An Efficient PDP Scheme for Distributed Cloud Storage

IJMER
IJMERIJMER

International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education. International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.

International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2317 | Page
Jimnisha Shaik1
, Syed Gulam Gouse2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and
software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing
resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite
web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as
traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by
many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud
Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud
storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a
public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in
storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic
verifiable response and hash index hierarchy.
INDEX TERMS: Cloud, Hash index, Integrity, PDP.
I. INTRODUCTION
In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational
speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which
are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level,
task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core
and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one
instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi-
processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that
each processing element can execute its part of the algorithm simultaneously with others. There is another important concept
which is responsible for the effective and efficient computation of our problem is, distributed system. Using high
performance computers connected by using high speed communication links, it is possible to build a single system consisting
of multiple computers and using it as a single consolidated system.
In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are
a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent
transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be
transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage
and all the processing is done locally. All systems are interconnected using a LAN.
In any kind of computer system which involves data storage and retrieval, availability is one of the major security
issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of
retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of
client‟s data without being downloading it. The proof-checking of the data without being downloading is very important,
especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted
or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only
for single cloud storage, but not for the distributed-cloud storage environment.
II. RELATED WORK
To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic
approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first
proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a
static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a
dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash
function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses
due to the lack of the randomness in the challenges.
In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n)
communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of
Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which
relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and
models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system
that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code
(IP-ECC), which improves the security and efficiency of the existing tools, like POR.
An Efficient PDP Scheme for Distributed Cloud Storage
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2318 | Page
III. PROPOSED METHOD
In this section, we introduce the principles of our cooperative provable data possession for distributed clouds,
including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme.
A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that
f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This
notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and
mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj.
B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and
an interactive proof system, S′ = (K, T, P).
KeyGen(
k
1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk);
TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file
F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H)
is a set of verification parameters u and an index hierarchy
H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk.
Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that
is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk
and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit
{0|1} denoting false and true where,  pPK
denotes the collaborative computing in Pk  P.
C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1,
which has following characters:
 A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature
tags can be reduced with the order of s.
 The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost
importance for large or huge files.
 This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response,
which minimizes network communication overheads.
Figure 1: The fragment structure of Cooperative PDP model
The above structure, considered as a common representation for some existing schemes in [1][7], can be converted
to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical
CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates
favorable conditions for the architecture of the CSPs.
D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This
architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored
resources. Three layers can be described as follows:
 First Layer (Express Layer): It offers an abstract representation of the stored resources
 Second Layer (Service Layer): It promptly offers and manages cloud storage services
 Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645
www.ijmer.com 2319 | Page
Figure 2: The architecture of Cooperative PDP model
This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a
simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the
differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three
CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage
Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1.
Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some
special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in
dashed line) and discontinuous blocks (as shown on a non continuous color).
IV. CONCLUSION
With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable
data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge
proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing
their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new
method for data integrity verification in out sourcing data storage on distributed cloud environment.
REFERENCES
[1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at
untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.
Syverson, Eds. ACM, 2007, pp. 598–609.
[2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications
Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
[3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the
4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.
[4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference
onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
[5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on
Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.
[6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in
Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127.
[7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.

Recomendados

International Journal of Computational Engineering Research(IJCER) von
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 views5 Folien
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... von
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
411 views4 Folien
Cryptographic Cloud Storage with Hadoop Implementation von
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationIOSR Journals
430 views7 Folien
Data integrity proof techniques in cloud storage von
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
831 views5 Folien
Mn3422372248 von
Mn3422372248Mn3422372248
Mn3422372248IJERA Editor
360 views12 Folien
Ijcnc050208 von
Ijcnc050208Ijcnc050208
Ijcnc050208IJCNCJournal
283 views9 Folien

Más contenido relacionado

Was ist angesagt?

