SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
Project Title: | SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage. |
Implementation: | Java,MYSQL |
Project Cost: (In Indian Rupees) | Rs.3000/ |
Project Buy Link: | Buy Link |
IEEE BASE PAPER ABSTRACT:
Cloud computing is an emergent paradigm to provide reliable and resilient infrastructure enabling the users (data owners) to store their data and the data consumers (users) can access the data from cloud servers. This paradigm reduces storage and maintenance cost of the data owner. At the same time, the data owner loses the physical control and possession of data which leads to many security risks. Therefore, auditing service to check data integrity in the cloud is essential. This issue has become a challenge as the possession of data needs to be verified while maintaining the privacy. To address these issues this work proposes a secure and efficient privacy preserving provable data possession (SEPDP). Further, we extend SEPDP to support multiple owners, data dynamics and batch verification. The most attractive feature of this scheme is that the auditor can verify the possession of data with low computational overhead.
PROJECT OUTPUT VIDEO:
EXISTING SYSTEM:
-
PDP is introduced that uses random sampling of a few blocks for integrity verification.
-
Shacham et al. designed two different integrity verification mechanisms. One uses pseudo-random function (PRF) which fails to provide public verifiability, while the other one uses boneh–lynn–shacham (BLS) signatures.
-
Both the schemes support blockless verification but fail to provide privacy of the DO’s data. Blockless verification requires linear combination of sampled blocks which gives a clue to TPA to extract the data.
-
To preserve privacy of the data owner supporting blockless verification, Wang et al. proposed a public auditing scheme and extended that to support batch auditing further.
DISADVANTAGES OF EXISTING SYSTEM:
-
Do not achieve privacy preserving requirement.
-
Could not achieve batch auditing requirement which ensures that TPA should be capable enough to deal with the multiple numbers of simultaneous verification requests from different DUs
-
Use pairing based cryptographic operations which are intensive computation and need more time.
PROPOSED SYSTEM:
-
In this work, we propose a secure and efficient privacy preserving provable data possession scheme (SEPDP) for cloud storage. It operates in three phases, namely, key generation, signature generation and auditing phase.
-
We extend SEPDP to support multiple data owners, batch auditing, and dynamic data operations. A probabilistic analysis to detect the integrity of the blocks stored at CSP.
-
We evaluated the performance of the proposed scheme and compared with some of the existing popular mechanisms.
-
We observe that the total time for verification carried out by TPA in the proposed scheme is less than that of the existing schemes. This signifies that SEPDP is efficient and suitable to implement the verification at the low powered devices.
ADVANTAGES OF PROPOSED SYSTEM:
-
Guarantee for Storage Correctness
-
Guarantee for Privacy Preserving
-
Blockless Verification
-
Public Auditability
-
Guarantee for Unforgeability
-
Batch Auditing
-
Data Dynamics
MODULES:
- Data Owner
- Data User
- Cloud Service Provider
- Third Party Auditor
MODULE DESCRIPTIONS:
Data Owner:
Data owners are the entities who store their data in the cloud. DO share a secret key with TPA through a secure channel using any standard technique like SSL/TLS. Every block of the outsourced data is tagged with a signature computed using the private key of DO. We extend SEPDP to support multiple data owners. In Multiple data owner model in which each data owner has its own public key and private key. Each DO signs their corresponding data and stores both data and signatures in the CSP.
Data User:
Data users access and operate on those data kept at CSP. But, operating on the incorrect data leads to faulty result and create chaos which necessitate the integrity verification of remotely stored data. Data Users verification requests can be verified by the TPA.
Cloud Service Provider:
CSP is assumed to be semi-trusted. It executes the protocol without polluting data integrity actively. At the same time, it may lie about the incorrectness of the data to save its reputation. Further, we consider that neither DU nor third party auditor is colluded with CSP to falsify the integrity check. CSP can pass the audit phase only if it possesses the outsourced data intact (same as uploaded by DO).
Third Party Auditor:
In the auditing phase, TPA sends a challenge to CSP and CSP returns a response to proof possession of the data. Thus, the public auditing schemes are a kind of challenge-response protocol. TPA should be capable enough to deal with the multiple numbers of verification requests from different DUs simultaneously. This feature saves both the computation cost of TPA as well as bandwidth consumption between CSP and TPA.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
-
System : Pentium Dual Core.
-
Hard Disk : 120 GB.
-
Monitor : 15’’ LED
-
Input Devices : Keyboard, Mouse
-
Ram : 1 GB
SOFTWARE REQUIREMENTS:
-
Operating system : Windows 7.
-
Coding Language : JAVA/J2EE
-
Tool : Netbeans 7.2.1
-
Database : MYSQL
REFERENCE:
Sanjeet Kumar Nayak, Student Member, IEEE, and Somanath Tripathy, Senior Member, IEEE, “SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage”, IEEE Transactions on Services Computing, 2021.