SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 922
PRIVACY-PRESERVING EXTERNAL AUDITING FOR DATA STORAGE
SECURITY IN CLOUD
Bincy Joseph1
, Akhila Thejaswi R2
1
MTech Student, Computer Science and Engineering, SCEM, Karnataka, India
2
Assistant Prof, Information Science and Engineering, SCEM, Karnataka, India
Abstract
Cloud Computing is an emerging technology which has been envisioned as the next generation information technology enterprise
architecture. It manages application software and databases to centralised large data centres where the services may neglect to keep
the files which are rarely accessed. This work studies the problem of ensuring the integrity of user data stored in the cloud server.
Here I consider the task of allowing a Third Party Auditor (TPA), to check the integrity of data stored in the cloud on behalf of the
cloud user. Without gaining knowledge on the data content stored in the cloud server.
Keywords: Cloud Computing, Cloud Server, Integrity, TPA, Privacy-Preserving
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Using cloud storage users can remotely store their data on to
the cloud. By data outsourcing users can be relieved from the
burden of local data storage. And cloud storage provides more
space for the user files on demand. However, since users no
longer have physical possession on the data stored makes the
data integrity a difficult task. Moreover cloud server must be
reliable and users must be able to use their data without
worrying about its integrity.
In order to fully ensure the data integrity and make wise use of
cloud resources, it is required to enable public auditing service
for cloud data storage. So that users can resort to a third party
auditor (TPA) to audit the outsourced user data on demand
when it is needed without retrieving the local copy of the
same. The TPA must periodically check the integrity of the
files on behalf of the users, which provides much easier way
to ensure user data storage correctness in the cloud. Moreover,
it will help users to evaluate the risk of their availed cloud data
services; the auditing results from TPA would also be
beneficial for the cloud service providers to improve their
cloud based service platform. And even serve truthfully. This
scheme is privacy-preserving because the TPA will not learn
any knowledge on the data stored in server.
2. DESIGN METHODOLOGY
A representative architecture for cloud data storage is shown
in the above figure. There are three different entities and they
are:
Fig 1: Cloud Data Storage Security Architecture
2.1 Client
An entity or a cloud user, who has large files to be stored in
the cloud and relies on cloud for data maintenance and
security, client, might be either individual customers or an
organisation.
2.2 Third Party Auditor (TPA)
An entity or service, which periodically checks the integrity of
data files stored in cloud server on behalf of the user.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 923
2.3 Cloud Storage Server
An entity, which is managed by cloud service provider (CSP),
has significant storage space and computation resource to
maintain the client’s data.
The working can be explained as: first the client needs to
register onto the cloud server using TPA to avail the service.
After registering the TPA will keep the user ID and the full
details will be stored in the cloud server. If client wants to
upload a file then a request is sent to TPA. The TPA will
generate a public and a private key, sends the public key to the
client and private key to the server. Now the client will
encrypt the data files using the public key and send it to cloud
server, at the same time it will generate the hash code of the
data file and send that to TPA. When user wants to check the
integrity of the data stored in the cloud server, the user will
send a request to TPA, now the TPA will ask for the signature
from server. The server will generate the signature of user data
files upon request and send it to TPA. If the signature from the
server matches that of the hash code saved in TPA then the
data files are secure and integrity is verified. Here the
important advantage is that, even the third party will not learn
any knowledge on the data stored in cloud server. Hence it is
privacy-preserving data integrity verification method.
3. CONCLUSIONS
One of the important concerns that need to be addressed is to
assure the customer of the data integrity that is correctness of
their data stored in cloud server. As the data is physically not
accessible to the user the cloud should provide a way for the
user to check if the integrity of his data is maintained or is
compromised. Here I have done initial requirements for
verification of data integrity like client authentication,
generating the keys and uploading client data to the cloud
server database. TPA will check the integrity or correctness of
the data which is stored by the client. Where, the TPA will not
learn any knowledge on the data stored in the cloud server.
And the client will have the option to increase or decrease the
memory space required.
ACKNOWLEDGEMENTS
Here, I would like to take this opportunity to express my
heartfelt gratitude to the supervisor for this project, Ms. Akhila
Thejaswi R for her patience with me and down to earth
personality which have given many pointers to guide me
during my work in this paper. I hope that this paper can be as
informational as possible to you.
REFERENCES
[1]. C. Wang, Q. S.M. Chow, Kui Ren and Qian Wang,
“Ensuring data storage security in cloud computing,” in
December 2011.
[2]. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou,
"Towards Secure and Dependable Storage Services in Cloud
Computing," IEEE transactions on Services Computing, 06
May 2011.
[3]. Wang, K. Ren, W. Lou, and J. Li, “Towards publicly
auditable secure cloud data storage services,” IEEE Network
Magazine, vol. 24, no. 4, pp. 19–24, 2010.
[4]. M. A. Shah, R. Swaminathan, and M. Baker,
“Privacypreserving audit and extraction of digital contents”
Cryptology ePrint Archive, Report 2008/186, 2008.
[5]. J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,”at
http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-
closes-its-doors/, July 2008.
[6]. M. Naor and G. N. Rothblum, “The complexity of online
memory checking,” in Proc. of FOCS’05, Pittsburgh, PA,
USA, 2005, pp. 573–584.
[7]. E.-C. Chang and J. Xu, “Remote integrity check with
dishonest storage server,” in Proc. of ESORICS’08 Berlin,
Heidelberg: Springer-Verlag, 2008, pp. 223–237.
[8]. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-
preserving audit and extraction of digital contents,”
Cryptology ePrint Archive, Report 2008/186, 2008.
[9]. A. Oprea, M. K. Reiter, and K. Yang, “Space-efficient
block storage integrity,” in Proc. of NDSS’05, San Diego, CA,
USA, 2005.
[10]. T. Schwarz and E. L. Miller, “Store, forget, and check:
Using algebraic signatures to check remotely administered
storage,” in Proc. of ICDCS’06, Lisboa, Portugal, 2006, pp.
12–12.
BIOGRAPHIE
M Tech Student in Sahyadri College of
Engineering and Management

