SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Applications and services
that run on a distributed network
using virtualized resources and accessed
by common internet protocols and
network standards
Cloud Computing is a paradigm in
which information is permanently
stored in servers on the internet and
can be accessed from anywhere
Data center
Office space
Servers and storages
Team of technical personnel's
Coolants
Network
Power
Provides all the infrastructure needed to run
applications over the internet
 Increased storage
 Reduced cost
 Flexibility
 Increased mobility
 Highly automated
-> Sometimes referred to as "on-demand software" is a
software delivery model in which software and its
associated data are hosted centrally and are typically
accessed by users
• ….enables you to create web
applications quickly, without the
• cost and complexity of buying and
managing the underlying software
or hardware…
No Frequent updates
Inexpensive
Data Integrity
and
Data Privacy
Availability
and
Reliability
Bandwidth and
Latency guarantees
Portability
and
Compliance
Cloud storage moves the user’s data to large data
centers, which are remotely located, on which the user
does not have any control
However there are lot of security
issues which need to be considered
 Data integrity
 Authentication
 Small devices like PDA’s, mobiles, and laptops are
associated with limited battery power and computation
speed
We provide a scheme which gives a proof of data
integrity in the cloud through which the user can
verify the correctness of his data, this proof can be
termed as Proof of Retrievability (POR)
 This enables individual to
entertain
 Economic advantages
 Zero Maintenance
Note:
-> Our scheme just checks the integrity (if the data is
illegally modified) only of static data…
 This proof can be agreed
upon by both the cloud and
the customer and can be
incorporated in SLA.
SLA is part of service
contract where the level of
services being offered is
formally defined.
Key generator:
A random key is generated
Encryption:
A metadata of the file is
generated and is encrypted using any suitable algorithm
Archive:
It is the data center where the data is outsourced
Challenge:
Verification of data integrity by the user…
Response:
Proof of data integrity by data center
A simplest Proof of Retrievability can be made
using hash key function
File (F)
Data Center
(archive)
Cryptographic
Hash Function
Hk(F)
User
DB
Hash
Secret
key (k)
Encrypted
file(~f)
StoredRetrieves
C
H
A
L
L
E
N
G
E
Response
• Computing hash value for moderately large file
might be overhead for some device like Mobiles,
PDA’s and Laptops
• For each verification request from
client the archive has to process
the entire file
• High resource cost and lot of ambiguity as a result
of maintaining secret key and number of hash
keys….
Proposed a theory to proof the retrievability for
large files using sentinels…. According to them
1 2 3 4 5 6 7
Data File( f )
s
s
s s
s
s s
s s
s
s
s
s
s s
s
s s
s
s s
Data file with
seven blocks
Inserting sentinels at
different positions and
noting their position,
present at different
blocks
File(~f)
Encryption
(~F )
Data
Archive
To hide the
position of
sentinels
Computationally burdensome for entire file to be
encrypted for small devices
This scheme is best suited for encrypted files
Data
Center
Cloud
Storage
Client
In this we provide a scheme of data integrity , which
the customer can utilize to check the correctness of his
data by including SLA
M bits M bits M bits M bits M bits M bits
File (F) with n
blocks, and each
block of size M bits
K bits
K<<<M, K bit positions
are noted Where K is
user defined
E
M1
K bits
E
M2
K bits
E
M3
K bits
E
M4
K bits
E
M5
K bits
E
M6
Metadata
Encrypting k bits using
any appropriate
algorithm
Generation of
individual metadata
File (F) Metadata
Data
Center
File is appended
with metadata
New file (~F)
is stored at
data center
Client challenges
by specifying (ith)
block of file and
the jth bit of i
Response and
challenge should
be same to
accept the file
Our scheme is only for static data
Developing for dynamic data will
be a future challenge
Data Integrity proofs in cloud storage

Weitere ähnliche Inhalte

Was ist angesagt?

Data Mining : Concepts
Data Mining : ConceptsData Mining : Concepts
Data Mining : ConceptsPragya Pandey
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud ComputingPravin Sable
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxDr Geetha Mohan
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyredpel dot com
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing Varun Vijay
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Data mining
Data mining Data mining
Data mining AthiraR23
 
Digital Twin based Product Development in Life Science Industry – Sustainable...
Digital Twin based Product Development in Life Science Industry – Sustainable...Digital Twin based Product Development in Life Science Industry – Sustainable...
Digital Twin based Product Development in Life Science Industry – Sustainable...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot systemRadha Mahalle
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud ForensicsGayan Weerarathna
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
introduction to cloudsim
introduction to cloudsimintroduction to cloudsim
introduction to cloudsimJassika
 

Was ist angesagt? (20)

Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Data Mining : Concepts
Data Mining : ConceptsData Mining : Concepts
Data Mining : Concepts
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Data mining
Data mining Data mining
Data mining
 
Digital Twin based Product Development in Life Science Industry – Sustainable...
Digital Twin based Product Development in Life Science Industry – Sustainable...Digital Twin based Product Development in Life Science Industry – Sustainable...
Digital Twin based Product Development in Life Science Industry – Sustainable...
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot system
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
introduction to cloudsim
introduction to cloudsimintroduction to cloudsim
introduction to cloudsim
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 

Andere mochten auch

DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTSDEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTSNexgen Technology
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storageRatheesh Kumar R
 
