Auditing Data integrity and data storage using cloud

ABSTRACT :
Cloud servers is a platform for enabling convenient, on demand network access to a shared pool of configurable server resources (memory, networks, storage, cpu, applications, and services) that can be rapidly provisioned and released with minimal management effort or cloud service provider interactions. Cloud servers are mostly being used; however, data security is one of the major barriers to adoption in cloud storage. Users can store data and used on demand or for the applications without keeping any local copy of the data on there machine. The Cloud servers storage technologies offers the promise of massive cost savings combined with increased IT agility due to pay per consume. However, this technology challenges many traditional approaches to hosting provider and enterprise application design and management. Users can able to upload data on cloud storage without worrying about to check or verify the integrity. Hence integrity auditing for cloud data is more important task to ensure users data integrity. To do this user can resort the TPA (Third Party Auditor) to check the data on the cloud storage is not violating the integrity. TPA is the expertise and having good knowledge and capabilities which users can not able to check. TPA audit the integrity of all files stored on the cloud storage on behalf of the users and inform the results. Users should consider the auditing process will not cause new vulnerability against the users valuable and confidential data also ensures integrity auditing will not cause any resources problem.

INTRODUCTION :
Data integrity auditing is something you need to have on cloud storages. Different threats like a hacker placing a backdoor on storage using applications; change permissions, modify files, or changing your order form to email him a copy of everyone’s credit card and other information while leaving it appear to be functionally normally without any problem. By data auditing process and setting up convenient period scan reporting, this notifies user within hours of when any file was changed, modified, added or removed. It also helps establish an audit trail in the event cloud storage is compromised. Cloud servers has been envisioned as the next-generation information technology architecture for industry ,government, and research, due to configurable server multiple resources and long list of advantages: Auto-Scaling technology,on demand self-service, location independent, resource elasticity, dynamic resources allocation, fast, secure, ubiquitous network access, pay per consume, higher uptime and transference of risk.
Cloud Computing is remodeling the very nature of how businesses use information technology. One elementary side of this paradigm shifting is that data is being centralized or outsourced to the Cloud server storage. From users‟ perspective, including both user and enterprises, uploading data to the cloud server in a flexible on demand manner brings appealing benefits: free from the burden for storage and the security management, global data access over independent geographical locations, and saving of capital expenditure on maintaining security, hardware resources as well as maintenance, etc. whereas Cloud storage makes these features more appealing than ever, it also brings new security vulnerability towards users‟ valuable data. As a result, the integrity of the data in the cloud is being put at risk due to the above different reasons. Although the infrastructures under the cloud provider are much more powerful and secure than local computing devices, they are still facing the different internal and external threats for data integrity. Secondly, there do exist various motivations for hosting provider to behave unfaithfully towards the cloud users regarding the status of their remotely stored data. In short, although outsourcing data to the cloud servers is economically attractive for long term huge data storage, cloud service provider does not provide any guarantee on data integrity and security. This drawback, if not properly addressed, could impede the successful deployment of the cloud server‟s design. As users data on remote storage, traditional cryptographic primitives for the purpose of data security protection cannot be adopted  directly specifically, downloading data on native system for its integrity verification is not a practical solution due to the data transmission cost across the network and security reasons. Considering the large size of the outsourced data store and the user‟s limited resources capability, the work of auditing the data correctness in a cloud server environment can be expensive for the cloud server users. Moreover, the overhead of using cloud server storage should be minimized as much as possible, such that cloud user does not need to perform huge operations to use the cloud server data. For example, it is desirable that cloud users don’t need to worry about the need to verify the integrity of the data before or after the data retrieval. Besides, there are may be multiple user’s accesses the same cloud storage for different purpose and applications, say in an enterprise setting.
To make it ensure the data integrity and minimize the cloud server computation resources as well as online burden on cloud users’, it is of critical importance that to enable public auditing process for cloud data storage, so that cloud users may resort to an independent third party auditor (TPA) to audit the data stored over the cloud storage whenever necessary. The TPA, who has the knowledge and capabilities that users don’t, can check the data integrity of all the data stored on the cloud periodically on behalf of the cloud users, which provides a much more easier and affordable way for the users to ensure their cloud data storage integrity. Moreover, in addition to help users to evaluate the risk of their subscribed cloud data services, the audit result obtained from TPA would also be beneficial for the CSP or hosting provider to improve their security related to storage platform. In a word, auditing services will play an important role for this cloud economy to International Journal of Computer Applications (0975 – 8887) Volume 133 – No.17, January 2016 become fully established; where users will need ways to assess the risk and gain trust in the cloud service providers or cloud storage. Currently, the notion of public auditability has been proposed in the context of ensuring remotely stored data integrity under different system and security models. Auditability process allows a third party, in addition to the user himself, to verify the integrity of remotely stored data of the cloud. However, most of these schemes don‟t consider the privacy protection of user’s data against external auditors. Indeed, TPA may potentially reveal user data information to the auditors. This severe drawback greatly affects the security of these protocols in Cloud storage. From the perspective of protecting data privacy and integrity, the users, who own the data on cloud server and rely on TPA auditing process just for the storage security and integrity of their data, do not want TPA auditing process introducing new vulnerabilities of unauthorized data leakage towards their data security.
Also there are some legal regulations on outsourced data that is, data not to be leaked to external parties. Without properly designed auditing protocols, encryption itself cannot prevent data from “flowing away” towards TPA during the public auditing process. The reason, it does not completely solve the problem of protecting data privacy from external parties but just reduces it to the key management. Vulnerability of unauthorized data leakage still remains a problem due to the potential exposure of decryption keys. Therefore, how to enable an auditing protocol keeping data private, independent to data encryption is the problem which going to tackle in this paper.

