Вы находитесь на странице: 1из 15

DOMAIN GUIDED BY

: CLOUD COMPUTING
: Mr.R.NARESH M.E

ENSURING RELIABLE DATA SECURITY IN CLOUD COMPUTING


PRESENTED BY

D.DINESH

J.KALAIYARASAN

J.PAUL ANBURAJ

TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING


IEEE transactions on services computing, Vol 5,no.2,april-june 2012

ABSTRACT
Enjoy the cloud applications without the burden of local hardware and software management. Cloud storage leads to physical possession of the users outsourced data , which poses an inevitable security risks towards the correctness of the data in cloud. As a solution to this problem a flexible distributed storage integrity auditing mechanism is proposed. This scheme utilizes homomorphic tokens and distributed erasure-coded data. This approach reduces the computation cost along with the achievement of data error localization. The design also supports secure and efficient dynamic operations on outsourced data.

INTRODUCTION
What is CLOUD.?
Today, the cloud seems to have become a buzzword. To put it simply, any standardized service that is provided via the Internet is cloud

TYPES of CLOUD: Private cloud Community cloud Public cloud Hybrid cloud

Cont
Classification of Cloud Services
Software-as-a-Service (Saas) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service

(IaaS)

Cont
The ever cheaper and more powerful processors together with software as a service(SaaS) computing architecture are transforming data centers into pools of computing service on a huge scale. Moving data into cloud offers great convenience to users, thereby eliminating the responsibility of local machines for data maintenance. Although outsourcing data into cloud is economically attractive for the cost and complexity of long term large scale data storage.

Cont
Clouds lacking of offering strong assurance of data integrity and availability may impede its adoption . The scheme aims at providing data security and locating the erroneous servers.

SYSTEM MODEL
User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. Cloud service provider (CSP): a CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live cloud computing systems. Third party auditor (TPA): an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request.

Data flow

LITERATURE SURVEY

Reference Proof of Retrievability for Large files

Year Oct 2007

Merits Spot checking and error correcting code to ensure possession and retrievability of files Symmetric key based cryptography for auditing the files

Demerits Proposed scheme focuses only on static data

Scalable and Efficient Provable Data Possession

2008

Focuses only on single server scenario and does not guarantee data availability at times of failure proposed method requires exponentiation over the entire data file which is impractical

Demonstrating Data possession and Uncheatable Data Transfer

2006

Verify Data integrity using RSA based hash function

OBJECTIVES
To provide the localization of data error using the challenge response protocol. To supports secure and efficient dynamic operations on data blocks, including: update, delete and append. Achieving the storage correctness assurance by utilizing the homomorphic token with distributed verification of erasure-coded data.

ALGORITHMS used
Token Pre-computation Correctness Verification and Error Localization Error recovery

REFERENCES
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing, in Proc. of IWQoS09, July 2009, pp. 19. [2] Amazon.com, Amazon web services (aws), Online at http:// aws.amazon.com/, 2009. [3] Sun Microsystems, Inc., Building customer trust in cloud computing with transparent security, Online at https://www.sun.com/offers/details/sun transparency.xml , November 2009. [4] M. Arrington, Gmail disaster: Reports of mass email deletions, Online at http://www.techcrunch.com/2006/12/28/gmail-disasterreports-of-mass-emaildeletions/ , December 2006. [5] J. Kincaid, MediaMax/TheLinkup Closes Its Doors, Online at http://www.techcrunch.com/2008/07/10/mediamaxthelinkup-closes-its-doors/ , July 2008.

Вам также может понравиться