efficient method for cloud storage based on proof of ownership

3 downloads 92490 Views 494KB Size Report
May 18, 2016 - Department of Information Technology, Sathyabama University, Chennai, Tamilnadu, India. 3 ... Cloud being vast area of development in IT sector and most of the storages ... an android application. ... Data deduplication is a technique for decreasing the amount of data space a company needs to save its.
Nirmalrani V*et al. /International Journal Of Pharmacy & Technology

ISSN: 0975-766X CODEN: IJPTFI

Available through Online www.ijptonline.com

Review Article

EFFICIENT METHOD FOR CLOUD STORAGE BASED ON PROOF OF OWNERSHIP Elvin A1, Atchudha G2, Nirmalrani V3* Department of Information Technology, Sathyabama University, Chennai, Tamilnadu, India. 3 Department of Information Technology, Sathyabma University, Chennai, Tamilnadu, India. Email: [email protected] Received on 22-04-2016 Accepted on 18-05-2016 1, 2

Abstract Cloud being vast area of development in IT sector and most of the storages being changed to cloud storages, this paper implements data De-Duplication with cloud storage. The predominance of mobile cloud, users can even collectively alter the most up-to-date form of reports and synchronize the latest files on their smart phones. To maintain boundless capacity, the cloud storage supplier utilizes information de-duplication strategies to the data and the information to be saved in this manner, diminish the capacity cost and decrease the requirement for transmission capacity (bandwidth) and along these lines enhance the user experience. By regardless of the above advantages, information de-duplication has its natural security shortcomings. Among them, the most serious is that the foe may have an unapproved files downloading by means of the document hash. In this work, first audit the past arrangements and identify their execution shortcomings. Then this paper proposes an alternative design that achieves cloud server efficiency and especially mobile device efficiency. Deduplication of files in cloud with POW aims at improving the storage efficiency in cloud storage with an android application. It is applied in cloud files to find duplicate files and to prevent unapproved document downloading by means of the record hash and give the client deduplication procedures to diminish the information to be put away and in this manner lessen the capacity cost. We add security of POW, so that the cloud files will be safe and protected. Data deduplication is a technique for decreasing the amount of data space a company needs to save its data. Key words: Cloud, Deduplication, POW, Security, Storage. I. Introduction Distributed storage, for example, Drop box and Bitcasa is a standout amongst the most mainstream cloud administrations. As of now, with the pervasiveness of versatile distributed computing, clients can even cooperatively IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3815

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology alter the most current adaptation of archives and synchronize the freshest record on their brilliant cell phones. A surprising component of current distributed storage is its intents and purposes limitless capacity. To bolster boundless capacity, the distributed storage supplier utilizes information deduplication methods to lessen the information to be put away and in this manner decrease the capacity cost. In addition, the utilization of information deduplication additionally helps essentially decrease the requirement for transfer speed and in this way enhance the client experience. II. Related Works 2.1 Secure and Constant Cost Public Cloud Storage Auditing with Deduplication by Jiawei Yuan and Shucheng Yu Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Irretrievability (POR) and assure data integrity for cloud storage. In this paper we rectifying problem with a new scheme based on techniques including polynomial based security tags and homomorphism linear authenticators. Our allows reduplication of both files and their respected authentication tags. Data integrity auditing and storage reduplication are achieved at the same time. The proposed system is also characterized by constant real time communication and computational cost on the user side. 2.2 Proof of Storage for Video Deduplication in the Cloud by Fatema Rashid, Ali Miri, Isaac Woungang In this paper, assuming that the CSP is semi-honest (i.e. honest but curious and cannot be completely trusted), a proof of irretrievability (POR) and a proof of ownership (POW) are proposed for video duplication in cloud storage surroundings. The POW protocol is meant to be used to authenticate the true owner of the data before releasing it whereas the scheme is meant to allow the user to check that his/her data video stored in the cloud is secured against any malicious user or the single-honest. These schemes are proposed as complement to our earlier proposed scheme for securing the video deduplication in the cloud storage through the H.264 compression algorithm. 2.3 Provable Ownership of File in De-duplication Cloud Storage by Chao Yang Jian Ren and Jianfeng Ma In this paper, to solve the problem of attackers or hackers, we propose a cryptographically secure and efficient scheme for a client to prove to the server based on actual work of the entire file instead of only partial information about it. Our scheme uses the method of spot checking in which the client only needs to access small portions of the original file, dynamic coefficients and randomly chosen indices of the original files.

IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3816

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology 2.4 Estimation of Deduplication Ratios in Large Data Sets by Danny Harnik ,Oded Margalit ,Dalit Naor, Dmitry Sotnikov and Gil Vernik We present a novel two-phased framework for such estimations. Our methods are provably good , yet run with very less memory requirements and avoid overheads associated with maintaining large deduplication tables, deciding whether to debug or not deduplication and conducting large-scale academic studies related to deduplication ratios. III. Scope of the Proposed Work To support unlimited storage, the cloud storage provider uses data deduplication techniques to reduce the data to be stored and therefore reduce the storage expense. Improved efficiency of cloud storage with mobile device application. IV. Problem Statement The two available approaches for finding duplications are the file level and the part level. On the file level, the hash function will be executed for each file, and all hash values will be kept in the index. The part level, data streams are divided into parts, each part will be hashed, and all these hash values will be kept in the index. Based on this consideration, in this paper, the complete file data duplication techniques are used for our present framework. The prevalence of mobile cloud computing, users can even collaboratively edit the newest version of documents and synchronize the newest files on their smart mobile devices. A remarkable feature of current cloud storage is its virtually infinite storage. User stores data in cloud computing whenever user need, they can access with internet. If same data used to store, then storage cost will be increased. So many duplicate copies will be stored, and there will be a security lack. V. Proposed Work and its Architecture

Fig. 1 Proposed System Architecture. IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3817

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology In this work, propose an alternative POW outline on the issue of unapproved file downloading in duplicated storage. A closer look at client side deduplication can find that anyone in possession of the file hash can gain ownership of the file by uploading the file hash. More specifically, the cloud considers receiving a store request for a file already in the storage, avoids the redundant file transmission, and then adds the user as an additional owner of the file. A POW scheme is jointly executed by the cloud and user such that the user can prove to the cloud that it is indeed in possession of the file. Figure 1 describes the proposed system Architecture. VI. Proposed System Implementation 6.1 Phases of Implementation 

Registration and log-in.



Upload a file.



Deduplication process.



Authentication.

6.1.1. Registration and Login Initially User register’s his account in the app which is in sync with the cloud database with his valid user name, email-id, Date of birth, phone number and other credentials necessary for validation of his account, so that he could use it in future. Same user name and password is being throughout, and as these are case sensitive user needs to make sure that he has entered all the details correctly to log in, else mismatch occurs and log-in won’t be successful.

Fig. 2 Registration and Login Page 6.1.2. Upload a File Upload a file in cloud storage from client side first we have to select which file we need to send to server. After choosing a file from your documents we directly send to server. Next it will check by server whether it is new file or already existing file. We can upload files either in text format or in image format. IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3818

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology

Fig. 3 File Uploading. 6.1.3. Deduplication Process De-duplication in cloud occurs once file is uploaded as once existing file is present, or same content is present, process occurs once content is present, so same content can’t be uploaded twice, it only gets updated and thus saving considerable storage and maintenance cost for cloud user’s ,while downloading the file the content from both the clouds gets appended and gets stored in a single file.

Fig. 4: Deduplication Process. 6.1.4. Authentication Authentication process happens here, once user login’s in his one of the accounts, as registered id is used here, and same case with other account, Overcoming previous techniques while giving out hashes which practically gives out the content, so in our method we get pass all those aforementioned problems efficiently. User can check if same content is available in his cloud account with the same account which he registered in and see those files status. IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3819

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology

Fig. 5 Authentication. VII. Performance Analysis In the cloud storage it will check every process whether the performance is good in both server side and client side are not. In the deduplication process, unique part of data, or byte patterns, are found and stored during a method of analysis. As the analysis continues, other parts are compared to the stored copy and whether a match occurs, the redundant part is replaced with a little reference that points to the stored part. Given that the same byte pattern may be in groups, hundreds, or even thousands of times (the match frequency is dependent on the part size), the amount of data that must be stored or transferred can be greatly reduced. The performance of the proposed system can be seen to be higher than that of the existing system. Both the systems are made to run for a time period of 1 hour and the values are taken. This can be illustrated in figure 6. The parameters taken in consideration are Average Request Processing Time (APT) Average Failure of Request (AFR) Average Number of Downloads (AND) Table 4.1: Comparison between Existing and Proposed System. Existing System

Proposed System

(Per hour)

(Per hour)

APT (in ms) 9

AFR

AND

4

8

IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

APT (in ms) 7

AFR

AND

6

5

Page 3820

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology The above values are recorded onto a graph. This graph clearly illustrates the differences in the performance of the existing system and the proposed system.

