Você está na página 1de 21

Data Integrity Proofs in Cloud Storage

Introduction
The proof of data integrity protocol just checks the integrity of data i.e.., if the data has been illegally modified or deleted.
It means that the client of the data moves its data

to a third party cloud storage server with less cost and provide it back to the client whenever required.

It can also assure a reliable storage of important data by keeping multiple copies of the data there by reducing the chance of loosing data by hardware failures.
In this paper we deal with the problem of

implementing a protocol for obtaining a proof of data possession in the cloud is referred as proofs of retrievability(PORs).

Cloud storage
Cloud Storage Provider
Storage server Web server

Mostly static data: Back-up Archival

Is my data available ?

Client
4

It

tries to obtain and verify a proof that the data that is stored by a user at a remote data storage in the cloud is not modified by the archive and there by the integrity of the data is assured.

Proofs of Retrievability (PORs)


Cloud Storage Provider

The simplest Proof of retrivability (POR) scheme can be made using a keyed hash function hk(F ).

F
Encoding

Corrects small corruption

Client

Proofs of Retrievability (PORs)


Cloud Storage Provider

F F

Detects large corruption

Challenge

Response

Client

Requires integrity k checks on server or client


7

When PORs fail


Cloud Storage Provider

F F

decoder
Challenge Response

Unrecoverable
Client
k

Amazon S3

Replicate across multiple providers Google EMC Atmos


F F
Nave approach

F
Client
Sample and check consistency across providers
11

Reduce storage overhead


F
decode
n fragments m fragments

dispersal (n,m)

F
Client
12

Increasing file lifetime with MACs


P1 P2 P3 P4 P5

MAC

MAC

MAC

MAC

MAC

Client

Can we reduce storage overhead?

13

These kinds of proofs are very much helpful in

peer-to-peer storage systems, network file systems, long- term archives, web-service object stores, and database systems.

The scheme should be able to produce a proof without the need for the server to access the entire file or the client retrieving the entire file from the server.

To check if the integrity of the file F is lost the verifier releases the secret key K to the cloud archive and asks it to compute and return the value of hk(F ). This scheme is very simple and easily implemented. The main drawback of this scheme are the high resource costs it requires for the implementation.

DATA INTEGRITY PROOF IN CLOUD BASED ON SELECTING RANDOM BITS IN DATA BLOCKS

There are 2 phases in this scheme. 1) Setup phase Generation of meta-data Encrypting the meta data Appending of meta data 2) Verification phase

The metadata sent by the cloud is decrypted by using the number i and the corresponding bit in this decrypted metadata is compared with the bit that is sent by the cloud. Any mismatch between the two would mean a loss of the integrity of the clients data at the cloud storage.

Advantages

It helps in reducing the maintenance and storage cost. It avoids local storage of data. It reduces the chance of loosing data by hardware failures.

Conclusion

We worked to facilitate the client in getting a proof of integrity of the data which he wishes to store in the cloud storage servers with less minimum costs and efforts. It was developed to reduce the computational and storage overhead of the client as well as to minimize the computational overhead of the cloud storage server.

It proves advantageous to thin clients like PDAs and mobile phones.


In our scheme the encrypting process is very much limited to only a fraction of the whole data thereby saving on the computational time of the client. But in our scheme the archive just need to fetch and send few bits of data to the client.

References and Bibilography


E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity "Practical techniques for searches on encrypted data," 2005 IEEE Symposium

A. Juels and B. S. Kaliski, Jr., "Pors: proofs of retrievability for large files,"
www.inspireengine.com www.seminars.com,e.t.c.

Thank You

By

Gude.Usharani
Reg No:118R1D0518

Você também pode gostar