Iaetsd secured and efficient data scheduling of intermediate data sets von
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
166 views5 Folien
A Hybrid Cloud Approach for Secure Authorized Deduplication von
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
369 views11 Folien
Seed block algorithm von
Seed block algorithmSeed block algorithm
Seed block algorithmDipak Badhe
4.5K views24 Folien
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage von
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
21 views5 Folien
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... von
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
70 views13 Folien
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases von
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
300 views4 Folien

Was ist angesagt?(20)

Iaetsd secured and efficient data scheduling of intermediate data sets von Iaetsd Iaetsd
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd166 views
A Hybrid Cloud Approach for Secure Authorized Deduplication von 1crore projects
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects369 views
Seed block algorithm von Dipak Badhe
Seed block algorithmSeed block algorithm
Seed block algorithm
Dipak Badhe4.5K views
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage von IRJET Journal
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal21 views
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... von 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects70 views
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases von ijircee
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee300 views
seed block algorithm von Dipak Badhe
seed block algorithmseed block algorithm
seed block algorithm
Dipak Badhe2.4K views
Performance evaluation and estimation model using regression method for hadoo... von redpel dot com
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
redpel dot com307 views
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio... von IJAAS Team
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team29 views
Energy and Load Aware Routing Protocol for Internet of Things von IJAAS Team
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
IJAAS Team35 views
An efficient, secure deduplication data storing in cloud storage environment von eSAT Journals
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals134 views
An asynchronous replication model to improve data available into a heterogene... von Alexander Decker
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...
Alexander Decker377 views
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method von IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal33 views
Enabling efficient multi keyword ranked von Sakthi Sundaram
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram160 views
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio... von Ericsson
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Ericsson518 views
Toward a real time framework in cloudlet-based architecture von redpel dot com
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
redpel dot com514 views
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... von IRJET Journal
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal11 views
Frequency and similarity aware partitioning for cloud storage based on space ... von redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
redpel dot com212 views
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage von IRJET Journal
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal39 views
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage von 1crore projects
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects58 views

Destacado

Ijmer 46053040 von
Ijmer 46053040Ijmer 46053040
Ijmer 46053040IJMER
363 views11 Folien
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ... von
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...IJMER
893 views4 Folien
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ... von
Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...IJMER
630 views6 Folien
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E... von
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...IJMER
420 views5 Folien
Design of Neural Network Controller for Active Vibration control of Cantileve... von
Design of Neural Network Controller for Active Vibration control of Cantileve...Design of Neural Network Controller for Active Vibration control of Cantileve...
Design of Neural Network Controller for Active Vibration control of Cantileve...IJMER
621 views8 Folien
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ... von
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...IJMER
548 views7 Folien

Destacado(20)

Ijmer 46053040 von IJMER
Ijmer 46053040Ijmer 46053040
Ijmer 46053040
IJMER363 views
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ... von IJMER
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
Computer-Aided Optimal Design and Finite Element Analysis of a Plain Milling ...
IJMER893 views
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ... von IJMER
Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...Thermal Expansivity Behavior and Determination of Density of  Al 6061-Sic-Gr ...
Thermal Expansivity Behavior and Determination of Density of Al 6061-Sic-Gr ...
IJMER630 views
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E... von IJMER
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
The Efficiency of Meteorological Drought Indices for Drought Monitoring and E...
IJMER420 views
Design of Neural Network Controller for Active Vibration control of Cantileve... von IJMER
Design of Neural Network Controller for Active Vibration control of Cantileve...Design of Neural Network Controller for Active Vibration control of Cantileve...
Design of Neural Network Controller for Active Vibration control of Cantileve...
IJMER621 views
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ... von IJMER
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
IJMER548 views
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi... von IJMER
Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
IJMER1.1K views
Ijmer 46062932 von IJMER
Ijmer 46062932Ijmer 46062932
Ijmer 46062932
IJMER323 views
Bh32793797 von IJMER
Bh32793797Bh32793797
Bh32793797
IJMER262 views
Da31456462 von IJMER
Da31456462Da31456462
Da31456462
IJMER197 views
A Novel Switch Mechanism for Load Balancing in Public Cloud von IJMER
A Novel Switch Mechanism for Load Balancing in Public CloudA Novel Switch Mechanism for Load Balancing in Public Cloud
A Novel Switch Mechanism for Load Balancing in Public Cloud
IJMER514 views
Ae32626632 von IJMER
Ae32626632Ae32626632
Ae32626632
IJMER251 views
Dj31514517 von IJMER
Dj31514517Dj31514517
Dj31514517
IJMER242 views
Helicopter Flapping Under Dynamic Stall von IJMER
Helicopter Flapping Under Dynamic StallHelicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic Stall
IJMER667 views
Ce32944948 von IJMER
Ce32944948Ce32944948
Ce32944948
IJMER340 views
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy von IJMER
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
IJMER272 views
Dd3210971099 von IJMER
Dd3210971099Dd3210971099
Dd3210971099
IJMER487 views
Aw32736738 von IJMER
Aw32736738Aw32736738
Aw32736738
IJMER317 views
Optimization of machining parameters of Electric Discharge Machining for 202 ... von IJMER
Optimization of machining parameters of Electric Discharge Machining for 202 ...Optimization of machining parameters of Electric Discharge Machining for 202 ...
Optimization of machining parameters of Electric Discharge Machining for 202 ...
IJMER396 views
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma von IJMER
Optimal Control Problem and Power-Efficient Medical Image Processing Using PumaOptimal Control Problem and Power-Efficient Medical Image Processing Using Puma
Optimal Control Problem and Power-Efficient Medical Image Processing Using Puma
IJMER422 views

