To Provide Security for Storage Services in Cloud Computing

International Journal of Computer Trends and Technology (IJCTT)          
© - August Issue 2013 by IJCTT Journal
Volume-4 Issue-8                           
Year of Publication : 2013
Authors :D.Shravani , Dr. S. Zahoor Ul Huq


D.Shravani , Dr. S. Zahoor Ul Huq"To Provide Security for Storage Services in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V4(8):2576-2581 August Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract:- Cloud computing is the delivery of computing and storage capacity as a service to a community of end-recipients. Cloud computing entrusts services with a user's data, software and computation over a network. It is an emerging computing model in which resources of the computing communications are provided as services over the internet. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server scheming attacks. It propose some services for data security and access control when users outsource sensitive data for sharing on cloud servers.



[1]. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of ASI- ACRYPT’08. Springer-Verlag, 2008, pp. 90–107.
[2]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 598–609.
[3]. A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 584–597.
[4]., “Amazon s3 availability event: July 20, 2008,” Online at http://, July 2008.
[5]. J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In CRYPTO, volume 1666 of LNCS, pages 216–233, 1999.
[6]. K. D. Bowers, A. Juels, and A Oprea. HAIL: A High-availability and integrity layer for cloud storage, 2008. IACR ePrint manuscript 2008/489.
[7]. C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In 9th ACM CCS, pages 88–97, 2002.
[8]C. Cachin and S. Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE SRDS, pages 191–202, 2005.
[9]. L. Carter and M. Wegman. Universal hash functions. Journal of Computer and System Sciences, 18(3), 1979.
[10]. R. Curtmola, O. Khan, and R. Burns. Robust remote data checking. In 4th ACM StorageSS, 2008.
[11]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR-PDP: Multiple-replica provable data possession. In 28th IEEE ICDCS, pages 411– 420, 2008.
[12]. K. D. Bowers, A. Jules, and A Oprea. Proofs of retrievability: Theory and implementation, 2008. IACR ePrint manuscript 2008/175.
[13]. A. Herzberg, M. Jakobsson, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In 4th ACM CCS, pages 100–110, 1997.
[14]. A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In CRYPTO, volume 1963 of LNCS, pages 339–352, 1995.
[15]. A. Juels and B. Kaliski. PORs: Proofs of retrievability for large files. In 14th ACM CCS, pages 584–597, 2007.

Keywords : — Cloud Computing, Dependable distributed storage, Public Auditing, Integrity.