29-08-2014, 04:45 PM
Framework Of Data Integrity For Cross Cloud Environment Using CPDP Scheme
Framework Of Data.doc (Size: 138 KB / Downloads: 24)
ABSTRACT
In recent years, cloud storage service has become a faster profit growth point by providing a comparably scalable, position-independent, low -cost platform for client’s data. Since cloud computing environment is constructed based on open architectures and interfaces. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service providers (SPs).so, Security in terms of integrity is most important aspect in cloud computing environment. Cooperative Provable data possession (CPDP) is a technique for ensuring the integrity of data in storage outsourcing. Therefore, we address the construction of an efficient CPDP scheme and dynamic audit service for distributed cloud storage as well verifying the integrity guarantee of an entrusted and outsourced storage which support the scalability of service and data migration.
EXISTING SYSTEM
Although existing CPDP schemes offer a publicly accessible remote interface for checking and managing the tremendous amount of data, the majority of existing CPDP schemes are incapable to satisfy the inherent requirements from multiple clouds in terms of communication and computation costs. To address this problem, we consider a multi-cloud storage service
PROPOSED SYSTEM
Clients who have a large amount of data to be stored in multiple clouds and have the permissions to access and manipulate stored data Cloud Service Providers (CSPs) who work together to provide data storage services and have enough storages and computation resources. and Trusted Third Party (TTP) who is trusted to store verification parameters and offer public query services for these
parameters.
We consider the existence of multiple CSPs to cooperatively store and maintain the clients’ data. Moreover, a cooperative PDP is used to verify the integrity and availability of their stored data in all CSPs. The verification procedure is described as follows: Firstly, a client (data owner) uses the secret key to pre-process a file which consists of a collection of n blocks, generates a set of public verification information that is stored in TTP, transmits the file and some verification tags to CSPs, and may delete its local copy; Then, by using a verification protocol, the clients can issue a challenge for one CSP to check the integrity and availability of outsourced data with respect to public information stored in TTP.
PROBLEM STATEMENT
First, from our experiments we found that the per-formance of CPDP scheme, especially for large files, is affected by the bilinear mapping operations due to its high complexity. To solve this problem, RSA-based constructions may be a better choice, but this is still a challenging task because the existing RSA-basedschemes have too many restrictions on the performance and security. Next, from a practical point of view, we still need to address some issues about integrating our CPDP scheme smoothly with existing systems, for example, how to match index-hash hierarchy with HDFS’s two-layer name space, how to match index structure with cluster-network model, and how to dynamically update the CPDP parameters according to HDFS’ specific requirements. Finally, it is still a challenging problem for the gener-ation of tags with the length irrelevant to the size of data blocks. We would explore such a issue to provide the support of variable-length block verification
SCOPE
The Future work, we would extend our work to explore more effective CPDP constructions. We focused the core issues, if an untrusted server to store customer information. We can use cooperative provable data possession scheme, which reduce the data block access, and amount of computation on the server and client. Also decreases server traffic
Data Storage Module:
A data storage service involves three different entities: Clients who have a large amount of data to be stored in multiple clouds and have the permissions to access and manipulate stored data Cloud Service Providers (CSPs) who work together to provide data storage services and have enough storages and computation resources and Trusted Third Party (TTP) who is trusted to store verification parameters and offer public query services for these parameters
Integrity Verification Module:
Integrity verification in Multi cloud that is provided by improving the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, this paper further explore the technique of bilinear
aggregate signature to extend the main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously