Monitoring the integrity of Dynamic Data stored in Cloud Computing

Cloud computing is a internet based computing which enables sharing of services. Many users place their data in the cloud, so correctness of data and security is a prime concern. This work studies the problem of ensuring the integrity and security of data storage in Cloud Computing. Security in cloud. To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the Cloud client[1], to monitor the integrity of the data stored in the cloud by utilizing public key and private key based. There is a probable risk while exchanging confidential data in the cloud computing environment. To preserve data integrity and confidentiality existing solutions adopt cryptographic methods and disclose data decryption keys only to authorized users. These solutions inevitably introduce a processing overhead on the data owner for key distribution and data management. These issues are addressed in this work by defining and enforcing access policies based on data attributes, and allowing the data owner to delegate most of the computation tasks involved in data access control to cloud servers [6] without affecting the integrity of data. The proposed work is accomplished by exploiting and uniquely combining some techniques of attribute-based encryption (ABE) [14] and proxy reencryption (PRE) [16]. This proposed scheme is implementing for simplifying the development efforts and provides direct support for security KeywordsAttribute-based encryption, Cloud Computing, Data dynamics, Proxy re-encryption, Monitoring, SaaS, TPA

[1]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[2]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[3]  Marianne Winslett,et al.  A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Priyanka Rakam,et al.  Enabling Public Audit Ability and Data Dynamics for Storage Security in Cloud Computing Data Integrity Proofs In Cloud Storage , 2012 .

[6]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[7]  Shobana,et al.  Introducing Effective Third Party Auditing ( TPA ) for Data Storage Security in Cloud , .

[8]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[9]  Jin Li,et al.  Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.

[10]  Atul Prakash,et al.  Methods and limitations of security policy reconciliation , 2006, TSEC.

[11]  Patrick D. McDaniel,et al.  Principles of Policy in Secure Groups , 2001, NDSS.

[12]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[13]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[14]  Atul Prakash,et al.  Methods and limitations of security policy reconciliation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.