Fig. 6: Comparison of Performance between Existing and Proposed System. When comparing the graphs of the existing system and that of the proposed system, we find that the existing system shows lesser processing time for requests. This shows that the server is under fewer loads and is able to process requests quicker. The average failure of requests to be fully processed goes slightly higher. This includes instances where the user has started the request process but has not completed the request fully. This indicates that unnecessary users are terminated and denied access to the resources. The next parameter is the average number of downloads in an hour, which goes lower than the existing system. This indicates that not everybody and anybody are allowed access to download the file. The restricted access helps eliminate unnecessary users from accessing the resources. VIII. Conclusion Deduplication process is successfully done over the cloud files and existing files are replaced and so cloud storage is efficiently handled and the files are secured with POW. Encryption to protect cloud stored data against honest but curious servers and outside adversaries. POW is proven to be secure under the bounded leakage setting. Weaknesses of state of the solutions such as the on trusted third parties, have been overcome. Future work involves the reduction of client storage space in regard to decryption keys. Likewise, content guessing attacks against very low entropy with remains as an open research problem. Finally, exploring other cryptographic approaches such as Attribute Based Encryption and Proofs of Work could lead to outstanding new solutions. Acknowledgements We acknowledge our sincere thanks to Sathyabama University for providing all the resources to complete our work successfully.

IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3821

Nirmalrani V*et al. /International Journal Of Pharmacy & Technology References 1.

S. Bera, S. Misra, and J. J. P. C. Rodrigues, “Cloud Computing Applications for Smart Grid: A Survey,” IEEE Transaction on Parallel Distributed Systems to be published.

2.

S. Das et al., “Mapping of Sensor Nodes with Servers in a Mobile Health- Cloud Environment,” IEEE International Conference on E-Health Networking, Applications and Services (HEALTHCOM), 2013.

3.

S. Misra et al., “QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment,” IEEE Trans. Cloud Computing, Vol. 2, No. 2, 2014.

4.

S. Misra et al., “Learning Automata-Based QoS Framework for Cloud IAAS,” IEEE Transanction on Network Service Management, Vol. 11, No. 1, 2014, pp. 15 – 24.

5.

C-I. Fan and S-Y. Huang, “Timed-Release Predicate Encryption and its Extensions in Cloud Computing,” Jounal of Internet Technology, Vol. 15, No. 3, 2014, pp. 413 – 426.

6.

Dropbox, https://www.dropbox.com/

7.

Bitcasa, https://www.bitcasa.com/

8.

M. Dutch and L. Freeman, “Understanding Data De-Duplication Ratios,” Proceedings of SNIA, 2009, http://www.snia.org

9.

W. V. der Laan, Dropship, https://github.com/driverdan/dropship.

10. S. Halevi et al., “Proofs of Ownership in Remote Storage Systems,” Proceedings of ACM Conference on Computer and Communications (CCS), 2011. 11. R. Di Pietro and A. Sorniotti, “Boosting Efficiency and Security in Proof of Ownership for Deduplication,” ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012. 12. B. H. Bloom, “Space/Time Trade-Offs in Hash Coding with Allowable Errors,” Communication of the ACM, Vol. 13, No. 7, 2007, pp. 422 – 426. 13. L. Fan et al., “Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol,” IEEE / ACM Transaction on Networking, Vol. 8, No. 3, 2000, pp. 281 – 293. 14. D. Guo et al., “The Dynamic Bloom Filter,” IEEE Transaction on Knowledge of Data Engineering, Vol. 22, No. 1, 2010, pp. 120 – 133. Corresponding Author: Elvin A*, Email: [email protected]

IJPT| June-2016 | Vol. 8 | Issue No.2 | 3815-3822

Page 3822

Suggest Documents