Similar a An Efficient PDP Scheme for Distributed Cloud Storage

An4201262267 von
An4201262267An4201262267
An4201262267IJERA Editor
386 views6 Folien
E045026031 von
E045026031E045026031
E045026031researchinventy
390 views6 Folien
Improving availability and reducing redundancy using deduplication of cloud s... von
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
185 views29 Folien
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... von
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
57 views8 Folien
A novel cloud storage system with support of sensitive data application von
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
333 views9 Folien
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
42 views8 Folien

Similar a An Efficient PDP Scheme for Distributed Cloud Storage(20)

Improving availability and reducing redundancy using deduplication of cloud s... von dhanarajp
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
dhanarajp185 views
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... von dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 views
A novel cloud storage system with support of sensitive data application von ijmnct
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct333 views
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 views
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou... von IJMER
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER1.4K views
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... von ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 views
Improving Data Storage Security in Cloud using Hadoop von IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 views
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... von IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal103 views
Improving Efficiency of Security in Multi-Cloud von IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 views
iaetsd Controlling data deuplication in cloud storage von Iaetsd Iaetsd
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd95 views
IRJET-Auditing and Resisting Key Exposure on Cloud Storage von IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal31 views
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey von IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal49 views
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 views
Privacy preserving public auditing for secured cloud storage von dbpublications
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications32 views
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ... von IRJET Journal
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal8 views
A hybrid cloud approach for secure authorized von Ninad Samel
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
Ninad Samel143 views

Más de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F... von
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
3K views5 Folien
Developing Cost Effective Automation for Cotton Seed Delinting von
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
2.8K views8 Folien
Study & Testing Of Bio-Composite Material Based On Munja Fibre von
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
2.3K views6 Folien
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor) von
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
2.1K views9 Folien
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F... von
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
2.4K views8 Folien
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu... von
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
1.7K views8 Folien

Más de IJMER(20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F... von IJMER
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER3K views
Developing Cost Effective Automation for Cotton Seed Delinting von IJMER
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER2.8K views
Study & Testing Of Bio-Composite Material Based On Munja Fibre von IJMER
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER2.3K views
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor) von IJMER
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER2.1K views
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F... von IJMER
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER2.4K views
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu... von IJMER
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER1.7K views
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in... von IJMER
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER1.6K views
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A... von IJMER
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER1.7K views
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation von IJMER
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER2.9K views
High Speed Effortless Bicycle von IJMER
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER1.6K views
Integration of Struts & Spring & Hibernate for Enterprise Applications von IJMER
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER1.7K views
Microcontroller Based Automatic Sprinkler Irrigation System von IJMER
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER1.5K views
On some locally closed sets and spaces in Ideal Topological Spaces von IJMER
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER1.1K views
Intrusion Detection and Forensics based on decision tree and Association rule... von IJMER
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER1.1K views
Natural Language Ambiguity and its Effect on Machine Learning von IJMER
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER1.7K views
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess von IJMER
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER503 views
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders von IJMER
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER622 views
Studies On Energy Conservation And Audit von IJMER
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER643 views
An Implementation of I2C Slave Interface using Verilog HDL von IJMER
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER2.9K views
Discrete Model of Two Predators competing for One Prey von IJMER
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER649 views

Último

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
210 views15 Folien
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
50 views35 Folien
DRBD Deep Dive - Philipp Reisner - LINBIT von
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 views21 Folien
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
79 views17 Folien
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
103 views23 Folien
Business Analyst Series 2023 - Week 4 Session 7 von
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
126 views31 Folien

