Aim
Ā Ā Ā Ā Ā Ā Ā Ā The main aim of this project is to provide a reliable and secure cloud service and also increase trustworthiness of certifications by Continuous Automatic Auditing.
Introduction
Ā Ā Ā Ā Ā Ā Ā Ā Cloud Computing enables the remote users to access data, services, and applications in on-demand from the shared pool of configurable computing resources, without the consideration of storage, hardware and software management. On the other hand, it is not easy for cloud users to identify whether Cloud Service Provider’s (CSP) tag along with the data security legal expectations. So, cloud users could not rely on CSP’s in terms of trust. So, it is significant to build a secure and efficient data auditing framework for increasing and maintaining cloud users trust with CSP. Researchers suggested introducing Third Party Auditor (TPA) on behalf of cloud user for verifying the outsourced data integrity, which may reduce the computation overhead of cloud users. In this work, we proposed a novel integrity verification framework for securing cloud storage based on Ternary Hash Tree (THT) and Replica based Ternary Hash Tree (R-THT), which will be used by TPA to perform data auditing. Differing from existing work, the proposed framework performs Block-level, File-level and Replica-level auditing with tree block ordering, storage block ordering for verifying the data integrity and ensuring data availability in the cloud. We further extend our framework to support error localization with data correctness, dynamic updates with block update, insert and delete operations in the cloud. The structure of THT and R-THT will reduce the computation cost and provide efficiency in data updates compared to the existing schemes. The security analysis of the proposed public auditing framework indicates the achievement of desired properties and performance has been evaluated with the detailed experiment set. The results show that the proposed secure cloud auditing framework is highly secure and efficient in storage, communication and computation costs.
Existing System
Ā Ā Ā Ā Ā Ā In cloud computing, remote data integrity checking is an important security problem. The clientās massive data is outside his control. The malicious cloud server may corrupt the clientās data in order to gain more benefits. However, cloud services are part of an ever changing environment, resulting from fast technology life cycles and inherent cloud computing (CC) characteristics, like on-demand provisioning and entangled supply chains. Hence, such long validity periods may put in doubt reliability of issued certifications. And also cloud service customers do not longer possess their data locally, assuring that their data is being correctly stored and integrity is maintained in cloud environments is of critical importance. Data integrity may be threatened by, for example, malicious insiders, data loss, technical failures, and by external attackers.
Problem Definition
- Long validity periods may put in doubt reliability of issued certifications.
- Data Integrity.
- Procrastinating third-party auditors.
Proposed System
Ā Ā Ā Ā Ā Ā Ā In MultiCloud environment, remote data integrity checking is required to secure userās data. User will upload file to Cloud. This file is split into blocks using Dynamic Block generation Algorithm. The Blocks are stored in Ternary Hash Tree (THT) format. The blocks have a parents node and child node.Ā File Allocation Table (FAT) File System has proper Indexing and Metadataās for the different Chunks of the Cloud Storage. Here the auditor agrees to inspect logs, which are routinely created during monitoring operations by services providers to assess certification adherence. If Attacker corrupts data in MultiCloud, the continuous auditing process helps the verifier to perform Block and File level checking for remote data Integrity Checking using Verifiable Data Integrity Checking Algorithm. The auditing processes have a flow, first the parent block checking. If the parent block have any corrupted file then the child node auditing. If the child nodes have any corrupted file the File recovery is done by the Verifier automatically if the data gets corrupted during checking. Users can complaint cloud for file recovery.
Ā Advantages:
- The proposed framework performs Block-level, File-level and Replica-level auditing with tree block ordering.
- Our framework to support error localization with data correctness, dynamic updates with block update, insert and delete operations in the cloud.
Reviews
There are no reviews yet.