You are on page 1of 10

PROJECT PHASE-I

Data Integrity Security in Cloud Storage

Under the guidance of:


Dr. B. Narsing Rao
Professor Dept of CSE

Submitted by:
Praveenkumar
1PI10SCS13
M.Tech III sem
Dept of CSE MTech(3rd sem)

1/10

CONTENTS

INTRODUCTION

PROJECT SCOPE

PROJECT CHALLENGES

EXISTING SYSTEM

PROPOSED SYSTEM

2/10

Dept of CSE MTech(3rd sem)

INTRODUCTION

Cloud computing.

Data outsourcing to cloud storage servers.

Security concerns.

Proof of retrivability(POR).

3/10

Dept of CSE MTech(3rd sem)

PROJECT SCOPE

Focus on providing integrity of data, which is


stored across cloud storage server

4/10

PROJECT CHALLENGES

How to reduce the computational overhead of


client and cloud storage server.
How to reduce the storage overhead of the client.
How to minimizes the size of the proof of data
integrity so as to reduce the network bandwidth
consumption.

5/10

EXISTING SYSTEM

Proof of retrivability (POR) scheme


Keyed hash function
This scheme is very simple and easily implementable

Drawback:
High resource costs it requires for the implementation

6/10

Dept of CSE MTech(3rd sem)

CONTD

Proof of retrivability (POR) scheme for large files using


sentinels

fig1.

Schematic view of a proof of retrievability

Dept of CSE MTech(3rd sem)

7/10

CONTD
Only a single key can be used irrespective of the size of
the file or the number of files whose retrievability it
wants to verify.

Drawbacks:

Small users with limited computational power


Storage overhead at the server due to newly
inserted sentinels.

8/10

Dept of CSE MTech(3rd sem)

PROPOSED SYSTEM

Does not involve the encryption of the whole data.

Verifier needs to store only a single cryptographic key

Third party auditor (TPA) is responsible for checking the


integrity of the data.

9/10

Dept of CSE MTech(3rd sem)

THANK YOU

10

Dept of CSE MTech(3rd sem)

You might also like