Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P24 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P24
An Efficient Cloud Storage with Secure Dynamic Data Modification
K.HariPriya, P.Krishnamoorthy
Citation :
K.HariPriya, P.Krishnamoorthy, "An Efficient Cloud Storage with Secure Dynamic Data Modification," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1075-1079, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I5P24
Abstract
Cloud computing is an on demand service where the user can obtain computer resources via the internet. Due to increase the advantages of cloud computing the individual users and organizations are store their data in cloud storage servers. But storing data in a third party cloud system is a serious issue. To avoid this issue the data’s are encrypted before storing in storage server. The normal encryption system provides security but it does not support data integrity on the cloud storage server. To address this issue the research work proposed an Elliptic Curve Digital Signature algorithm, it provides data integrity and data origin authentication. To support a dynamic data modification the Merkle Hah Tree construction is also used. The User’s data’s are encrypted by using an efficient Elliptic Curve Digital Signature Algorithm (ECDSA). The encrypted data’s are divided in to blocks by using Merkle hash tree, the authenticated user can perform all the operations like insert, delete and update at the particular block in storage server itself. To support the efficient handling of auditing tasks the third party auditor is used to verify the integrity of the dynamic data operations on the cloud storage server. Compare with existing system this research work provides a highly secure and efficient cloud storage server.
Keywords
loud Computing, Merkle Hash Tree , Elliptic Curve Digital Signature Algorithm, Third Party Auditor.
References
[1] Aqeel Khalique ,Kuldip Singh,Sandeep Sood “Implementation of Elliptic Curve Digital Signature Algorithm” International Journal of Computer Applications (0975 – 8887) Vol 2 – No.2, May 2010
[2] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li “Enabling Public Auditablity and Data Dynamics for Storage Security in Cloud Computing” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 5, May 2011
[3] Balakrishnan.S,Saranya.G,Shobana.S,Karthikeyan.S “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud” IJCSt Vol. 2, Issue 2, June 2011
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS’07), pp. 598-609, 2007.
[5] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc.Second USENIX Conf. File and Storage Technologies (FAST), pp. 29-42, 2003.
[6] C.Wang, Q.Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE 29th Int’l Conf. Computer Comm. (INFOCOM), pp. 525-533, 2010.
[7] Don Johnson and Alfred Menezesand Scott Vanstone “The Elliptic Curve Digital Signature Algorithm (ECDSA)” Certicom Corporation 2001
[8] Erway C, Kupcu A, Papamanthou C, and Tamassia R, “Dynamic provable data possession,” in Proc. of CCS’09. Chicago, IL, USA: ACM, 2009.
[9] Cong Wang,Qian Wang,Kui Ren,Wenjing Lou (2009) , "Ensuring Data Storage Security in CloudComputing". IEEE 17’th International Conference July 2009.
[10] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic techniques (Eurocrypt ’03), pp. 416-432, 2003.
[11] Oprea, M.K. Reiter, and K. Yang, “Space-Efficient Block Storage Integrity,” Proc. 12th Ann. Network and Distributed System Security Symp. (NDSS’05), 2005.
[12] Timothy A. Hall Sharon S. Keller “The FIPS 186-3 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS)” National Institute of Standards and Technology Information Technology Laboratory,Updated:January9,2013 [13] GeorgBecker “Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis”SeminararbeitRuhr-Universit at Bochum, 18.07.08.