Enhanced Trusted Third Party for Cyber Security in Multi Cloud Storage

Cloud Computing offers an business model and it is tempting for companies to delegate their IT services, as well as data, to the Cloud. But in Cloud environment, lacking of cyber security users may suffer a serious data loss without any compensation for they have lost all their control on their data. Cyber security is the body of technologies and it is designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Security audit is an important solution enabling trace back and analysis of any activities including data accesses, security breaches, application activities, and so on. Provable data possession (PDP) is an audit technique for ensuring the security of data in storage outsourcing. However, this existing audit schemes have focused on static data and the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection is very challenging task. For the cyber security we present a novel way implementation of a Trust Enhanced Third Party Auditor (TETPA), a trusted and easy-to- use auditor for Cloud environment. TETPA enables the Cloud Service Providers’ accountability, and protects the Cloud users’ benefits. Moreover our audit service is using for dynamic integrity verification in multi cloud storage. This scheme is based on the techniques, fragment structure, random sampling and index-hash table, Zero-Knowledge supporting provable updates to outsourced data and timely anomaly detection.

[1]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[2]  Josef Pieprzyk,et al.  Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.

[3]  Peng Ning,et al.  Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.

[4]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[5]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[6]  L. Fortnow,et al.  On the power of multi-power interactive protocols , 1988, [1988] Proceedings. Structure in Complexity Theory Third Annual Conference.

[7]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[8]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[9]  Gail-Joon Ahn,et al.  Collaborative integrity verification in hybrid clouds , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[10]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[11]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[12]  Lance Fortnow,et al.  On the Power of Multi-Prover Interactive Protocols , 1994, Theor. Comput. Sci..