Advertisement

Data Integrity Verification in Hybrid Cloud Using TTPA

  • T. SubhaEmail author
  • S. Jayashri
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)

Abstract

Cloud computing is a growing technology in the field of IT enterprises that provides storage, compute and network resources as a service over the internet. It allows the user to move their application software and large databases to the data centres offered by multiple cloud service providers. Hence trusted enforcement of data and services out sourced on to cloud is a big challenging issue. In this paper we focus on the auditing mechanism in hybrid cloud using trusted Third Party Auditor (TTPA). Hybrid cloud is the one that connects public and private cloud and is useful when the dynamic scalability of service and data migration is needed. This resource expansion is required in the case of storage space limitation at private cloud, further to extend the outsourcing of data in public cloud. We propose a model in which the data is stored in private cloud, moves in to public cloud in case of storage expansion. In order to ensure the integrity and privacy of data, we utilize a Trusted Third Party Auditor (TTPA) to verify the correctness of the data stored in public cloud on behalf of the client. This enables public auditability of data. As a part of our work we carried out a remedy to attain a secure cloud storage services along with high secure data forwarding scheme among the cloud users. The Proposed code based scheme allows the user to verify the CIA (Confidentiality, Integrity and Availability) characteristics of the data with auditing mechanism. It guarantees strong cloud storage correctness, and also simultaneously predicts the misbehaving servers. This scheme is implemented on platform of Amazon web services, a universally accepted cloud vendor and the results are proven effective. This scheme works for all video, image, text files and supports dynamic operations also.

Keywords

Cloud Storage Cloud Service Provider Public Cloud Message Authentication Code Private Cloud 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  2. 2.
    Amazon.com, Amazon Web Services (AWS) (2009), http://aws.amazon.com
  3. 3.
    Q. Wang, C. Wang, K. Ren, W. Lou, Ensuring data storage security in cloud computing, in Proceedings of 17th International Workshop Quality of Service (IWQoS’09), 2009, IEEEGoogle Scholar
  4. 4.
    D. Kavitha, G. Divya Zion, Remote sensing data as service in hybrid clouds: security challenges and trusted third party auditing mechanisms. Int. J. Adv. Res. Computer Communication Eng. 1(7), 481–486 (2012)Google Scholar
  5. 5.
    M. Arrington, Gmail disaster: reports of mass email deletions (2006), http://www.techcrunch.com/2006/12/28/gmail-disaster-reports of-mass-email-deletions
  6. 6.
    G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference Computer and Communications Security (CCS’07), 2007, pp. 598–609. ACM NewyorkGoogle Scholar
  7. 7.
    M.A. Shah, M. Baker, J.C. Mogul, R. Swaminathan, Auditing to keep online storage services honest, in Proceedings of the 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), 2007, pp. 1–6Google Scholar
  8. 8.
    Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proceedings of the 14th European Conference Research in Computer Security (ESORICS ’09), 2009, pp. 355–370. Springer-Verlag Berlin HeidelbergGoogle Scholar
  9. 9.
    K.B. Jachak, S.K. Korde, P.P. Ghorpade, G.J. Gagare, Homomorphic authentication with random masking technique ensuring privacy & security in cloud computing BIOINFO security informatics, ISSN: 2249-9423, 2(2) (2012)Google Scholar
  10. 10.
    K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)CrossRefGoogle Scholar
  11. 11.
    M.A. Shah, R. Swaminathan, M. Baker, Privacy preserving audit & extraction of digital contents, HP Labs, Technical Report No. HPL-2008-32Google Scholar
  12. 12.
    K. Kajendran, J. Jeyaseelan, J. Jakkulin Joshi, An approach for secured data storage using cloud computing (2011) International Journal of Computer Trends and Technology, ISSN: 2231-2803, pp. 91–96Google Scholar
  13. 13.
    Y. Zhu, S. Wang et al., Secure collaborative integrity verification for hybrid cloud environments. Int. J. Cooper. Info. Syst. 21(3), 165–197 (2012). World Scientific Publishing Company. doi: 10.1142/S0218843012410018

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information TechnologyAnna UniversityChennaiIndia
  2. 2.Department of Electronics and Communication EngineeringAdhiparasakthi Engineering CollegeChennaiIndia

Personalised recommendations