Fog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computingFog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computingieeepondy
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Storage Cloud and Spectrum deck March 2016
Storage Cloud and Spectrum deck March 2016Storage Cloud and Spectrum deck March 2016
Storage Cloud and Spectrum deck March 2016Joe Krotz
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael Enescu
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
(STG401) Amazon S3 Deep Dive & Best Practices
(STG401) Amazon S3 Deep Dive & Best Practices(STG401) Amazon S3 Deep Dive & Best Practices
(STG401) Amazon S3 Deep Dive & Best PracticesAmazon Web Services
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 

Andere mochten auch (20)

DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTSDEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Fog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computingFog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Storage Cloud and Spectrum deck March 2016
Storage Cloud and Spectrum deck March 2016Storage Cloud and Spectrum deck March 2016
Storage Cloud and Spectrum deck March 2016
 
Data integrity challenges and solutions
Data integrity challenges and solutionsData integrity challenges and solutions
Data integrity challenges and solutions
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
(STG401) Amazon S3 Deep Dive & Best Practices
(STG401) Amazon S3 Deep Dive & Best Practices(STG401) Amazon S3 Deep Dive & Best Practices
(STG401) Amazon S3 Deep Dive & Best Practices
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Fog computing
Fog computingFog computing
Fog computing
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 

Ähnlich wie Data Integrity proofs in cloud storage

Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”Hardway Hou
 
Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeOpen Source Experience
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
Slides: Accelerating Queries on Cloud Data Lakes
Slides: Accelerating Queries on Cloud Data LakesSlides: Accelerating Queries on Cloud Data Lakes
Slides: Accelerating Queries on Cloud Data LakesDATAVERSITY
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 

Ähnlich wie Data Integrity proofs in cloud storage (20)

Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edge
 
EGI Services
EGI Services EGI Services
EGI Services
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
234 237
234 237234 237
234 237
 
234 237
234 237234 237
234 237
 
Slides: Accelerating Queries on Cloud Data Lakes
Slides: Accelerating Queries on Cloud Data LakesSlides: Accelerating Queries on Cloud Data Lakes
Slides: Accelerating Queries on Cloud Data Lakes
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 

Kürzlich hochgeladen

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Data Integrity proofs in cloud storage

  • 1.
  • 2.
  • 3.
  • 4. Applications and services that run on a distributed network using virtualized resources and accessed by common internet protocols and network standards Cloud Computing is a paradigm in which information is permanently stored in servers on the internet and can be accessed from anywhere
  • 5.
  • 6. Data center Office space Servers and storages Team of technical personnel's Coolants Network Power
  • 7. Provides all the infrastructure needed to run applications over the internet  Increased storage  Reduced cost  Flexibility  Increased mobility  Highly automated
  • 8. -> Sometimes referred to as "on-demand software" is a software delivery model in which software and its associated data are hosted centrally and are typically accessed by users
  • 9. • ….enables you to create web applications quickly, without the • cost and complexity of buying and managing the underlying software or hardware… No Frequent updates Inexpensive
  • 10.
  • 11. Data Integrity and Data Privacy Availability and Reliability Bandwidth and Latency guarantees Portability and Compliance
  • 12. Cloud storage moves the user’s data to large data centers, which are remotely located, on which the user does not have any control However there are lot of security issues which need to be considered  Data integrity  Authentication  Small devices like PDA’s, mobiles, and laptops are associated with limited battery power and computation speed
  • 13. We provide a scheme which gives a proof of data integrity in the cloud through which the user can verify the correctness of his data, this proof can be termed as Proof of Retrievability (POR)  This enables individual to entertain  Economic advantages  Zero Maintenance Note: -> Our scheme just checks the integrity (if the data is illegally modified) only of static data…
  • 14.  This proof can be agreed upon by both the cloud and the customer and can be incorporated in SLA. SLA is part of service contract where the level of services being offered is formally defined.
  • 15. Key generator: A random key is generated Encryption: A metadata of the file is generated and is encrypted using any suitable algorithm Archive: It is the data center where the data is outsourced Challenge: Verification of data integrity by the user… Response: Proof of data integrity by data center
  • 16. A simplest Proof of Retrievability can be made using hash key function File (F) Data Center (archive) Cryptographic Hash Function Hk(F) User DB Hash Secret key (k) Encrypted file(~f) StoredRetrieves C H A L L E N G E Response
  • 17. • Computing hash value for moderately large file might be overhead for some device like Mobiles, PDA’s and Laptops • For each verification request from client the archive has to process the entire file • High resource cost and lot of ambiguity as a result of maintaining secret key and number of hash keys….
  • 18. Proposed a theory to proof the retrievability for large files using sentinels…. According to them 1 2 3 4 5 6 7 Data File( f ) s s s s s s s s s s s s s s s s s s s s s Data file with seven blocks Inserting sentinels at different positions and noting their position, present at different blocks File(~f) Encryption (~F ) Data Archive To hide the position of sentinels
  • 19. Computationally burdensome for entire file to be encrypted for small devices This scheme is best suited for encrypted files Data Center Cloud Storage Client
  • 20. In this we provide a scheme of data integrity , which the customer can utilize to check the correctness of his data by including SLA
  • 21. M bits M bits M bits M bits M bits M bits File (F) with n blocks, and each block of size M bits K bits K<<<M, K bit positions are noted Where K is user defined E M1 K bits E M2 K bits E M3 K bits E M4 K bits E M5 K bits E M6 Metadata Encrypting k bits using any appropriate algorithm Generation of individual metadata
  • 22. File (F) Metadata Data Center File is appended with metadata New file (~F) is stored at data center Client challenges by specifying (ith) block of file and the jth bit of i Response and challenge should be same to accept the file
  • 23.
  • 24.
  • 25. Our scheme is only for static data Developing for dynamic data will be a future challenge