This website uses cookies to ensure you have the best experience. Learn more

Multi Replica Data In Cloud Storage Essay

1222 words - 5 pages

The audit module is concerned with verifying the integrity of the outsourced data. It consists of four processes:
Challenge: In this process, the TPA challenges the CSP to verify the integrity of all outsourced replicas. The TPA sends c (number of blocks to be challenged; 1≤ c ≤ n ) and two distinct PRF keys at each challenge: k1 and k2. The pseudo-random function (PRF) keyed with k1 is used to generate c random indices which indicate the file blocks that the CSP should use to prove the integrity. The PRF keyed with k2 is used to generate yj random values that are associated with each random index j and are used by the CSP while generating the response. Then, the challenge set Q = {(j, yj)} ...view middle of the document...

m_ljis generated by the XOR combination of |∆_lj| original blocks as
m_lj=M_l1 ⨁▒…⊕ M_(l |∆_lj |). (8)
The data management sub-system is concerned with maintaining data dynamics, generating replicas and file encoding. It consists of three processes:
Modify: To support efficient dynamic operations, we utilize a map-version table which is an authenticated data structure stored on the TPA to validate the data dynamics on all file replicas. The map-version table consists of four columns: Index (j) , block number (Bj), version number (Vj) and timestamp (Tj). The index denotes the current block number of the data block mj. Bj denotes the original block number of the data block mj. Vj denotes the current version number of the data block mj which is increased by 1 each time the data block is modified. Tj denotes the timestamp used for generating the tag. The dynamic operations in our proposed scheme are preformed via a request in the form Modify(j, Op, m_j^*) where Op is the dynamic operation; i.e., 0 for deletion, 1 for insertion, and 2 for update. m_j^* is the new block value.
Replica Generation (ReplicaGen): This process is run by the data owner if s/he chooses the multiple replica version. It takes the number of replicas r and the file F as input and generates r unique differentiable replicas {Fi}1≤i≤r as shown in Figure 4. This algorithm is run only once. Unique copies of each file block of file F is created by encrypting it using a probabilistic encryption scheme. We utilize the Paillier encryption scheme [30] for replica generation because it is semantically secure and has efficient encryption complexity when compared to the Damgård-Jurik encryption scheme [31] as illustrated in Table 2.
File Encoding (RaptorEncode): This process is run by the data owner in order to support data recovery when s/he outsources a single-copy data file. On the contrary, we do not need to encode the file before outsourcing in case of multiple-replica data files, hence a server's replica can be reconstructed even from a complete loss using further replicas on other servers. RaptorEncode algorithm takes KeyPRF , outputs encoded file F', and works as follows: F = {b1,, …, bk}, bi is s bits, is encoded by an erasure code (pre-code) to obtain F'= {y1,…,yk}. Then, Choose a random s × s binary matrix A = [A1, …, As ]T where each A1 is an s –bit...

Find Another Essay On Multi-replica Data in Cloud Storage

Retrieving the Top-K Ranked Secure Sensor Data in Cloud

762 words - 4 pages allow multi-keyword query and provide ranked result to meet the effective data retrieval need. Most of the current works only consider the single keyword queries without proper ranking schemes. In this paper, we propose an efficient multi-keyword ranked search scheme that certifies users’ privacy over encrypted cloud data. Secure keyword search displays the top list of data with fewer results as output. Using fewer results as output we increase the

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages Cloud computing is expanding and replacing traditional storage and computing methods. It provides many advantages including greater access and it is cheaper than the traditional onsite server. Cloud computing provides an efficient and economical opportunity for many businesses and individuals to store files and information at an offsite data center. By providing access to these offsite data centers, businesses and individuals are able to

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages providing results of calculations on encrypted data without knowing the raw data on which the calculation was carried out, with respect of the data confidentiality. some important security services including authentication, encryption and decryption are provided in Cloud Computing system. REFERENCES: [1] Vic (J.R.) Winkler, “Securing the Cloud, Cloud Computer Security, Techniques and Tactics”, Elsevier, 2011. [2] Pascal Paillier. Public

Access Control and Data Updation with AT-PRE: Attribute Time Based Proxy Re-Encryption for Shared Data in Cloud

