You are on page 1of 17

EAST WEST INSTITUTE OF TECHNOLOGY

PRESENTATION ON SECURE CLOUD DATA STORAGE SERVICES Under the guidance of


Mrs. SMITHA .B.N Lecturer, ISE

By:
SOUMYA.B.C SUPRIYA.H.JOSHI

CONTENTS

Introduction Aim Of The Project Literature survey Software and Hardware Requirement Detail Design Implementation Testing Conclusion Future Enhancement Bibliography

INTRODUCTION

Cloud computing refers to the provision of computational resources on demand via a network

Cloud computing has been envisioned as the next generation architecture of the IT enterprise due to its long list of unprecedented advantages in IT.

One fundamental aspect of this new computing model is that data is being centralized or outsourced into the cloud.

AIM OF THE PROJECT

Our goal is to enable public auditing for cloud data storage security.

Protect Data Privacy

In this project to enable on-demand data correctness verification of data on behalf of cloud data owners we are proposing an efficient

method called publicly auditable cloud data storage.

EXISTING SYSTEM

In Cloud computing data owners can remotely store their data in the cloud.

Eliminates their physical control of storage dependability and security, avoidance of capital expenditure on hardware, software, personnel maintenance

DISADVANTAGES

It brings security threats to the out sourced data.

A broad range of both internal and external threats to data integrity. Cloud service providers (CSPs) can behave unfaithfully toward cloud customers regarding the status of their outsourced data.

PROPOSED SYSTEM

To fully ensure data security and save data owners computation resources, we propose to enable publicly auditable cloud storage services .

Third party auditing provides a transparent yet cost-effective method for establishing trust between data owner and cloud server.

ADVANTAGES

Ensures data security and computation resources

Third party auditing provides a transparent yet cost-effective method for establishing trust between data owner and cloud

server.

The data owner should just enjoy the cloud storage service while being worry-free about storage auditing correctness.

SOFTWARE SPECIFICATION

Hardware Requirements
Intel Pentium Family 750 MHz 128 MB 20 GB or higher Super Video Graphics Adapter (SVGA)

Processor Processor Speed Mother Board Hard Disk display Card

Software Requirements

Language : Java Front End Tool : Swing packages : RMI Operating SYSTEM: Windows XP.

SYSTEM ARCHITECTURE
Public data auditing

TPA
Data auditing request

Cloud server

Security message flow

File access
Outsourced data files

Issuing file access credential

user

IMPLEMENTATION

Goal of implementation The first goal of implementation is to provide privacy for the outsourced data to the cloud servers. Java has been used for developing the code.

ALGORITHM

A straightforward approach to protect the data integrity would be using traditional cryptographic methods, such as the well-known message authentication codes (MACs).
We are using HMAC-SHA1-ALGORITHM to generate the message authentication codes (MAC).

TESTING
Testing Phase

Testing is the process of detecting errors

Testing performs a very critical role for quality assurance and for ensuring the reliability of software. Unit testing Integration testing System testing Validation Testing

There are other types of testing phase like


CONCLUSION

In this project we focus on cloud data storage security.


cloud computing moves the application software and databases to servers in large data centers on the Internet. Cloud computing supports for efficiently describing, developing and evaluating the secure data storage problems.

FUTURE ENHANCEMENT

The project will be more user friendly with the future enhancement. cloud data storage not only provides dynamic and scalable storage services, but also allows easy on-demand file sharing. cloud computing moves the application software and databases to servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. Cloud computing has been envisioned as the next-generation architecture of enterprise IT..

BIBLIOGRAPHY

You might also like