Identity Based Distributed Provable Data Possession in Multi Cloud Storage(2014)

Note: Please Scroll Down to See the Download Link.

ABSTRACT:

Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational DiffieHellman) problem. In addition to the structural advantage of elimination of certificate management, our ID-DPDP protocol is also efficient and flexible. Based on the client’s authorization, the proposed ID-DPDP protocol can realize private verification, delegated verification and public verification.

EXISTING SYSTEM:

In cloud computing, remote data integrity checking is an important security problem. The clients’ massive data is outside his control. The malicious cloud server may corrupt the clients’ data in order to gain more benefits. The formal system model and security model are existing models.

          In the PDP model, the verifier can check remote data integrity with a high probability. Based on the RSA, they designed two provably secure PDP schemes. PDP allows a verifier to verify the remote data integrity without retrieving or downloading the whole data. It is a probabilistic proof of possession by sampling random set of blocks from the server, which drastically reduces I/O costs. The verifier only maintains small metadata to perform the integrity checking. PDP is an interesting remote data integrity checking model.

           In POR, the verifier can check the remote data integrity and retrieve the remote data at any time. On some cases, the client may delegate the remote data integrity checking task to the third party. It results in the third party auditing in cloud computing

DISADVANTAGES OF EXISTING SYSTEM:

·        Does not provide efficiency in remote data integrity checking.

·        More expensive.

·        The existing system provides less flexibility.

PROPOSED SYSTEM:

Remote data integrity checking is of crucial importance in cloud storage. In multi-cloud environment, distributed provable data possession is an important element to secure the remote data. we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffi Hellman) problem. The proposed ID-DPDP protocol can realize private verification, delegated verification and public verification.

ADVANTAGES OF PROPOSED SYSTEM:

·        The distributed cloud storage is indispensable.

·         Efficient and Flexible.

·        Elimination of the certificate management.

MODULES

1. Cloud User Module

2. Verifier Module

3. Private Key Generator Module

4. Cloud Server Module

MODULES DESCRIPTION:

Cloud User Module:

ü An entity, which has massive data to be stored on the multi-cloud for maintenance and computation, can be either individual consumer or corporation.

ü In this module each user registers his user details for using files. Only registered user can able to login in cloud server.

ü In this module user view a block of uploaded files that is accepted by cloud servers and Verified by verifier in the multi cloud Server.

ü This module allows the user to download the uploaded from multi cloud server and that file verified by verifier file using his identity key to download the decrypted data.

Verifier Module:

ü The public verifier is able to correctly check the integrity of shared data. The public verifier can audit the integrity of shared data from multi-cloud with whole Data and accept the file.

ü In this module public auditor check all files integrity And accept the files to cloud.

Private Key Generator Module

ü An entity, when receiving the identity, it outputs the corresponding private key.

ü The concrete ID-DPDP construction mainly comes from the signature, provable data possession and distributed computing. The signature relates the client’s identity with his private key.

ü Distributed computing is used to store the client’s data on multi-cloud servers. At the same time, distributed computing is also used to combine the multi-cloud servers’ responses to respond the verifier’s challenge.

ü Based on the provable data possession protocol, the ID-DPDP protocol is constructed by making use of the signature and distributed computing.

Cloud Server Module:

ü An entity, which is managed by cloud service provider, has significant storage space and computation resource to maintain the clients’ data.

ü In this module each server from multi cloud verifies the file block and accepts the block of files to verify the verifier.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.

Ø Hard Disk                      :         40 GB.

Ø Floppy Drive                 :         1.44 Mb.

Ø Monitor                         :         15 VGA Colour.

Ø Mouse                            :         Logitech.

Ø Ram                               :         512 Mb.

SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.

Ø Coding Language         :         ASP.net, C#.net

Ø Tool                                  :         Visual Studio 2010

Ø Database                        :         SQL SERVER 2008

Click here to download Identity Based Distributed Provable Data Possession in Multi Cloud Storage(2014) source code