Moving user data on cloud provides convenience
and avoids the complexity and hardware management for the
user. However, the cloud concept brings many challenges
which influence the system on various factors such as
usability, security, reliability, scalability and overall system
performance. User who is storing the data on cloud server
has to check the integrity of the data which becomes an
overhead every time. This task is outsourced to another
public auditor. These parties may not be trustworthy. To
mitigate this possibility and to alleviate the integrity checking
and computation overhead we proposed a system. Proposed
system does the integrity checking and preserves the privacy
of the data from the Third Party Auditor.
Saurabhee Wandhekar : received the Bachelors degree in
Computer Engineering and currently pursuing Masters degree in
Computer Engineering both from Savitribai Phule Pune
University.Her research interests include cloud computing.
Aradhana Deshmukh : received M.E., M.A. (Economics), Ph.D
(pursing).Shehas an excellent academic background. She has
almost 11years of teaching experience. She is currently working
as Assistant Professor in the Department of computer
Engineering, STES’s, Smt. Kashibai Nawale College of
Engineering, Pune. She has published 81 papers in Internationl
Journals, Conferences. She has received Gold Medal at
International level Paper Presentationon ‘UWB Technology based
Adhoc Network’, received ‘Gunawant Nagrik Puraskar’for the year
2004-2005, ‘Anushka Purskar’ form Pimpari ChinchwadMunicipal
Corporation, Pune. She was elected from Computer Engineering
division in Institution of Engineers (India) continuously from 2002
to 2014. She is a member of Computer, Society of India (CSI),
Member IAENG, Hongkong, Member UACEA, USA.
Cloud Storage, Integrity, Proof of Retrievability
[POR], Public Auditing.
This paper describes importance of the cloud for storage,
challenges in using cloud as storage and prior works to
solve those challenges. Paper addressed the lack of privacy
preservation in existing system and proposed a system
which provides Public Integrity verification, Privacy from
public auditor and cloud storage server, Dynamic Data
modification.
[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable data
possession at untrusted stores,” in Proc. 14th ACM
Conf. Comput. Commun. Security, 2007, pp. 598–609.
1
[2] A. Juels and B. S. Kaliski Jr, “Pors: Proofs of
retrievability for large files,” in Proc. 14th ACM Conf.
Comput. Commun. Security, 2007, pp. 584–597. 2
[3] L. V. M. Giuseppe Ateniese, R. D. Pietro, and G.
Tsudik, “Scalable and efficient provable data
possession,” in Proc. Int. Conf. Security Privacy
Commun. Netw., 2008, pp. 46–66. 11
[4] H. Shacham and B. Waters, “Compact proofs of
retrievability” in Proc. 14th Int. Conf Theory Appl
Cryptol. Inf. Security, 2008,
[5] C. Wang, Q. Wang, and K. Ren, “Ensuring data storage
security in cloud computing,” in Proc. 17th Int.
Workshop Quality Serv., 2009, pp. 1–9. 22
[6] Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong,
and Fatos Xhafa, “OPoR: Enabling Proof of
Retrievability in Cloud Computing with Resource-
Constrained Devices,” IEEE 2015.
[7] H. Xiong, X. Zhang, D. Yao, X. Wu, and Y.
Wen,“Towards end-to-end secure content storage and
delivery with public cloud,” in Proc. ACM Conf. Data
Appl. Security Privacy, 2012, pp. 257–266.
[8] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of
retrievability: Theory and implementation,” in Proc.
ACM Workshop Cloud Comput. Security, 2009, pp.
43–54
[9] M. Naor and G. N. Rothblum, “The complexity of
online memory checking,” J. ACM, vol. 56, no. 1, pp.
2:1–2:46, Feb. 2009.
[10] Q. Zheng and S. Xu, “Fair and dynamic proofs of
retrievability,”in Proc. 1st ACM Conf. Data Appl.
Security Privacy, 2011, pp. 237–248.
[11] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.
Yau, “Dynamic audit services for integrity verification
of outsourced storages in clouds,” in Proc. ACM Symp.
Appl. Comput., 2011,pp. 1550–1557.
[12] Q. Zheng, and S. Xu, “Secure and efficient proof of
storage with deduplication,” in Proc. ACM Conf. Data
Appl. Security Privacy, 2012, pp. 1–12.
[13] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative
provable data possession for integrity verification in
multicloud storage,” IEEE Trans. Parallel Distrib.
Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.
[14] H. Li, B. Wang, and B. Li, “Oruta: Privacy-preserving
public auditing for shared data in the cloud,” IEEE
Trans. Cloud Comput., vol. 2, no. 1, pp. 43–56, Jan.–
Mar. 2014
[15] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
“Enabling public verifiability and data dynamics for
storage security in cloud computing,” in Proc. 14th
Eur. Symp. Res. Comput. Security, 2009, pp. 355–370