Tuesday, January 13, 2015
2 comments

Secure Data Storage on Cloud

7:18 AM
 Introduction to Cloud

           Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.











Current Existing System
From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.

Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing.
Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification , appending ,reordering etc.














Our approach

Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy.
This unique attribute poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service.
We have to ensure the correctness of users' data in the cloud as well.
















Scope

An effective and flexible distributed scheme  utilizing the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks. The proposed scheme is highly efficient and resilient against failure, malicious data modification attack, and even server colluding attacks.
















OUR PROPOSED SYSTEM

We propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication and storage overhead as compared to the traditional replication-based file distribution techniques.
Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error.

Unlike most prior works for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append.

Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

We are using 1) Simple Encrypt Decrypt Module
                      2) HTML Binary Text Steganography 
                      3) Image Steganography 
for Secure Data storage on Cloud

                                           Our System Architecture



2 comments:

  1. Hey guys I just want to say that I got an official notification that iTunes is providing us free gift cards codes iTunes Gift Card Codes

    ReplyDelete
  2. Your content helped me a lot to take my doubts, amazing content, thank you very much for sharing.
    free minecraft gift codes generator

    ReplyDelete

Feature

 
Toggle Footer
Top