Último(20)

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
DRBD Deep Dive - Philipp Reisner - LINBIT von ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online von ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ von ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T von ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views

An Efficient PDP Scheme for Distributed Cloud Storage

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2317 | Page Jimnisha Shaik1 , Syed Gulam Gouse2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India ABSTRACT: Cloud computing is the use of Internet for the tasks performed on the local computer, with the hardware and software demands maintained elsewhere. It represents a different way to architect and remotely manage various computing resources. Cloud is widely used everywhere owing to its convenience, be it in simple data analytic program or composite web or mobile applications. Cloud computing is being driven by many which includes Amazon, Google and Yahoo as well as traditional vendors including IBM, Microsoft and Intel. The data should be available in the cloud for it to be accessed by many users. There are four main types of cloud storage- Multi Cloud Storage or distributed cloud storage, Public Cloud Storage, Private Cloud Storage, Mobile Cloud Storage. Distributed cloud is a combination of public and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider. Provable data possession (PDP) is a technique for ensuring the integrity of data stored in storage outsourcing. In this paper, we propose a method called cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. INDEX TERMS: Cloud, Hash index, Integrity, PDP. I. INTRODUCTION In recent years, the concept of parallel computing has emerged to solve the problems with a greater computational speed. It‟s operation is based upon the principle that larger problems can be reduced to a number of smaller ones, then which are solved parallely.Parallel computing can be implemented in several ways of computing like bit level, instruction level, task and data parallelism. Based on the level at which the hardware supports parallelism, it can be classified as- multi-core and multi-processor. Generally in a computer system a problem can be solved using a stream of instructions. Only one instruction is executed at a time, and then the others are executed. On the other hand in parallel computing, uses the multi- processing elements to solve a problem. This is accomplished by breaking the problem into various independent parts so that each processing element can execute its part of the algorithm simultaneously with others. There is another important concept which is responsible for the effective and efficient computation of our problem is, distributed system. Using high performance computers connected by using high speed communication links, it is possible to build a single system consisting of multiple computers and using it as a single consolidated system. In a distributed system, the computers are not independent but are interconnected by a high-speed network. Here are a few requirements for a distributed system- Like reliability and security, consistency of replicated data, concurrent transactions, and fault tolerance. The major aim of constructing the distributed system is that its behavior should be transparent to the user. In a distributed memory architecture if we take into account each processor has its own local storage and all the processing is done locally. All systems are interconnected using a LAN. In any kind of computer system which involves data storage and retrieval, availability is one of the major security issues to be concerned. Provable Data Possession (PDP) is such a technique which ensures data availability or proof of retrievability (POR).It‟s the proof which is provided for the storage provider, in order to prove the ownership and integrity of client‟s data without being downloading it. The proof-checking of the data without being downloading is very important, especially when it comes to very large sized data blocks. It is necessary because it is to be ensured that the data is not deleted or altered. PDP schemes are very useful when it comes to these kinds of issues. However, this scheme will be effective only for single cloud storage, but not for the distributed-cloud storage environment. II. RELATED WORK To check the availability and integrity of the outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession (PDP) [1] and Proofs of Retrievability (POR) [2]. In [1], the authors first proposed the PDP model for ensuring possession of files on un trusted storages and provided an RSA-based scheme for a static case that achieves the O(1) communication cost. In order to support dynamic data operations, the authors developed a dynamic PDP solution called Scalable PDP [3]. They proposed a lightweight PDP scheme based on cryptographic hash function and the symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of the randomness in the challenges. In [4], the authors introduced two Dynamic PDP schemes with a hash function tree to realize O(log n) communication and computational costs for a n-block file. The basic scheme, called DPDP-I, retains the drawback of Scalable PDP method, and in the „blockless‟ scheme, called DPDPII. In [2], the authors presented a POR scheme, which relies largely on preprocessing steps that the client conducts before sending a file to a CSP. Several POR schemes and models have been recently proposed including in [5][6]. In [5], the authors introduced a distributed cryptographic system that allows a set of servers to solve the PDP problem. This system is based on the integrity protected error correcting code (IP-ECC), which improves the security and efficiency of the existing tools, like POR. An Efficient PDP Scheme for Distributed Cloud Storage
