Essays.club - Get Free Essays and Term Papers
Search

Cloud Storage

Autor:   •  February 22, 2018  •  4,091 Words (17 Pages)  •  529 Views

Page 1 of 17

...

doesn’t give scope to meet the demands that are trending.

1.3 Motivation

To give solution to the problems which arose due to the individual dealing of the secure clod storage and secure network coding, the need for the combination of both the techniques is thought to be essential.

1.4 Solution

There are certain steps for the construction of the model constructing a secure cloud storage protocol SCS = (KeyGen; Outsource; Audit; Prove; Verify) given a well-designed secure network coding protocol SNC = (KeyGen; Auth; Combine; Verify) where both SCS and SNC meets.

1.5 Existing System

Cloud storage is being widely adopted due to the popularity of cloud computing. Recent reports indicate that data loss can occur in cloud storage providers (CSPs). So, the problem of checking the integrity of the data in cloud storage, which we referred to as secure cloud storage (SCS), has attracted a lot of attention. On the other hand, networking coding, which was proposed to improve the network capacity, also faces the problem of integrity checking. An intermediate router may intentionally pollute codewords, which results in decoding failures at the endpoints. Checking the integrity of codewords is referred to as the secure network coding problem. Different researchers have studied secure cloud storage and secure network coding independently.

Disadvantages of Existing System

Secure cloud storage problem

Secure network coding problem

Data integrity checking problem

All current solutions for secure network coding rely on some homomorphic property of the underlying cryptographic techniques.

1.6 Proposed System

The project first time reveals a relationship between these two different areas, i.e., secure cloud storage and secure network coding. Here is the construct a publicly verifiable secure cloud storage protocol given any publicly verifiable secure linear network coding protocol. In contrast, secure cloud storage protocols are currently designed in a rather ad hoc way and there are only few successful protocols. To demonstrate the power, two enhanced secure cloud storage protocols that can satisfy the needs of different applications are proposed. These new protocols derived from our generic construction also sheds insights on private-key secure cloud storage protocols, although this paper mainly focuses on public-key protocols. The first publicly verifiable secure cloud storage protocol which is secure in the standard model, i.e., without modeling a hash function is a random function when arguing for the security of the protocol is designed. Generic construction is extended to support advanced functionalities, in particular, user anonymity, and third-party public auditing.

Literature survey

NC Cloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds

To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. A proxy-based storage system for fault-tolerant multiple-cloud storage called NC Cloud, which achieves cost-effective repair for a permanent single-cloud failure. NC Cloud is built on top of a network-coding-based storage scheme called the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic and hence incur less monetary cost due to data transfer. One key design feature of FMSR codes is that the encoding requirement of storage nodes during repair, while preserving the benefits of network coding in repair. A proof-of-concept prototype of NC Cloud and deploy it atop both local and commercial clouds is proposed. Validation of FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage operations such as upload/download is done.

NC Cloud, a proxy-based, multiple-cloud storage system that practically addresses the reliability of today’s cloud backup storage where NC Cloud not only provides fault tolerance in storage, but also allows cost-effective repair when a cloud permanently fails. NC Cloud implements a practical version of the functional minimum storage regenerating (FMSR) codes, which regenerates new parity chunks during repair subject to the required degree of data redundancy. Our FMSR code implementation eliminates the encoding requirement of storage nodes (or cloud) during repair, while ensuring that the new set of stored chunks after each round of repair preserves the required fault tolerance.

Enabling Data Reliability Security in Regenerating Coding-based Cloud Storage

To protect outsourced information in cloud storage con to corruptions, adding defect acceptance to cloud storage, alongside well-organized information responsiblness read-through and recovery procedures, becomes crucial. Make codes offer defect acceptance by marking information across multiple servers, whereas mistreatment less restore transfer than established removal codes throughout failure recovery. The matter of remotely checking the responsibleness of regenerating-coded information con to corruptions underneath a real-life cloud storage setting is studied. To style and implement a sensible information responsibleness security (DRS) theme for a particular make code, whereas conserving its integral properties of defect acceptance and repair-traffic saving is also studied. In this DRS theme is intended underneath a mobile sophisticated adversarial model, and permits a consumer to feasibly verify the responsibleness of random subsets of outsourced information con to general or malicious corruptions. It works underneath the straightforward assumption of thin-cloud storage and permits totally different parameters to be fine-tuned for a performance-security trade-off. Required to implement and judge the overhead of our DRS theme in a very real cloud storage workplace underneath totally different parameter selections, to more analyze the safety strengths of our DRS theme via mathematical models, to show that remote integrity checking are often presumably incorporated into make codes in sensible operation.

Given the name of outsourcing repository

...

Download:   txt (25.7 Kb)   pdf (156.6 Kb)   docx (23.2 Kb)  
Continue for 16 more pages »
Only available on Essays.club