2111 words - 9 pages We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users [few with read and few with both read/write permission]. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. The CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the

mobile multi-hop data gathering mechanisms in WSN Networks

718 words - 3 pages In some existing work, the transmission range of an omnidi-rectional antenna was simply assumed to be a disk-shaped area around the transceiver. Based on this assumption, given a point in the plane, the neighbor set of this point consists of all sensors within the disk-shaped area around this point. However, due to the uncertainties of a wireless environment, such as signal fading, reflection from walls and obstacles, and interference, it is

Security: Cloud Computing

1554 words - 6 pages enters in single cloud. Our approach is to movement towards multi-clouds that is data stored on multi-cloud service providers. In this system we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing in which holds an economical distribution of data among the available cloud service provider (SP) in the market, instead of single cloud to provide customers with data availability as well as security. This work

Methods in the Coud Computing Environment

867 words - 4 pages cloud offers multi tenancy due to virtualization so it is difficult for investigators to directly collect evidences from the identified objects. So in cloud environment acquisition is preferred over collection. As in acquisition replica of the object which is identified as an evidence or a source of evidence is created. So firstly acquisition is to be done and then after this evidence are to be extracted from this acquired object. Doing so will

Cloud Forensics

1033 words - 5 pages where the data is located however, when using a cloud service, the data could be anywhere, even in different states, countries, or even continents. Even if the attacker is practically next door, the data’s residence is still nowhere near which mean that data cannot be retrieved or that easily. This presents forensic analysts with another in a series of dead ends. Since Storage is the core of computer forensics’ interest and that this is the grail

Internet Cache System: Cloud Downloading System

1046 words - 5 pages ). With multimedia growing exponentially in today’s internet, content delivery networks play a key roles. The current cloud delivery systems have pre-allocated storage that is usually over provisioned. In this paper, experimental results demonstrate that the proposed system deals dynamically with provision storage to facilitate efficient sharing of multimedia content (Andersen et al., 2004).In this paper, we propose a cloud-assisted power efficient

Cloud Computing

1666 words - 7 pages . Furthermore, people involved in cloud computing can be organized into two groups as well; the cloud providers and the cloud user’s. The cloud user’s take resources from the cloud and utilize data storage. Cloud providers house the hardware or equipment for the cloud and also manage it. Ignoring the security concerns for cloud computing, it is very resourceful to large organizations. Specifically where the demand for processing power and data storage

Cloud COmputing as an Advanced Technology

639 words - 3 pages scheduling, virtualization, transaction management, concurrency control and memory management several kinds of security problems arises in this service. As Security is the base for the Cloud success after recognition of data security various models has been researched by Researchers. To handle these security problems of cloud computing an architecture based on 3Dimension (2011) and Multi-Dimension (2012) techniques adopted .This research paper is conducted to analyze these two models. 3-dimension model works in two phases, and multi-dimension model in three layers.

Similar Essays

Towards The Secure Storage Of Images On Multi Cloud System

1568 words - 7 pages reduce the service availability risk or loss of data, a multi cloud system where data is replicated into multiple clouds offered by different cloud providers are used. Once the assets are in the cloud, the clients lose control over them, as data in the cloud typically resides in a shared environment. With the growth of a large number of cloud service providers, there is a need to protect confidential images stored in the cloud from unauthorized

Adoption Of Cloud Computing Relating To Data Storage

2267 words - 9 pages The main driving forces of cloud data storage are reputable companies such as Amazon and Google building comprehensive computing infrastructures (Google, 2009). These infrastructures are removing the complexity of in-house data storage and ultimately reducing costs of limited networked data centres (Hitachi, 2010). The traditional inefficient model of purchasing servers every time you need to accommodate for high use or growth is now being

Store Your Data In The Cloud

1809 words - 8 pages computer anywhere in the world, with an Internet connection. Cloud storage needs hosting companies to operate a large data centers, and people who require their data to be hosted a data storage capacity from them. That can be access using public network or WAN (Wide Area Network). How it cloud storage works? In modern technology, the number of files and document are keep growing until no space to store. That’s the idea

To What Extent Does Core Data Support Developers In Constructing Data Storage For I Phone Applications?

1167 words - 5 pages recent development, Apple had released the new IOS and OS for apple users. Most of new applications are now linked with the iCloud system. So in the future forecast, iCloud might play out as a common method for data storage. Moreover, a development of core data could include the reconstruction of how core data works. It might be the change that affects the managed object context, persistent store and persistent store coordinator. Take the new iOS7