towards secure & dependable storage services in cloud computing

Post on 28-Nov-2014

9.295 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

PLATFORM : JAVADOMAIN : CLOUD COMPUTING

Guided By : Mr.P.N.Renjith

TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING

PRESENTED BY

Rahid.A.K Naabih.C.S Manoj.K.S

Zeroth Review Details

1 Algorithm used :

Byzantine Fault Tolerance Algorithm

Token Pre-computation

Correctness Verification and Error Localization

Error recovery

Reed –Solomon Algorithm

Homomorphic Linear Algorithm

2Existing System and Limitations

Byzantine Error Occurrence.

Physical possession of outsourced data.

Pre-Requisition for Client manipulation.

Design Module Description

1.Login

2.New User

3.Client Manipulation

4.Administrator Login

5.Admin Manipulation

3

Operational Module Description

• Adversary Module• Cloud Data Storage Module• Third Party auditing Module• Dynamic Data operation Module

4

Login Module

• Client LoginProvided a user name and password correctness checked by Correctness Verification and

Error Localization

• New User LoginRegistration form for each userValidation done by providing Captcha and verifying email

Id and Telephone number.

5

• Provided with operations such as Download UploadView Delete

Client Manipulation Module

6

9

VALIDATION

REQUEST

RESPONSE

LOGIN

Use-case diagram for user login:

Server Client

UPLOAD

DOWNLOAD

VIEW

DELETE

Use-case diagram for client manipulation :

DATABASE

10

CLIENT

11

Class diagram:

Login

user login

user namePassword

login()

Server login

usernamePassword

login()

client home

uploaddownload

fileupload()filedownload()

server home

client detailslogin detailsfiles details

view overall details()

registration

new user signup

register()

Flowchart : Start

Home

Client loginServer login

Client pageServer page

End

Cloud System

Yes Yes

12

Dataflow Diagram :

Request to CSP

Validate User

Manipulation

Client Home

Client Database

Deny

Access

Monitoring

Acknowledgement

13

Applications :

Project Status :

25%

THANK YOU

top related