© 2016, IJCERT All Rights Reserved Page | 6
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 1, January-2016, pp. 6-12 ISSN (O): 2349-7084
Provable Multicopy Dynamic Data
Possession in Cloud Computing Systems
1
R.Bindu,
2
U.Veeresh,
3
CH. Shashikala
1
Pursuing M.Tech, CSE Branch, Dept of CSE
2
Assistant Professor, Department of Computer Science and Engineering
3
Assistant Professor, Department of Computer Science and Engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract- Gradually more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs).
clients can rent the CSPs storage infrastructure to store and get back almost infinite amount of data by paying amount per month.
On behalf of an improved level of scalability, availability, and durability, some clients may want their data to be virtual on multiple
servers across multiple data centers. The more copies the CSP is asked to store, the more amount the clients are charged. As a
result, clients need to have a strong assurance that the CSP is storing all data copies that are decided upon in the service
contract, and all these copies are reliable with the most recent modifications issued by the clients. Map-based provable multicopy
dynamic data possession (MB-PMDDP) method is being proposed in this paper and consists of the following features: 1) it
affords an proof to the clients that the CSP is not corrupt by storing less copies; 2) it supports outsourcing of dynamic data, i.e., it
supports block-level functions, such as block alteration, addition, deletion, and append; and 3) it permits official users to
effortlessly access the file copies stored by the CSP. In addition, we discuss the security against colluding servers, and discuss
how to recognize corrupted copies by a little revising the projected scheme.
Key words— Cloud computing, dynamic environment, data duplication, outsourcing data storage.
—————————— ——————————
1. INTRODUCTION:
Outsourcing data to a remote cloud service provider
(CSP) permits society to store additional data on the
CSP than on private computer systems. Such Out
sourcing of data storage allows society to focus on
improvement and relieves the load of constant server
updates and other computing matter. On one occasion
the data has been outsourced to a remote CSP which
may not be dependable, the data owners drop the
direct control over their confidential data. This need of
control raises new difficult and demanding tasks
connected to data confidentiality and integrity
protection in cloud computing. The confidentiality
issue can be feeling by encrypting confidential data
before outsourcing to remote servers. As such, it is a
vital demand of customers to have strong proofs that
the cloud servers still have their data and it is not
being corrupt with or partially deleted over time. As a
result, many researchers have payed attention on the
problem of provable data possession (PDP) and
proposed different systems to review the data stored
on remote servers.
PDP is a method for authenticating data integrity over
remote servers. In a typical PDP model, the data owners
produce some metadata for a data file to be used later
for verification purposes through a challenge-response
protocol with the remote/cloud server. The owner sends
the file to be stored on a remote server which may be
untrusted, and erases the local copy of the file. One of
the core design ethics of outsourcing data is to provide
dynamic behavior of data for a variety of applications.
This means that the slightly stored data can be not only
accessed by the authorized users, but also efficient and
scaled Examples of PDP constructions that deal with
dynamic data [10]-[14]. The final are how-ever for a single
copy of the data file. PDP method has been obtainable
for multiple copies of static data [15]Ȯ[17]. PDP system
directly deals with multiple copies of dynamic data. When
proving multiple data copies, generally system integrity
check fails if there is one or more corrupted copies were
present. To deal with this issue and recognize which
copies have been corrupted, a slight modification has
Available online at: www.ijcert.org