You are on page 1of 6

To enable privacy-preserving public auditing for cloud data storage under the aforementioned model, our protocol design

should achieve the following security and performance guarantee: 1) Public auditability: to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional on-line burden to the cloud users. ) !torage correctness: to ensure that there e"ists no cheating cloud server that can pass the audit from TPA without indeed storing users# data intact. $) Privacy-preserving: to ensure that there e"ists no way for TPA to derive users# data content from the information collected during the auditing process. %) &atch auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously. ') (ightweight: to allow TPA to perform auditing with minimum communication and computation overhead.

Existing System: To securely introduce an effective third party auditor )TPA), the following two fundamental re*uirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user+ ) The third party auditing process should bring in no new vulnerabilities towards user data privacy. Proposed System: ,n this paper, we utili-e the public .ey based homomorphic authenticator and uni*uely integrate it with random mas. techni*ue to achieve a privacy-preserving public auditing system for cloud data storage security while .eeping all above re*uirements in mind. To support efficient /andling of multiple auditing tas.s, we further e"plore the techni*ue of bilinear aggregate signature to e"tend our main result into a multi-user setting, where TPA can perform multiple auditing tas.s simultaneously. 0"tensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. 1e also show how to e"tent our main scheme to support batch auditing for TPA upon delegations from multi-users.

Algorithm: A public auditing scheme consists of four algorithms )2ey3en, !ig3en, 3enProof, and 4erifyProof). 2ey3en: .ey generation algorithm that is run by the user to setup the scheme !ig3en: used by the user to generate verification metadata, which may consist of 5A6, signatures or other information used for auditing 3enProof: run by the cloud server to generate a proof of data storage correctness 4erifyProof: run by the TPA to audit the proof from the cloud server Flowchart:

Modules: 1. Privacy-Preserving Public Auditing Module: /omomorphic authenticators are unforgeable verification metadata generated from individual data bloc.s, which can be securely aggregated in such a way to assure an auditor that a linear combination of data bloc.s is correctly computed by verifying only the aggregated authenticator. 7verview to achieve privacy-preserving public auditing, we propose to uni*uely integrate the homomorphic authenticator with random mas. techni*ue. ,n our protocol, the linear combination of sampled bloc.s in the server#s response is mas.ed with randomness generated by a pseudo random function )P89). The proposed scheme is as follows: !etup Phase Audit Phase
. Batch Auditing Module:

1ith the establishment of privacy-preserving public auditing in 6loud 6omputing, TPA may concurrently handle multiple auditing delegations upon different users# re*uests. The individual auditing of these tas.s for TPA can be tedious and very inefficient. &atch auditing not only allows TPA to perform the multiple auditing tas.s simultaneously, but also greatly reduces the computation cost on the TPA side. ata ynamics Module: /ence, supporting data dynamics for privacypreserving public ris. auditing is also of paramount importance. :ow we show how our main scheme can be adapted to build upon the e"isting wor. to support data dynamics, including bloc. level operations of modification, deletion and insertion. 1e can adopt this techni*ue in our design to achieve privacy-preserving public ris. auditing with support of data dynamics.
$.

!ardware "e#uired: !ystem /ard ;is. 9loppy ;rive 5onitor 5ouse 2eyboard 8A5 : : : : : : : Pentium ,4 .% 3/%< 3& 1.%% 5& 1' 43A color (ogitech. 11< .eys enhanced '= 5&

So$tware "e#uired: 7>! (anguage ;ata &ase : 1indows ?P. : Asp.:et, c@. : !*l !erver <<'.

You might also like