Toward Secure and Dependable Storage Services in Cloud

ickybiblegroveInternet and Web Development

Nov 3, 2013 (3 years and 10 months ago)

68 views

Toward Secure and Dependable Storage Services in Cloud
Computing

ABSTRACT:


Cloud computing is an emerging computing
model

in which resources of the
computing
communications

are provided as services over the Internet. This paper proposed some
services for data security and access control when users outsource sensitive data for sharing on
cloud servers. This paper addresses this challenging open issue by, on one hand, defining

and
enforcing access policies based on data attributes, and, on the other hand, allowing the data
owner to
assign

most of the computation tasks involved in fine grained data access control to un
-
trusted cloud servers without disclosing the underlying data

contents.
In Order to address this
new problem and further achieve a secure and dependable cloud storage service, we propose in
this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphi
c
token and distributed
coded d
ata
.


Our proposed scheme enables the data owner to delegate tasks of data file re
-
encryption and user secret key update to cloud servers without disclosing data contents or user
access privilege information.
We achieve this goal by exploiti
ng and uniquely combining
techniques

and algorithms (
attribute
-
based encryption (ABE),
Correctness Verification and Error
Localization
,
traditional replication
-
based file distribution,
a
dding random perturbations).


Considering the cloud
data are dynamic in nature, the proposed design further
supports secure

and efficient dynamic operations on outsourced data, including block
modification, deletion, and append.

Our proposed scheme also has salient properties of user
access privilege confid
entiality and user secret key accountability and
achieves fine
-

graininess,
scalability and data confidentiality for data access control in cloud computing
. Extensive analysis
shows that our proposed scheme is highly efficient and provably secures

under e
xisting security
models.



Advantages



Low initial capital investment



Shorter start
-
up time for new services



Lower maintenance and operation costs



Higher utilization through virtualization



Easier disaster recovery



EXISTING SYSTEM:

Our existing solution applies
cryptographic methods by disclosing data decryption keys
only to authorized users.

These solutions inevitably introduce a heavy computation overhead on
the data owner for key distribution and data management when fine grained
data access control
is desired, and thus do not scale well.

LIMITATIONS OF EXISTING SYSTEM:



Software update/patches
-

could change security settings, assigning privileges too low, or
even more alarmingly too high allowing access to your data by other parti
es.



Security concerns. Experts claim that their clouds are 100% secure
-

but it will not be
their head on the block when things go awry. It's often stated that cloud computing
security is better than most enterprises. Also, how do you decide which data to

handle in
the cloud and which to keep to internal systems
-

once decided keeping it secure could
well be a full
-
time task.



Control of your data/system by third
-
party. Data
-

once in the cloud always in the cloud!
Can you be sure that once you delete data

from your cloud account will it not exist any
more... ...or will traces remain in the cloud?




PROPOSED SYSTEM:


In

order to achieve secure, scalable and fine
-
grained access control on outsourced data
in the cloud, we utilize and uniquely

combine the following three advanced cryptographic
techniques:



Key Policy Attribute
-
Based Encryption (KP
-
ABE).



Token Pre computation.



Correctness Verification and Error Localization.



Error Recovery.



Horner algorithm.

HARDWARE AND SOFTWARE REQUIREMENTS

:

Hardware Requirements:




System



: Pentium IV 2.4 GHz.



Hard Disk : 40 GB.



Floppy Drive

: 1.44 Mb.



Monitor

: 15 VGA Colour.



Mouse


: Logitech.



Ram


: 512 Mb.


Software Requirements:




Operating system

:
-

Windows XP.



Coding Language

: DOT NET



Data
Base


: SQL Server 2000.