More Related Content

What's hot (19)

PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PDF
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
PDF
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
PDF
50120140503020
IAEME Publication
 
PDF
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
 
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
PDF
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
PDF
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
PDF
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
PDF
L01246974
IOSR Journals
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
PDF
J018145862
IOSR Journals
 
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
PDF
3 ijece 1 ed iqbal qc
IAESIJEECS
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
A novel graphical password approach for accessing cloud & data verification
eSAT Publishing House
 
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
paperpublications3
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
50120140503020
IAEME Publication
 
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
L01246974
IOSR Journals
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
J018145862
IOSR Journals
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
3 ijece 1 ed iqbal qc
IAESIJEECS
 
International Journal of Engineering Research and Development
IJERD Editor
 
A novel graphical password approach for accessing cloud & data verification
eSAT Publishing House
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
paperpublications3
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Viewers also liked (10)

DOCX
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
chennaijp
 
DOC
Enabling data integrity protection in regenerating coding-based cloud storage...
Papitha Velumani
 
PDF
Privacy preserving public auditing for data storage security in cloud comp
IAEME Publication
 
PDF
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
chennaijp
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Papitha Velumani
 
Privacy preserving public auditing for data storage security in cloud comp
IAEME Publication
 
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Ad

Similar to Privacy preserving external auditing for data storage security in cloud (20)

PDF
Security in multi cloud data storage with sic architecture
eSAT Journals
 
PDF
Security in multi cloud data storage with sic
eSAT Publishing House
 
PDF
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
PDF
Enhanced security framework to ensure data security
eSAT Publishing House
 
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
PDF
Ensuring secure transfer, access and storage over the cloud storage
eSAT Journals
 
PDF
Ensuring secure transfer, access and storage over the cloud storage
eSAT Publishing House
 
PDF
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
IJERA Editor
 
PDF
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
PDF
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
PDF
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
PDF
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
PDF
Secure file sharing of dynamic audit services in cloud storage
eSAT Publishing House
 
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
DOC
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
PDF
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
 
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
PDF
V04405122126
IJERA Editor
 
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
eSAT Publishing House
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Ensuring secure transfer, access and storage over the cloud storage
eSAT Journals
 
Ensuring secure transfer, access and storage over the cloud storage
eSAT Publishing House
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
IJERA Editor
 
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Secure file sharing of dynamic audit services in cloud storage
eSAT Publishing House
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
V04405122126
IJERA Editor
 
Ad

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
PDF
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
PDF
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
PDF
Risk analysis and environmental hazard management
eSAT Publishing House
 
PDF
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
PDF
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
PDF
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Recently uploaded (20)

PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Inventory management chapter in automation and robotics.
atisht0104
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 