PROBLEM STATEMENT
The system model considered is having cloud data storage or files storage involving three different entities. As illustrated in figure, the cloud users who store the huge amounts of data in the form of files on the cloud storage. Files may be in different types such as binary files, data files, logs files, hidden files. The cloud servers, which fully managed by the hosting or cloud service provider for the data storage space and different resources like network connection, backup facilities and different level security. Third entity is TPA (Third Party Auditor) having expertise and knowledge of integrity auditing process.

Cloud Architecture
Cloud Architecture

Cloud service provider is responsible for storage management, maintenance, scalable location independent, higher availability, pay per consume and low cost data storage. Users upload and download data dynamically from storage device space on the cloud server for its own application purpose. Users always need to ensures, data stored over the server is correct and maintained properly. To avoid computational resources and ensure data integrity and security of the data users resort to TPA to audit the data on behalf of user on cloud server.
User‟s data could be hack, changed or modified by internal or external entities. It may includes software bugs, backdoors in different applications, outdated applications versions, plug-in, themes, templates, bugs in system or economically motivated hackers, malicious code and different upload forms. Cloud servers always provide better security but due to different integrity threats towards data like vulnerable functions used in application, outdated applications versions, plugins, themes, templates, bugs in system backdoors in application, applications from the un trusted sources which come with preloaded outdoors, hardware failure, network issue there is changes of data loss. Cloud service provider always try to hide these details from users to their own benefits as well as maintain industry reputation the reason that‟s why cloud users cannot completely trust on the cloud service provider. With the help of auditing procedure user can gain trust as well as audit this data more efficiently.
PROPOSED WORK :
This section presents integrity auditing scheme which provides a complete outsourcing solution of data. After introducing notations considered and brief preliminaries, started from an overview of proposed data Integrity auditing scheme. Then, presenting main scheme and show how to extent the proposed scheme to support integrity auditing for the TPA upon delegations from multiple users. Finally, the proposed how to generalize integrity auditing keeping data privacy scheme and its support of dynamic data. Figure illustrate the overview of integrity auditing structure.

Integrity auditing block diagram

SYSTEM SPECIFICATION / CONFIGURATION 

HARDWARE REQUIREMENT

Processor                     :   Intel Dual Core 2.6 GHZ

Hard Disk                    :   500 GB

RAM                             :   2 GB

Monitor                       :    19 inches

Mouse                          :    Microsoft optical Mouse.

Keyboard                    :    Microsoft 106 keys           

SOFTWARE  REQUIREMENT

Browser                       :           Internet Explorer

Front End                    :           ASP.NET / PHP

Back End                     :           SQL / MY SQL

Leave a Comment

Find the Software you need