Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-60 Number-2
Year of Publication : 2018
Authors : Ajay S Kulkarni, Guntumadugu Girish Raj
  10.14445/22312803/IJCTT-V60P113

MLA

Ajay S Kulkarni, Guntumadugu Girish Raj "Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data". International Journal of Computer Trends and Technology (IJCTT) V60(2):82-90 June 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Cloud computing emerges as a novel computing paradigm subsequent to grid computing. As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Cloud service provider tries to provide a promising service for data storage, which saves the users costs of investment and resource. Nonetheless, cloud storage also brings various security issues for the outsourced data. Because cloud storage servers are not fully trustworthy, data owners need dependable means to check the possession for their files outsourced to remote cloud servers. But many existing schemes have vulnerabilities in efficiency or data dynamics. In this system, we provide a new efficient RDPC protocol based on homomorphic hash function [1]. Our scheme employs a homomorphic hash function to verify the integrity for the files stored on remote server, and reduces the storage costs and computation costs of the data owner. In this system, we study the issue for integrity checking of data files outsourced to remote server and propose an efficient secure RDPC protocol with data dynamics. Using our new data structure, the data owner can perform insert, modify or delete operation on file blocks with high efficiency and check the possession of the data.

Reference
[1] Hao Yan, Jiguo Li, Jinguang Han and Yichen Zhang, “A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage”, IEEE Transactions on Information Forensics and Security , vol. 12, no. 1, pp. 78-88, 2017.
[2] Q.Wang, C.Wang, K.Ren, W.Lou and J.Li “Enabling public auditability and data dynamics for storage security in cloud computing”,IEEE Trans. Parrael Disrib. Syst, vol.22, pp. 847-859, 2011.
[3] Y.Deswarte, J.J.Quisquater and A.Saidane, “Remote integrity checking”, Proc. 6th Work. Conf. Integr. Int. Control Inf. Syst. (IICIS), vol. 16, pp. 1-11, 2003.
[4] G.Ateniese, R.Di.Pietro, L.V.Mancin and G,Tsudik "Scalable and efficient provable data possession," Proc. 4th Int. Conf. Secur. Privacy Commun. Netw. (SecureComm), vol. 9, 2008.
[5] L.Chen, S.Zhou, X.Huang and L.Xu "Data dynamics for remote data possession checking in cloud storage," Comput. Electr. Eng, vol. 39, pp. 2413-2424, 2013.
[6] Wikipedia.

Keywords
Cloud Storage, Data Possession Check, Homomorphic Hash Function, Dynamic Operation, AES Algorithm.