Professional Documents
Culture Documents
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Abstract:
Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In a previous work, propose a remote data integrity checking protocol that supports data dynamics. In this paper, we adapt to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance.
Architecture:
Core IEEE Projects (Division of Conceptz) #108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050
Existing System:
In existing system, the clients store the data in server that server is trustworthy and after the third party auditor can audit the client files. So, the third party auditor can stolen the files. Disadvantage: Existing protocols can support both features with the help of a third party auditor.
Proposed System:
We consider a cloud storage system in which there are a client and an untrusted server. The client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote untrusted server. If the server modifies any part of the clients data, the client should be able to detect it; furthermore, any third party verifier should also be able to detect it. In case a third party verifier verifies the integrity of the clients data, the data should be kept private against the third party verifier. Advantages: In this paper, we have the following main contributions: We propose a remote data integrity checking protocol for cloud storage. The proposed protocol inherits the support of data dynamics, and supports public verifiability and privacy against third-party verifiers, while at the same time it doesnt need to use a third-party auditor. We give a security analysis of the proposed protocol, which shows that it is secure against the untrusted server and private against third party verifiers.
Core IEEE Projects (Division of Conceptz) #108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050
Modules:
1. Data Dynamics i. Block Insertion ii. Block Modification iii. Block Deletion 2. public verifiability 3. Metadata Generation 4. Privacy against Third Party Verifiers 1. Data Dynamics: Data dynamics means after clients store their data at the remote server, they can dynamically update their data at later times. At the block level, the main operations are block insertion, block modification and block deletion. i.
ii. iii.
Block Insertion: The Server can insert anything on the clients file. Block Deletion: The Server can delete anything on the clients file. Block Modification: The Server can modify anything on the clients file.
2.
public verifiability: Each and every time the secret key sent to the clients email
and can perform the integrity checking operation. In this definition, we have two
Core IEEE Projects (Division of Conceptz) #108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050
entities: a challenger that stands for either the client or any third party verifier, and an adversary that stands for the untrusted server. Client doesnt ask any secret key from third party.
3.
Metadata key Generation: Let the verifier V wishes to the store the file F. Let this file F consist of n file blocks. We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks have m bits in them. A typical data file F which the client wishes to store in the cloud. Each of the Meta data from the data blocks mi is encrypted by using a suitable algorithm to give a new modified Meta data Mi. Without loss of generality we show this process. The encryption method can be improvised to provide still stronger protection for Clients data. All the Meta data bit blocks that are generated using the procedure are to be concatenated together. This concatenated Meta data should be appended to the file F before storing it at the cloud server. The file F along with the appended Meta data with the cloud.
4. Privacy against Third Party Verifiers: Under the semi-honest model, a third party verifier cannot get
Core IEEE Projects (Division of Conceptz) #108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050
Any information about the clients data m from the protocol execution. Hence, the protocol is private against third party verifiers. If the server modifies any part of the clients data, the client should be able to detect it; furthermore, any third Party verifier should also be able to detect it. In case a third party verifier verifies the integrity of the clients data, the data should be kept private against the third party verifier.
System Specification:
Hardware Requirements:
System : Pentium IV 2.4 GHz.
Core IEEE Projects (Division of Conceptz) #108,5th Main, 4th Cross, Hanumanth Nagar, Basavanagudi, Bangalore-50, Website: www.coreieeeprojects.com contact: 9535052050
Software Requirements:
Operating system Coding Language Data Base : Windows XP. : ASP.Net with C# : SQL Server 2005.
Tags: Core IEEE Projects, ieee Projects, ieee Projects 2011-12,ieee projects for cse, ieee projects for cse 2011, ieee projects 2011, ieee projects 2011 in data mining, ieee projects 2011 on image processing, ieee projects 2011 topics, ieee projects 2011 list, ieee projects 2011 for cse in java, ieee projects 2011 for it, ieee projects 2011 for mca, ieee projects 2011 for computer science, ieee projects on cloud computing, ieee projects 2011 on networking, ieee projects on networking and network security, ieee projects 2011 in Bangalore, ieee projects in java, ieee projects in .net, ieee projects in asp.net, ieee projects in Bangalore, ieee Academic Projects, ieee, ieee Projects Bangalore, ieee Software Projects, Latest IEEE Projects,IEEE Student Projects, IEEE Final year Student Projects, Final Year Projects, ENGINEERING PROJECTS, MCA projects, BE projects, BCA Projects, JAVA projects, J2EE projects, .NET projects, Students projects, ieee Projects in Bangalore, M-tech Internship in Company-tech Projects in Bangalore, Real Time Projects.