Privacy preserving external auditing for data storage security in cloud

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 922 PRIVACY-PRESERVING EXTERNAL AUDITING FOR DATA STORAGE SECURITY IN CLOUD Bincy Joseph1 , Akhila Thejaswi R2 1 MTech Student, Computer Science and Engineering, SCEM, Karnataka, India 2 Assistant Prof, Information Science and Engineering, SCEM, Karnataka, India Abstract Cloud Computing is an emerging technology which has been envisioned as the next generation information technology enterprise architecture. It manages application software and databases to centralised large data centres where the services may neglect to keep the files which are rarely accessed. This work studies the problem of ensuring the integrity of user data stored in the cloud server. Here I consider the task of allowing a Third Party Auditor (TPA), to check the integrity of data stored in the cloud on behalf of the cloud user. Without gaining knowledge on the data content stored in the cloud server. Keywords: Cloud Computing, Cloud Server, Integrity, TPA, Privacy-Preserving -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Using cloud storage users can remotely store their data on to the cloud. By data outsourcing users can be relieved from the burden of local data storage. And cloud storage provides more space for the user files on demand. However, since users no longer have physical possession on the data stored makes the data integrity a difficult task. Moreover cloud server must be reliable and users must be able to use their data without worrying about its integrity. In order to fully ensure the data integrity and make wise use of cloud resources, it is required to enable public auditing service for cloud data storage. So that users can resort to a third party auditor (TPA) to audit the outsourced user data on demand when it is needed without retrieving the local copy of the same. The TPA must periodically check the integrity of the files on behalf of the users, which provides much easier way to ensure user data storage correctness in the cloud. Moreover, it will help users to evaluate the risk of their availed cloud data services; the auditing results from TPA would also be beneficial for the cloud service providers to improve their cloud based service platform. And even serve truthfully. This scheme is privacy-preserving because the TPA will not learn any knowledge on the data stored in server. 2. DESIGN METHODOLOGY A representative architecture for cloud data storage is shown in the above figure. There are three different entities and they are: Fig 1: Cloud Data Storage Security Architecture 2.1 Client An entity or a cloud user, who has large files to be stored in the cloud and relies on cloud for data maintenance and security, client, might be either individual customers or an organisation. 2.2 Third Party Auditor (TPA) An entity or service, which periodically checks the integrity of data files stored in cloud server on behalf of the user.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 923 2.3 Cloud Storage Server An entity, which is managed by cloud service provider (CSP), has significant storage space and computation resource to maintain the client’s data. The working can be explained as: first the client needs to register onto the cloud server using TPA to avail the service. After registering the TPA will keep the user ID and the full details will be stored in the cloud server. If client wants to upload a file then a request is sent to TPA. The TPA will generate a public and a private key, sends the public key to the client and private key to the server. Now the client will encrypt the data files using the public key and send it to cloud server, at the same time it will generate the hash code of the data file and send that to TPA. When user wants to check the integrity of the data stored in the cloud server, the user will send a request to TPA, now the TPA will ask for the signature from server. The server will generate the signature of user data files upon request and send it to TPA. If the signature from the server matches that of the hash code saved in TPA then the data files are secure and integrity is verified. Here the important advantage is that, even the third party will not learn any knowledge on the data stored in cloud server. Hence it is privacy-preserving data integrity verification method. 3. CONCLUSIONS One of the important concerns that need to be addressed is to assure the customer of the data integrity that is correctness of their data stored in cloud server. As the data is physically not accessible to the user the cloud should provide a way for the user to check if the integrity of his data is maintained or is compromised. Here I have done initial requirements for verification of data integrity like client authentication, generating the keys and uploading client data to the cloud server database. TPA will check the integrity or correctness of the data which is stored by the client. Where, the TPA will not learn any knowledge on the data stored in the cloud server. And the client will have the option to increase or decrease the memory space required. ACKNOWLEDGEMENTS Here, I would like to take this opportunity to express my heartfelt gratitude to the supervisor for this project, Ms. Akhila Thejaswi R for her patience with me and down to earth personality which have given many pointers to guide me during my work in this paper. I hope that this paper can be as informational as possible to you. REFERENCES [1]. C. Wang, Q. S.M. Chow, Kui Ren and Qian Wang, “Ensuring data storage security in cloud computing,” in December 2011. [2]. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE transactions on Services Computing, 06 May 2011. [3]. Wang, K. Ren, W. Lou, and J. Li, “Towards publicly auditable secure cloud data storage services,” IEEE Network Magazine, vol. 24, no. 4, pp. 19–24, 2010. [4]. M. A. Shah, R. Swaminathan, and M. Baker, “Privacypreserving audit and extraction of digital contents” Cryptology ePrint Archive, Report 2008/186, 2008. [5]. J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,”at http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup- closes-its-doors/, July 2008. [6]. M. Naor and G. N. Rothblum, “The complexity of online memory checking,” in Proc. of FOCS’05, Pittsburgh, PA, USA, 2005, pp. 573–584. [7]. E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proc. of ESORICS’08 Berlin, Heidelberg: Springer-Verlag, 2008, pp. 223–237. [8]. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy- preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008. [9]. A. Oprea, M. K. Reiter, and K. Yang, “Space-efficient block storage integrity,” in Proc. of NDSS’05, San Diego, CA, USA, 2005. [10]. T. Schwarz and E. L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in Proc. of ICDCS’06, Lisboa, Portugal, 2006, pp. 12–12. BIOGRAPHIE M Tech Student in Sahyadri College of Engineering and Management