Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

0
947
Identity Based Data Outsourcing with Comprehensive Auditing in Clouds

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

Abstract

Cloud storage system provides distributed customers with facilitative file storage and sharing services. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds To address issues of integrity, controllable outsourcing, and origin auditing on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous to existing proposals in securing outsourced data.

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds First, our IBDO scheme allows a user to authorize dedicated proxies to upload data on their behalf to the cloud storage server, e.g., a company may authorize some employees to upload files to the company’s cloud account in a controlled manner. The proxies are identified and authorized with their recognizable identities, eliminating complicated certificate management in the usual secure distributed computing systems.

Advantages 

  • Compared to a lot of its predecessors, which only provide binary results about the storage state across the cloud servers, the challenge-response protocol in our work more provides the localization of data error.
  • Unlike most prior works used for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append.
  • Extensive protection and act analysis demonstrate that the proposed scheme is extremely efficient and resilient beside Byzantine failure, malicious data modification attack, and even server colluding attacks.

Disadvantage 

  • Data security protection cannot be directly user’s control.
  • Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data.
  • Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety,
  • This is not just a third party data warehouse.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
 
RAM                      : 256 MB(min)
 
Hard Disk              : 20 GB
 
Floppy Drive          : 1.44 MB
 
Key Board             : Standard Windows Keyboard
 
Mouse                  : Two or Three Button Mouse
 
Monitor                : SVGA
 
S/W System Configuration
 
 
Platform                     :  cloud computing

 
Operating system       : Windows Xp,7,
 
Server                       : WAMP/Apache
 
Working on                : Browser Like Firefox, IE

Conclusion

We investigated cloud storage proofs in a multi-user setting. We introduced the notion of identity-based data outsourcing and proposed a secure IBDO scheme. It allows the file owner to delegate their outsourcing capability to proxies. Only the authorized proxy can process and outsource the file on behalf of the file owner. A public auditor can verify the origin of the file and the integrity of the file.