Professional Documents
Culture Documents
By:
SOUMYA.B.C SUPRIYA.H.JOSHI
CONTENTS
Introduction Aim Of The Project Literature survey Software and Hardware Requirement Detail Design Implementation Testing Conclusion Future Enhancement Bibliography
INTRODUCTION
Cloud computing refers to the provision of computational resources on demand via a network
Cloud computing has been envisioned as the next generation architecture of the IT enterprise due to its long list of unprecedented advantages in IT.
One fundamental aspect of this new computing model is that data is being centralized or outsourced into the cloud.
Our goal is to enable public auditing for cloud data storage security.
In this project to enable on-demand data correctness verification of data on behalf of cloud data owners we are proposing an efficient
EXISTING SYSTEM
In Cloud computing data owners can remotely store their data in the cloud.
Eliminates their physical control of storage dependability and security, avoidance of capital expenditure on hardware, software, personnel maintenance
DISADVANTAGES
A broad range of both internal and external threats to data integrity. Cloud service providers (CSPs) can behave unfaithfully toward cloud customers regarding the status of their outsourced data.
PROPOSED SYSTEM
To fully ensure data security and save data owners computation resources, we propose to enable publicly auditable cloud storage services .
Third party auditing provides a transparent yet cost-effective method for establishing trust between data owner and cloud server.
ADVANTAGES
Third party auditing provides a transparent yet cost-effective method for establishing trust between data owner and cloud
server.
The data owner should just enjoy the cloud storage service while being worry-free about storage auditing correctness.
SOFTWARE SPECIFICATION
Hardware Requirements
Intel Pentium Family 750 MHz 128 MB 20 GB or higher Super Video Graphics Adapter (SVGA)
Software Requirements
Language : Java Front End Tool : Swing packages : RMI Operating SYSTEM: Windows XP.
SYSTEM ARCHITECTURE
Public data auditing
TPA
Data auditing request
Cloud server
File access
Outsourced data files
user
IMPLEMENTATION
Goal of implementation The first goal of implementation is to provide privacy for the outsourced data to the cloud servers. Java has been used for developing the code.
ALGORITHM
A straightforward approach to protect the data integrity would be using traditional cryptographic methods, such as the well-known message authentication codes (MACs).
We are using HMAC-SHA1-ALGORITHM to generate the message authentication codes (MAC).
TESTING
Testing Phase
Testing performs a very critical role for quality assurance and for ensuring the reliability of software. Unit testing Integration testing System testing Validation Testing
CONCLUSION
FUTURE ENHANCEMENT
The project will be more user friendly with the future enhancement. cloud data storage not only provides dynamic and scalable storage services, but also allows easy on-demand file sharing. cloud computing moves the application software and databases to servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. Cloud computing has been envisioned as the next-generation architecture of enterprise IT..
BIBLIOGRAPHY