Professional Documents
Culture Documents
Effective Remote Data Integrity Detection For Data Level Dynamics And Retaining Privacy
DOMAIN:NETWORKS SUB-DOMAIN:CLOUD COMPUTING BATCH NO:12
PROJECT GUIDE: Miss.Vijayalakshmi BATCH MEMBERS: A.NANGAI R.PREMA S.BHUVANESWARI S.THENMOZHI
OUTLINE
Abstract Literature review Existing System Proposed System Module description Screen shots System diagram
System requirements
Conclusion References
Cloud Computing
Cloud computing refers to the logical computational resources (data, software) accessible via a computer network (through WAN or Internet etc.), rather than from a local computer Data are stored on Server Farms generally located in the country of the service provider. The on-line service is offered from a cloud provider.
TYPES OF CLOUD COMPUTING Public cloud Community cloud Hybrid cloud Private cloud
ABSTRACT
Existing protocols can support both features with the help of a third party auditor. In previous work they Propose a remote data integrity checking protocol that supports data dynamics. In our project, we adapt a protocol to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance.
LITERATURE SURVEY
Ensuring Data Storage Security in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage Auditing to Keep Online Storage Services Honest
Advantages:
We extend our scheme to support scalable and efficient public auditing in Cloud Computing. In particular, our scheme achieves auditing tasks from different users can be performed simultaneously by the TPA. We prove the security of our proposed construction and justify the performance of our scheme through concrete implementation and comparisons.
Disadvantages:
Loss of valuable information through TPA
SYSTEM ARCHITECTURE
Advantages
Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Avoiding local storage of data. By reducing the costs of storage, maintenance and personnel. It reduces the chance of losing data by hardware failures. Not cheating the owner.
Disadvantages
The main drawback of this scheme is the high resource costs it requires for the implementation. Also computing hash value for even a moderately large data files can be computationally burdensome for some clients (PDAs, mobile phones, etc). Data encryption is large so the disadvantage is small users with limited computational power (PDAs, mobile phones etc.).
SYSTEM ARCHITECTURE
Advantage
A fragment technique is introduced in this paper to improve performance and reduce extra storage. The audit activities are efficiently scheduled in an audit period, and a TPA needs merely access file to perform audit in each activity.
Disadvantage
Lack of rigorous performance analysis for constructed audit system greatly affects the practical application of this scheme. It is crucial to develop a more efficient and secure mechanism for dynamic audit services, in which possible adversary advantage through dynamic data operations should be prohibits.
SUMMARY
From the papers used in literature survey we can understand the problems that they face to check the data integrity and make the cloud secure. We are going to use their protocols to make our proposed system more secure, By adapting their protocols, it easy for us to rectify the current problem in our project. From the papers adapted we are using the data insertion, modification, deletion at the block level and public verifiability support. This helps our proposed protocol to be secure against an untrusted server. The adapted protocols are used in our models. By adapting their protocols, it easy for us to rectify the current problem in our project.
EXISTING SYSTEM
The Existing system uses Sebe et al protocol for remote data integrity checking . In remote data integrity checking protocols, the client challenges the server about the integrity of a certain data le, and the server generates responses proving that it has access to the complete and uncorrupted data.
The existing protocol derived by Sebe et al supports both data dynamics and public verifiability with the help of a TPA(Third party Auditor)
PROPOSED SYSTEM
In this project we propose a remote data integrity checking protocol for cloud storage, which can be viewed as an adaptation of Sebe et als protocol. The proposed protocol inherits the support of data dynamics and public veriability, At the same time it doesnt need to use a third-party auditor.
We give a security analysis of the proposed protocol, which shows that it is secure against the untrusted server and third party veriers.
MODULES
Key and Metadata Generation Dynamic Data Operation with Integrity Assurance Privacy against Verifiers
Message Encryption
Message encryption by itself provides a measure of authentication if symmetric encryption is used then: receiver know sender must have created it since only sender and receiver now key used know content cannot of been altered Provides both: sender authentication and message authenticity.
Under the semi-honest model, a third party verifier cannot get any information about the clients data m from the protocol execution. Hence, the protocol is private against third party verifiers. If the server modifies any part of the clients data, the client is be able to detect it. In case a third party verifier verifies the integrity of the clients data, the data should be kept private against the third party verifier.
HOME
ADMIN
ACCOUNT CREATION
REGSUCCESS
UPLOAD DETAILS
Second module is encryption which includes file upload,my account, user management and file management. In file upload we can upload the file from our pc with browse option. In my account user can view the account,edit and can change the existing password. User can view his details or the file details with the help of user id and file type respectively
MYACCOUNT
MODULE3-PUBLIC VERIFIABILTY
ADMIN MANAGEMENTVIEW
ADMINFILEMANAGEMENT
DATABASE
NEW ACCOUNT TABLE
Tblfiles table
SYSTEM ARCHITECTURE
SYSTEM REQUIREMENTS
Software Interface FRONT-END BACK-END FRONT-ENDSERVER 2008 BACK-END SERVER OPERATING SYSTEM BROWSER Hardware Interface PROCESSOR RAM MONITOR HARD DISK KEYBOARD MOUSE - ASP.NET WITH C# - MySQL - MICROSOFT VISUAL STUDIO - SQL SERVER 2005 - WINDOWS XP - INTERNET EXPLORER 6.0
PENTIUM IV 2.6 GHz 512 MB RAM 15 COLOR 40 GB STANDARD 102 KEYS 3 BUTTON
CONCLUSION
Proposed Protocol is proved to be secure against untrust server & TPA Protocol supports both data dynamics and public verifiability without TPA The protocol propose has very good effiency and this makes data storage as very secured
REFERENCES
[1]A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Zhuo Hao, Sheng Zhong, Nenghai Yu Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, [2] Enabling public verifiability and data dynamics for storage security in cloud computing in 14th European Symposium on Research in Computer Security,pp. 355370, Springer Berlin / Heidelberg, September 2009. C. Wang, Q. Wang, K. Ren, and W. Lou, [3] Privacy-preserving public auditing for data storage security in cloud computing, in InfoCom2010, IEEE, March 2010. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, [4] Auditing to keep online storage services honest, in Proc. of HotOS XI Usenix, 2007.