© 2016, IJCERT All Rights Reserved Page | 6 International Journal of Computer Engineering In Research Trends Volume 3, Issue 1, January-2016, pp. 6-12 ISSN (O): 2349-7084 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 1 R.Bindu, 2 U.Veeresh, 3 CH. Shashikala 1 Pursuing M.Tech, CSE Branch, Dept of CSE 2 Assistant Professor, Department of Computer Science and Engineering 3 Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India. Abstract- Gradually more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). clients can rent the CSPs storage infrastructure to store and get back almost infinite amount of data by paying amount per month. On behalf of an improved level of scalability, availability, and durability, some clients may want their data to be virtual on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more amount the clients are charged. As a result, clients need to have a strong assurance that the CSP is storing all data copies that are decided upon in the service contract, and all these copies are reliable with the most recent modifications issued by the clients. Map-based provable multicopy dynamic data possession (MB-PMDDP) method is being proposed in this paper and consists of the following features: 1) it affords an proof to the clients that the CSP is not corrupt by storing less copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level functions, such as block alteration, addition, deletion, and append; and 3) it permits official users to effortlessly access the file copies stored by the CSP. In addition, we discuss the security against colluding servers, and discuss how to recognize corrupted copies by a little revising the projected scheme. Key wordsCloud computing, dynamic environment, data duplication, outsourcing data storage. —————————— —————————— 1. INTRODUCTION: Outsourcing data to a remote cloud service provider (CSP) permits society to store additional data on the CSP than on private computer systems. Such Out sourcing of data storage allows society to focus on improvement and relieves the load of constant server updates and other computing matter. On one occasion the data has been outsourced to a remote CSP which may not be dependable, the data owners drop the direct control over their confidential data. This need of control raises new difficult and demanding tasks connected to data confidentiality and integrity protection in cloud computing. The confidentiality issue can be feeling by encrypting confidential data before outsourcing to remote servers. As such, it is a vital demand of customers to have strong proofs that the cloud servers still have their data and it is not being corrupt with or partially deleted over time. As a result, many researchers have payed attention on the problem of provable data possession (PDP) and proposed different systems to review the data stored on remote servers. PDP is a method for authenticating data integrity over remote servers. In a typical PDP model, the data owners produce some metadata for a data file to be used later for verification purposes through a challenge-response protocol with the remote/cloud server. The owner sends the file to be stored on a remote server which may be untrusted, and erases the local copy of the file. One of the core design ethics of outsourcing data is to provide dynamic behavior of data for a variety of applications. This means that the slightly stored data can be not only accessed by the authorized users, but also efficient and scaled Examples of PDP constructions that deal with dynamic data [10]-[14]. The final are how-ever for a single copy of the data file. PDP method has been obtainable for multiple copies of static data [15]Ȯ[17]. PDP system directly deals with multiple copies of dynamic data. When proving multiple data copies, generally system integrity check fails if there is one or more corrupted copies were present. To deal with this issue and recognize which copies have been corrupted, a slight modification has Available online at: www.ijcert.org