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2318 | Page III. PROPOSED METHOD In this section, we introduce the principles of our cooperative provable data possession for distributed clouds, including the main technique, model, fragment structure, index hierarchy, and the architecture to support our scheme. A. Homomorphic Verifiable Response: A homomorphism is the map f : P → Q between two groups such that f(g1+g2) = f(g1)×f(g2) for all g1, g2  P, where + denotes the operation in P and × denotes the operation in Q. This notation is used to define the Homomorphic Verifiable Tags (HVTs): Given two values σi and σj for two message mi and mj , anyone can combine them into a value σ′ corresponding to the sum of the message mi + mj. B. Cooperative PDP: A cooperative provable data possession(CPDP) scheme S′ is a collection of two algorithms and an interactive proof system, S′ = (K, T, P). KeyGen( k 1 ): It takes a security parameter k as the input, and returns a secret key sk or a public-secret key pair (pk, sk); TagGen(sk, F,P): It takes as inputs a secret key “sk”, a file F, and a set of cloud storage providers P = {Pk}, and returns the triples (ζ ,ψ, σ), where ζ is the secret of tags, ψ = (u,H) is a set of verification parameters u and an index hierarchy H for F, σ = {σ(k)}Pk∈ P denotes a set of all tags, σ(k)is the tags of the fraction F (k) of F in Pk. Proof(P, V ): It is a protocol of proof of the data possession between the CSPs (P = {Pk }) and a verifier (V), that is,(∑Pk∈ P Pk(F(k), σ(k)), V) (pk, ψ), where each Pk takes as input a file F(k) and a set of tags σ(k), and a public key pk and a set of public parameters ψ is the common input between P and V . At the end of the protocol run, “ V” returns a bit {0|1} denoting false and true where,  pPK denotes the collaborative computing in Pk  P. C. Fragment Structure of Cooperative PDP: We propose a fragment structure of CPDP scheme as shown in the Figure 1, which has following characters:  A file is split into n × s sectors and each block (or s sectors) corresponds to a tag, so that the storage of signature tags can be reduced with the order of s.  The verifier can check the integrity of the file by random sampling approach, which is a matter of the utmost importance for large or huge files.  This structure relies on the homomorphic properties to aggregate the data and tags into a constant size response, which minimizes network communication overheads. Figure 1: The fragment structure of Cooperative PDP model The above structure, considered as a common representation for some existing schemes in [1][7], can be converted to MAC-based, ECC or RSA schemes. By using BLS signatures and the random oracle model, it is easy to design a practical CPDP scheme with the shortest homomorphic verifiable responses for public verifiability. This structure also creates favorable conditions for the architecture of the CSPs. D. Hash Index Hierarchy: The Architecture for data storage in distributed clouds is shown in Figure 2. This architecture is based on a hierarchical structure with three layers to represent the relationship among all blocks for stored resources. Three layers can be described as follows:  First Layer (Express Layer): It offers an abstract representation of the stored resources  Second Layer (Service Layer): It promptly offers and manages cloud storage services  Third Layer (Storage Layer): It directly realizes data storage on many physical devices.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2317-2319 ISSN: 2249-6645 www.ijmer.com 2319 | Page Figure 2: The architecture of Cooperative PDP model This architecture naturally accommodates the hierarchical representation of the file systems. We make use of a simple hierarchy to organize the multiple CSP services, which involve private clouds or public clouds, by shading the differences between these clouds. As shown in Figure 2, the resources in the Express Layer are split and stored into three CSPs in the Service Layer. In turn, each CSP fragments and stores the assigned data into the storage servers at the Storage Layer. We distinguish different CSPs by different colors, and the denotation of the Storage Layer is the same as in Figure 1. Moreover, we follow the logical order of data blocks to organize Storage Layer. This architecture could provide some special functions for the data storage and management, e.g., there may exist an overlap among data blocks (as shown in dashed line) and discontinuous blocks (as shown on a non continuous color). IV. CONCLUSION With the techniques such as homomorphism verifiable response and hash index hierarchy, cooperative provable data possession (CPDP) concept has been achieved and hence integrity and availability is verified .The zero- knowledge proof system is used and hence increases the security so it can be used widely in public cloud services thereby increasing their performance. By this approach the computation time and as well as cost is reduced. Our system can be used as a new method for data integrity verification in out sourcing data storage on distributed cloud environment. REFERENCES [1]. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609. [2]. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597. [3]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10. [4]. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference onComputer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222. [5]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198. [6]. Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127. [7]. H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90–107, 2008.