Identity-Based Data Outsourcing With Comprehensive
Identity-Based Data Outsourcing With Comprehensive
Clouds
Abstract
Cloud storage system provides facilitative file storage and sharing services for
distributed clients. To address integrity, controllable outsourcing and origin
auditing concerns on outsourced files, we propose an identity-based data
outsourcing (IBDO) scheme equipped with desirable features advantageous over
existing proposals in securing outsourced data. First, our IBDO scheme allows a
user to authorize dedicated proxies to upload data to the cloud storage server on
her behalf, e.g., a company may authorize some employees to upload files to the
company’s cloud account in a controlled way. The proxies are identified and
authorized with their recognizable identities, which eliminates complicated
certificate management in usual secure distributed computing systems. Second, our
IBDO scheme facilitates comprehensive auditing, i.e., our scheme not only permits
regular integrity auditing as in existing schemes for securing outsourced data, but
also allows to audit the information on data origin, type and consistence of
outsourced files. Security analysis and experimental evaluation indicate that our
IBDO scheme provides strong security with desirable efficiency.
Existing System
We observe two critical issues not well addressed in existing proposals. First, most
schemes lack a controlled way of delegatable outsourcing. One may note that many
cloud storage systems (e.g., Amazon, Dropbox, Google Cloud storage) allow the
account owner to generate signed URLs using which any other designated entity
can upload, and modify content on behalf of the user. However, in this scenario,
the delegator cannot validate whether or not the authorized one has uploaded the
file as specified or verify whether or not the uploaded file has been kept intact.
Hence, the delegator has to fully trust the delegatees and the cloud server. In fact,
the file-owner may not only need to authorize some others to generate files and
upload to a cloud, but also need to verifiably guarantee that the uploaded files have
been kept unchanged. For instance, in Electronic Health Systems (EHS), when
consulting a doctor, the patient needs to delegate her doctor to generate electronic
health records (EHRs) and store them at a remote EHRs center maintained by a
CSP . In another typical scenario of cloud-aided office applications, a group of
engineers in different places may fulfill a task in cooperation. The group leader can
create a cloud storage account and authorize the members with secret warrants.
The behavior of the group members and the cloud server should be
verifiable.Second, existing PoS-like schemes, including PDP and Proofs of
Retrievability (PoR) , do not support data log related auditing in the process of data
possession proof. The logs are critical in addressing disputes in practice. For
example, when the patient and doctor in EHS get involved medical disputes, it
would be helpful if some specific information such as outsourcer, type and
generating time of the outsourced EHRs are auditable. However, there exist no
PoS-like schemes that can allow validation of these important information in a
multi-user setting.
Proposed Syatem
Module Description
A user and her authorized proxies can securely outsource files to a remote cloud
server which is not fully trustable, while any unauthorized ones cannot outsource
files on behalf of the user. The cloud clients, including the file-owners, proxies and
auditors, are recognized with their identities, which avoids the usage of
complicated cryptographic certificates. This delegate mechanism allows our
scheme to be efficiently deployed in a multi-user setting. The adversary can ask for
private key for any identity IDi. The challenger generates ski and gives it to A.
This query means that the attacker can collude with some file-owner or proxy.
Our IBDO scheme achieves strong security in the sense that: (1) it can detect any
unauthorized modification on the outsourced files and (2) it can detect any
misuse/abuse of the delegations/authorizations. These security properties are
formally proved against active colluding attackers. To the best of our knowledge,
this is the first scheme that simultaneously achieves both goals. An IBDO system
confronts two types of active attacks. The cloud client may impersonate others,
specifically, she may impersonate an owner or another authorized proxy, or abuse
a delegation, and in this way she can process a file and outsource it to the storage
server in an unwanted way. On the other hand, a malicious storage server may
modify or even remove the outsourced files (for example, for saving storage space
or due to hardware failures), especially for the rarely accessed files.
System Requirements
Hard Disk - 20 GB
Monitor - SVGA
S/W System Configuration
Scripts : JavaScript.
Algorithm implementation
Diffie–Hellman
Future Enhancement