ii
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this Report titled “Efficient remote data integrity checking with
securely Outsourcing of Key Updates” is the bonafide work of R.SHANTHINI
(621615405014) who carried out the work under my supervision. Certified further
that to the best of my knowledge the work reported herein does not form part of any
other thesis or dissertation on the basis of which a degree or award was conferred on
an earlier occasion on this or any other candidate.
Signature of the HOD Signature of the Supervisor
Prof. A. PADMA, M.E., Ph.D., Prof. A. PADMA, M.E., Ph.D.,
Professor and Head Professor and Head
Department of Computer Science and Department of Computer Science and
Engineering Engineering
Muthayammal Engineering College Muthayammal Engineering College
Rasipuram-637408 Rasipuram-637408
Submitted for the ANNA UNIVERSITY Project Phase-I Viva-Voce examination
held on
Internal Examiner External Examiner
iii
ABSTRACT
Key-exposure resistance has always been an important issue for in-depth
cyber defense in many security applications. Recently, how to deal with the key
exposure problem in the settings of cloud storage auditing has been proposed and
studied. To address the challenge, existing solutions all require the client to update his
secret keys in every time period, which may inevitably bring in new local burdens to
the client, especially those with limited computation resources such as mobile phones.
In this paper, we focus on how to make the key updates as transparent as possible for
the client and propose a new paradigm called cloud storage auditing with verifiable
outsourcing of key updates. In this paradigm, key updates can be safely outsourced to
some authorized party, and thus the key-update burden on the client will be kept
minimal. Specifically, we leverage the third party auditor (TPA) in many existing
public auditing designs, let it play the role of authorized party in our case, and make it
in charge of both the storage auditing and the secure key updates for key-exposure
resistance. In our design, TPA only needs to hold an encrypted version of the client’s
secret key, while doing all these burdensome tasks on behalf of the client. The client
only needs to download the encrypted secret key from the TPA when uploading new
files to cloud. Besides, our design also equips the client with capability to further verify
the validity of the encrypted secret keys provided by TPA. All these salient features are
carefully designed to make the whole auditing procedure with key exposure resistance
as transparent as possible for the client. We formalize the definition and the security
model of this paradigm. The security proof and the performance simulation show that
our detailed design instantiations are secure and efficient.
iv
ACKNOWLEDGEMENT
Owing deeply to the supreme, first and foremost I thank the lord almighty who
has blessed me to make this project work, a success. I take immense pleasure to
express my deep sense of gratitude to my parents and well-wishers.
I take this wonderful opportunity to thank our honourable Founder and
Chairman Shri R. Kandasamy, Muthayammal Educational Trust & Research
Foundation.
I express my heartful thanks to Prof.K.Gunasekaran M.E., (Ph.D)., F.I.E.,
Secretary and Managing Trustee for providing necessary facilities to complete the
project.
I extend my hearty gratitude to our Principal Dr.S.Nirmala, M.E., Ph.D., of
Muthayammal Engineering College for her consistent support and encouragement.
I express my deep sense of gratitude and sincere thanks to Prof. A. PADMA,
M.E., Ph.D., Head of the Department for her guidance and kind co-operation.
I extend my heartfelt thanks to my guide Prof. A. PADMA, M.E., Ph.D.,
Assistant Professor, Department of Computer Science and Engineering for her
exemplary guidance, constant encouragement and kind co-operation throughout the
project.
I express my heartful gratitude and sincere thanks to Mr.T. ARAVIND, M.E.,
Project Coordinator who have been constantly inculcating with logistic support and
encouragement throughout the project.
I whole heartedly thank all the philanthropic teaching and non-teaching faculty
members of my department without whom I would not be able to make this project a
reality.
v
TABLE OF CONTENTS
CHAPTER NO TITLE PAGE NO
ABSTRACT iii
LIST OF FIGURES vii
LIST OF ABBREVIATIONS viii
1 INTRODUCTION 1
1.1 CLOUD COMPUTING 1
1.2 CLOUD COMPONENTS 2
1.3 TYPES OF CLOUDS 3
1.4 CHARACTERISTICS 3
1.5 CLOUD SERVICES 4
1.6 DATA OUTSOURCING 4
1.7 GROUP KEY MANAGEMENT 5
1.8 SYSTEM OVERVIEW 6
1.9 OBJECTIVE OF THE PROJECT 6
2 LITERATURE REVIEW 7
3 SYSTEM INFORMATION 12
3.1 EXISTING SYSTEM 12
3.2 PROPOSED SYSTEM 12
3.3 SYSTEM REQUIREMENTS 13
3.4 SOFTWARE DESCRIPTION 14
4 SYSTEM ORGANIZATION 16
4.1 SYSTEM ARCHITECTURE 16
vi
4.2 MODULES DESCRIPTION 18
5 IMPLEMENTATION 21
6 CONCLUSION AND FUTURE WORK 25
REFERENCES 26
LIST OF FIGURES
vii
FIGURE NO TITLE PAGE NO.
1.1 Application of cloud storage 1
1.2 Working Models Basics 4
1.3 Service Models 16
2.1 Architecture of Cloud Data Storage Service 17
2.2 System Model Of Current Cloud Storage Auditing
3.1 . NET Framework
4.1 System Architecture
LIST OF ABBREVIATIONS
viii
AWS - Amazon Web Services
GCE - Google Compute Engine
GL - Group Leader
GM - Group Member
GA - Group Administrator
SK - Subgroup Key
GK - Group Key
JS - JavaScript
PHP - Hypertext Preprocessor
DB - Database