Enabling dynamic data and indirect mutual trust for cloud computing

ENABLING DYNAMIC DATA AND INDIRECT MUTUAL TRUST FOR CLOUD COMPUTING STORAGE SYSTEMS

 

ABSTRACT

Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. Thus, SaaS reduces the maintenance cost and mitigates the burden of large local data storage at the organization’s end. A data owner pays for a desired level of security and must get some compensation in case of any misbehavior committed by the CSP. On the other hand, the CSP needs a protection from any false accusation that may be claimed by the owner to get illegal compensations. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. The proposed scheme has four important features: (i) it allows the owner to outsource sensitive data to a CSP, and perform full block-level dynamic operations on the outsourced data, i.e., block modification, insertion, deletion, and append, (ii) it ensures that authorized users (i.e., those who have the right to access the owner’s file) receive the latest version of the outsourced data, (iii) it enables indirect mutual trust between the owner and the CSP, and (iv) it allows the owner to grant or revoke access to the outsourced data. We discuss the security issues of the proposed scheme. Besides, we justify its performance through theoretical analysis and a prototype implementation on Amazon cloud platform to evaluate storage, communication, and computation overheads.

EXISTING SYSTEM:

Commonly, traditional access control techniques assume the existence of the data owner and the storage servers in the same trust domain. This assumption, however, no longer holds when the data is outsourced to a remote CSP, which takes the full charge of the outsourced data management, and resides outside the trust domain of the data owner.

 

DISADVANTAGES OF EXISTING SYSTEM:

CSP needs to be safeguarded from a dishonest owner, who attempts to get illegal compensations by falsely claiming data corruption over cloud servers. This concern, if not properly handled, can cause the CSP to go out of business.

PROPOSED SYSTEM:

In this work, we propose a scheme that addresses important issues related to outsourcing the storage of data, namely dynamic data, newness, mutual trust, and access control.

The remotely stored data can be not only accessed by authorized users, but also updated and scaled by the owner. After updating, authorized users should receive the latest version of the data (newness property), i.e., a technique is required to detect whether the received data is stale. Mutual trust between the data owner and the CSP is another imperative issue, which is addressed in the proposed scheme.

A mechanism is introduced to determine the dishonest party, i.e., misbehavior from any side is detected and the responsible party is identified.

Last but not least, the access control is considered, which allows the owner to grant or revoke access rights to the outsourced data.

ADVANTAGES OF PROPOSED SYSTEM:

(i) It allows a data owner to outsource the data to a CSP, and perform full dynamic operations at the block-level, i.e., it supports operations such as block modification, insertion, deletion, and append;

(ii) It ensures the newness property, i.e., the authorized users receive the most recent version of the outsourced data;

(iii) It establishes indirect mutual trust between the data owner and the CSP since each party resides in a different trust domain; and

(iv) It enforces the access control for the outsourced data

 

MODULES :

 

  • Data Owner Registration
  • Data User Registration
  • TTP (TRUSTED THIRD PARTY) LOGIN
  • CSP(CLOUD SERVICE PROVIDER) LOGIN
  • Download File

 

MODULES DESCRIPTION

 

 DATA OWNER REGISTRATION:

In this module if a owner of data have to store data on a cloud server,he/she should register their details first.These details are maintained in a Database.Then he has to upload the file in a file database. The file which are stored in a database are in an encrypted form. Authorized users can only decode it

 

DATA USER REGISTRATION:

In this module if a user wants to access the data which is stored in a cloud server,he/she should register their details first.These details are maintained in a Database.

 

TTP (TRUSTED THIRD PARTY) LOGIN:

In this module TTP has monitors the data owners file by verifying the data owner’s file and stored the file in a database .Also ttp checks the CSP(CLOUD SERVICE PROVIDER),and find out whether the csp is authorized one or not.

 

 

 

CSP(CLOUD SERVICE PROVIDER) LOGIN:

In this module CSP has to get the key first.Then only he can store the file in his cloud server.Ttp can only check the csp whether the csp is authorized csp or not.If its fake,ttp wont allow the file to store in cloud server.

 

DOWNLOAD FILE:

If the user is an authorized user,he/she can download the file by using key which has been sent by data owner through email.

 


Comments are closed.