Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

ABSTRACT:

More and more clients would like to store their data to public cloud servers (PCSs) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data are kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC). We give the formal definition, system model, and security model. Then, a concrete ID-PUIC protocol is designed using the bilinear pairings. The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie–Hellman problem. Our ID-PUIC protocol is also efficient and flexible. Based on the original client’s authorization, the proposed ID-PUIC protocol can realize private remote data integrity checking, delegated remote data integrity checking, and public remote data integrity checking.

EXISTING SYSTEM:

  • In public cloud environment, most clients upload their data to PCS and check their remote data’s integrity by Internet. When the client is an individual manager, some practical problems will happen. If the manager is suspected of being involved into the commercial fraud, he will be taken away by the police. During the period of investigation, the manager will be restricted to access the network in order to guard against collusion. But, the manager’s legal business will go on during the the period of investigation. When a large of data is generated, who can help him process these data? If these data cannot be processed just in time, the manager will face the lose of economic interest. In order to prevent the case happening, the manager has to delegate the proxy to process its data, for example, his secretary. But, the manager will not hope others have the ability to perform the remote data integrity checking.
  • Chen et al. proposed a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing.
  • By combining the proxy cryptography with encryption technique, some proxy re-encryption schemes are proposed. Liu et al. formalize and construct the attribute-based proxy signature.
  • Guo et al. presented a non-interactive CPA (chosen-plaintext attack)-secure proxy re-encryption scheme, which is resistant to collusion attacks in forging re-encryption keys.

DISADVANTAGES OF EXISTING SYSTEM:

  • Public checking will incur some danger of leaking the privacy.
  • Less Efficiency.
  • Security level is low

PROPOSED SYSTEM:

  • This paper is based on the research results of proxy cryptography, identity-based public key cryptography and remote data integrity checking in public cloud.
  • In public cloud, this paper focuses on the identity-based proxy-oriented data uploading and remote data integrity checking.
  • By using identity-based public key cryptology, our proposed ID-PUIC protocol is efficient since the certificate management is eliminated. ID-PUIC is a novel proxy-oriented data uploading and remote data integrity checking model in public cloud. We give the formal system model and security model for ID-PUIC protocol. Then, based on the bilinear pairings, we designed the first concrete ID-PUIC protocol.
  • In the random oracle model, our designed ID-PUIC protocol is provably secure. Based on the original client’s authorization, our protocol can realize private checking, delegated checking and public checking.
  • We propose an efficient ID-PUIC protocol for secure data uploading and storage service in public clouds.
  • Bilinear pairings technique makes identity-based cryptography practical. Our protocol is built on the bilinear pairings. We first review the bilinear pairings.

ADVANTAGES OF PROPOSED SYSTEM:

  • High Efficiency.
  • Improved Security.
  • The concrete ID-PUIC protocol is provably secure and efficient by using the formal security proof and efficiency analysis.
  • On the other hand, the proposed ID-PUIC protocol can also realize private remote data integrity checking, delegated remote data integrity checking and public remote data integrity checking based on the original client’s authorization.

SYSTEM ARCHITECTURE:

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS: 

  • System : Pentium Dual Core.
  • Hard Disk : 120 GB.
  • Monitor : 15’’ LED
  • Input Devices : Keyboard, Mouse
  • Ram : 1 GB

SOFTWARE REQUIREMENTS: 

  • Operating system : Windows 7.
  • Coding Language : NET,C#.NET
  • Tool : Visual Studio 2008
  • Database : SQL SERVER 2005

REFERENCE:

Huaqun Wang, Debiao He, and Shaohua Tang, “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 6, JUNE 2016.