Introduction
The proof of data integrity protocol just checks the integrity of data i.e.., if the data has been illegally modified or deleted.
It means that the client of the data moves its data
to a third party cloud storage server with less cost and provide it back to the client whenever required.
It can also assure a reliable storage of important data by keeping multiple copies of the data there by reducing the chance of loosing data by hardware failures.
In this paper we deal with the problem of
implementing a protocol for obtaining a proof of data possession in the cloud is referred as proofs of retrievability(PORs).
Cloud storage
Cloud Storage Provider
Storage server Web server
Is my data available ?
Client
4
It
tries to obtain and verify a proof that the data that is stored by a user at a remote data storage in the cloud is not modified by the archive and there by the integrity of the data is assured.
The simplest Proof of retrivability (POR) scheme can be made using a keyed hash function hk(F ).
F
Encoding
Client
F F
Challenge
Response
Client
F F
decoder
Challenge Response
Unrecoverable
Client
k
Amazon S3
F
Client
Sample and check consistency across providers
11
dispersal (n,m)
F
Client
12
MAC
MAC
MAC
MAC
MAC
Client
13
peer-to-peer storage systems, network file systems, long- term archives, web-service object stores, and database systems.
The scheme should be able to produce a proof without the need for the server to access the entire file or the client retrieving the entire file from the server.
To check if the integrity of the file F is lost the verifier releases the secret key K to the cloud archive and asks it to compute and return the value of hk(F ). This scheme is very simple and easily implemented. The main drawback of this scheme are the high resource costs it requires for the implementation.
DATA INTEGRITY PROOF IN CLOUD BASED ON SELECTING RANDOM BITS IN DATA BLOCKS
There are 2 phases in this scheme. 1) Setup phase Generation of meta-data Encrypting the meta data Appending of meta data 2) Verification phase
The metadata sent by the cloud is decrypted by using the number i and the corresponding bit in this decrypted metadata is compared with the bit that is sent by the cloud. Any mismatch between the two would mean a loss of the integrity of the clients data at the cloud storage.
Advantages
It helps in reducing the maintenance and storage cost. It avoids local storage of data. It reduces the chance of loosing data by hardware failures.
Conclusion
We worked to facilitate the client in getting a proof of integrity of the data which he wishes to store in the cloud storage servers with less minimum costs and efforts. It was developed to reduce the computational and storage overhead of the client as well as to minimize the computational overhead of the cloud storage server.
A. Juels and B. S. Kaliski, Jr., "Pors: proofs of retrievability for large files,"
www.inspireengine.com www.seminars.com,e.t.c.
Thank You
By
Gude.Usharani
Reg No:118R1D0518