05-12-2012, 06:38 PM
Data Integrity and Dynamic Storage Way in Cloud Computing
1Data Integrity and Dynamic.pdf (Size: 257.57 KB / Downloads: 61)
Abstract
It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn’t have copy of all stored data. But any authors don’t tell us data integrity through its user and CSP level by comparison before and after the data update in cloud. So we have to establish new proposed system for this using our data reading protocol algorithm to check the integrity of data before and after the data insertion in cloud. Here the security of data before and after is checked by client with the help of CSP using our ―effective automatic data reading protocol from user as well as cloud level into the cloud‖ with truthfulness. Also we have proposed the multi-server data comparison algorithm with the calculation of overall data in each update before its outsourced level for server restore access point for future data recovery from cloud data server. Our proposed scheme efficiently checks integrity in efficient manner so that data integrity as well as security can be maintained in all cases by considering drawbacks of existing methods
INTRODUCTION
Cloud computing is a virtualized resource where we want to store all our data with security measurement so that some application and software can get full benefits using this technology without any local hard disk and server for our data storage. These services are broadly divided into three categories as
1) Infrastructure-as-a-Service. 2) Platform-as-a-Service and 3) Software-as-a-Service [1] [7]. It is not so efficient by using a few technologies such as flexible distributed scheme, Reed Solomon technique, and BLS algorithm [8] to give more integrity to the operation like change, removal, and add of data from cloud server. So to offer yet sophisticated and efficient integrity to cloud data so that all applications, software and highly valuable things can‘t be affected and modified according to unknown person‘s challenge from un-trusted cloud we have to provide more integrity method apart from previous methods with the assist of CSP who maintains our data from cloud servers from their IP address domain [3].
ACTIVITIES OF THE CLOUD
Devoted Property Assertion
All resources have high-quality assurance in its multi cloud servers with the help of strong platform. The mentioned possessions of RAM, CPU, and Bandwidth capacity [4][5] in network produce sufficient atmospheres for its concerned usage. Thus the activity of could server can‘t ever opposite to the current world while considering its level of integrity and security even though there is some little bit of conflict that we want yet to recover from its already existing level.
Optional Third Party Auditor
To reduce the work load of the user, (see Figure 1) TPA [1] [8] has the delegation for the data checking with a few limitation so that he can‘t modify content of the data in his auditing. And TPA pays due care on storage correctness verification.TPA auditing is in the manner of privacy preserving concept so that verification can be done in separate manner alone from any interaction by others. In the existing system, distributing protocol is used for this purpose. Here TPA does not have special authority for data integrity checking. However we don‘t give more importance to TPA to such a great degree but a small bit only since our proposed system pays more concentration on client‘s access for full security.
Our Proposed Model
We suppose that CSP allotted space is a major concern for
our data maintenance in all manner for dynamic operations.
All outsourced data and data entering into the cloud is
measured using reading protocol algorithm. So in order to
keep integrity of overall data, we have to use ―data reading
protocol from user as well as cloud storage level before and
after the data adding into the cloud server area‘ and another
―multi-server data comparison algorithm for every data upload
for the purpose of data recovery management‖ for our
proposed achievement. When server failure occurs in cloud
entire data may be affected so that user can‘t foresee data‘s
trustworthiness in its whole atmosphere depending on variety
of situation or CSP‘s process to hide the loss of data. Taking
into account these, we have modeled and proposed automatic
protocol and server data management algorithm to know about
entire data exchange before and after the data insertion into
multiple cloud server. And user can know if there has been
done any change, remove, and attach operations that can occur
for data from its storage level with the help of our proposed
scheme that never has been told. It can be effectively
administered by clients from appropriate efficient data reading
protocol from cloud server position.
Advantages of Proposed Model
By processing the integrity of data using data reading
protocol and data management algorithm after and before the
entering of data into the cloud, user can assure that all data in
cloud must be in protected condition for its trustworthiness. So
easily the actual size of stored data before and after in cloud is
maintained even though the user himself has done any
modification, deletion, and update for his own purpose by
using proposed scheme. These processes are carefully done
using our proposed scheme. So here user takes full control and
process on the data stored in cloud apart from TPA and we can
give strong assurance and protection to the data stored in
multiple cloud server environment. To avoid server failure and
any unexpected error we should put one server restore point in
cloud server database for efficient data back up or restore
using multi server data comparison method. It is major
advantage of our proposed system.
CONCLUSION
From our study we have good conclusion of the integrity and security of cloud level data when user do some update such as attach, removal, and change at own desire. So here user mostly has the situation to believe the service provider in many manners. Understanding all these situations, we have handled new proposed technique for cloud storage and. This is the modern way we have used in our paper different algorithm compared to previous related paper in this respect for cloud management. From this protection for cloud data, user can be strong belief for his uploaded data for any future purpose or his any other related process without worry. Here complicated, internal, external and malevolent attack is known by our proposed scheme in efficient manner by storage data measurement (i.e., since there can be some modifications in cloud data). Thus our main idea is to give integrity to the cloud storage area with strong trustworthiness so that user can feel free of worry for his uploaded data in his allocated space.