block mi(i є [1,n]), it computes a data challenge as:-
C=({c1}I€SChal,{rn} n€j
where Wi = FID||i (the “||” denotes the concatenation
operation), in which FID is the identifier of the data and i
represents the block number of mi. It outputs the set of data
tags T = {ti}iє[1,n]. Chall(Minfo) → C. The algorithm takes
the brief information of the data Minfo as the input And it
selects some different data blocks to construct the
Challenge Set Q and generates a random number for each
chosen data block mi(i є Q). It computes the challenge
ISSN: 2231-5381http://www.ijettjournal.org
Page 342
International Journal of Engineering Trends and Technology (IJETT) – Volume15Number 7 – Sep 2014
stamp R = (pt)r by randomly choosing a number r є Z*p. It
outputs the challenge as
Tp=∏
€
Proof(M,T,C) → P. The proving algorithm takes as inputs
the data M and the received. The proof consists of the tag
proof TP and the data proof DP. The challenge proof is
generated as
To generate the data proof it first computes the sector
linear combination of all the challenged data blocks MPj for
each j є [1, s] as
Mpj=Vj.Mij
Then, it generates the data proof DP as
DProof=∏
( , )Mpj
It outputs the proof P = (TP,DP).
Verify(C,P, sh, pt ,Minfo ) → 0/1. The verification
algorithm takes as inputs the challenge C, the proof P, the
secret hash key sh, the public tag key pt and the abstract
information of the data component. Initially itcomputes the
identifier hash values hash(sh,Wi) of all the challenged data
blocks such as hash value is calculated by using SHA256
method and computes the challenge hash Hchallange as
Hchal=∏ € (h(Skh,Wi))
Then it verifies the proof from the server by the following
verification equation:
Vp=e(HChallenge,pt)=e(Tp,gr2)
If the above verification equation holds it outputs 1.
Otherwise it results 0.
IV. CONCLUSION
In this paper, we proposed an efficient secure dynamic
verifying protocol. It defends the data privacy over the
auditor by combining the cryptography method, rather than
using the mask technique. Our multi-cloud batch verifying
protocol does not require any additional organizer. Our
batch verifying protocol can also support the batch auditing
for multiple owners. Our auditing scheme less
communication cost and less computation complexity of
the auditor by moving the computing calculations of
auditing from the auditor to the server which is greatly
increases the efficiency auditing performance and applied
to large-scale cloud storage systems.
REFERENCES
[1] P. Mell and T. Grance, “The NIST Definition of Cloud
Computing,”technical report, Nat’l Inst. of Standards and
Technology,2009.
[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,
A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and
M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53,no. 4,
pp. 50-58, 2010.
[3] T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing: A
PracticalApproach, first ed., ch. 7. McGraw-Hill, 2010.
[4] J. Li, M.N. Krohn, D. Mazie`res, and D. Shasha, “Secure
UntrustedData Repository (SUNDR),” Proc. Sixth Conf. Symp.
OperatingSystems Design Implementation, pp. 121-136, 2004.
[5] G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter,
“EfficientByzantine-Tolerant Erasure-Coded Storage,” Proc. Int’l
Conf.Dependable Systems and Networks, pp. 135-144, 2004.
[6] V. Kher and Y. Kim, “Securing Distributed Storage:
Challenges,Techniques, and Systems,” Proc. ACM Workshop Storage
Securityand Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik,
L.Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005.
[7] L.N. Bairavasundaram, G.R. Goodson, S. Pasupathy, and J.Schindler,
“An Analysis of Latent Sector Errors in Disk Drives,”Proc. ACM
SIGMETRICS Int’l Conf. Measurement and Modeling ofComputer
Systems, L. Golubchik, M.H. Ammar, and M. Harchol-Balter, eds., pp.
289-300, 2007.
[8] B. Schroeder and G.A. Gibson, “Disk Failures in the Real World:What
Does an MTTF of 1,000,000 Hours Mean to You?” Proc.USENIX Conf.
File and Storage Technologies, pp. 1-16, 2007.
[9] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard,“A
Cooperative Internet Backup Scheme,” Proc. USENIX Ann.Technical
Conf., pp. 29-41, 2003.
[10] Y. Deswarte, J. Quisquater, and A. Saidane, “Remote
IntegrityChecking,” Proc. Sixth Working Conf. Integrity and Internal
Controlin Information Systems (IICIS), Nov. 2004.
BIOGRAPHIES
Mr. P.S.SITARAMA RAJU, well known
and excellent Teacher received M.Tech
(CSE) from CENTRAL UNIVERSITY,
Hyderabad. He is working as professor
(H.O.D)
Dept
of
CSE
at
MaharajVijayaramGajapathi Raj College of
Engineering. He has 161/2 years of
industrial and teaching experience and to his credit couple of
publications both national and international conferences/journals.
His area of interest includes Object Oriented software &
languages, System Architecture System Software.
KodukullaSireesha
is
a
student
MaharajVijayaramGajapathi
Raj
of
Engineering
College,
Chintavalasa.
Presently she is pursuing his M.Tech
[Computer Science] from this college and
he received his B.Tech from Gokul Institute
of Technology and sciences, affiliated to JNTU Kakinada, Piridi
in the year 2009. Her area of interest includes Computer
Networks and DBMS all current trends techniques in Computer
science.
ISSN: 2231-5381http://www.ijettjournal.org
Page 343
International Journal of Engineering Trends and Technology (IJETT) – Volume15Number 7 – Sep 2014
ISSN: 2231-5381http://www.ijettjournal.org
Page 344
Download