auditing cloud data with group
TRANSCRIPT
Public Authentication Inspection for Shared
Dynamic Cloud Data with Group User
Revocation Including Backup And Data
Storage.
- PUSHKAR ZAGADE - SHRUTI YADAV - AISHWARYA SHAH
Guide : Prof. R. P. Bachate
9/11/2015 1
With traditional desktop computing, we run copies of
software programs on our own computer. The documents
we create are stored on our own pc.
Although documents can be accessed from other computers
on the network, they can’t be accessed by computers
outside the network. This is PC-centric.
With cloud computing, the software programs use
aren’t run from one’s personal computer, but are
rather stored on servers accessed via the Internet.
9/11/2015 2
If a computer crashes, the software is still available for
others to use. Same goes for the documents one create;
they’re stored on a collection of servers accessed via the
Internet.
Anyone with permission can not only access the
documents, but can also edit and collaborate on those
documents in real time.
Unlike traditional computing, this cloud computing model is
not PC-centric, it is document-centric.
9/11/2015 3
1. Lower computer costs.
2. Improved performance.
3. Reduced software costs.
4. Improved document format compatibility.
5. Unlimited storage capacity.
6. Increased data reliability.
7. Universal document access.
8. Latest version availability.
9. Device independence.
9/11/2015 4
1. Requires a constant Internet connection.
2. Does not work well with low-speed connections.
3. Features might be limited.
4. Can be slow.
5. Stored data might not be secure.
6. Stored data can be lost.
9/11/2015 5
In untrusted cloud, data can be easily lost and
corrupted due to human error or hardware failure.
It will be very difficult to recover corrupted data.
As there are increasing data storage on cloud
which causes lots of memory consumption. So,
there is need of removal of data duplication.
9/11/2015 6
Some commercial cloud storage services, such as the
simple storage service(S3) on-line data backup services
of Amazon and some practical cloud based software
Google Drive, Dropbox, Mozy, Bitcasa, and Memopal,
have been built for cloud application.
The cloud servers may return an invalid result in some
cases, such as server hardware/software failure, human
maintenance and malicious attack.
9/11/2015 7
Solves the security and efficiency problems of
public data integrity auditing with multi-user
modification.
Some basic tools have been used to construct our
scheme.
We assume that the underlying building blocks are
secure, which include the vector commitment,
group signature, and asymmetric group key
agreement scheme and data recovery.
9/11/2015 8
Our Contributions will be:
We will explore on the secure and efficient shared data integrity auditing for multi-user operation for cipher text database.
We will propose an efficient data auditing scheme while at the same time provide some new features, such as traceability and count ability with data backup and storage.
As there is ever-increasing data storage on cloud, there is need to sort the data in such a way that the data duplication is removed and memory wastage can be avoided. Hence we will be using deduplication algorithm for eliminating this problem.
9/11/2015 9
DATA OWNER In this module an owner has to upload its files in a
cloud server, But he/she should register first. Then only
he/she can be able to do it.
Third Party Auditor (TPA)
Third Party Auditor (TPA) also known as cloud
maintainer. He/she need to register and login first.
After third party auditor gets logged in, He/ She can
see how many data owners have uploaded their files
into the cloud.
9/11/2015 11
USER
In this module if a user wants to access the data which
is stored in a cloud, he/she should register their details
first. These details are maintained in a Database.
If the user is an authorized user, he/she can download
the file by using file id which has been stored by data
owner.
Cloud Admin
In this module, admin will maintain user details and
examine shared files from user. Admin also maintain
details of those files.
9/11/2015 12
Cloud Server
In this module, cloud server is responsible for to
check the backup request which made by user.
Cloud server forward this request to Back Cloud
by using file id.
Back Cloud
In this module, Back cloud verify the backup
request and send data to user.
9/11/2015 13
1. More Security
2. More Efficiency
3. Correctness Of Results.
4. Successful Recovery Of Data
5. No Duplication Of Data
9/11/2015 15
Hardware Requirements:
Processor - Dual Core
Speed - 1.1 GHz
Ram - 256mb (Min)
Hard Disk - 20 Gb
Key Board - Standard Window Keyboard
Mouse - Two or three mouse button
Monitor - SVGA
9/11/2015 16
Software Requirements:
Operating System - Windows XP/7/8 or Linux
Front End - HTML,JAVA,JSP
Scripts - JavaScript
Server Side Script - JAVA Server Pages
Database - MySQL
Database Connectivity - JDBC
IDE - Eclipse / NetBeans
Tools - OpenStack ( For Cloud Creation )
9/11/2015 17
. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-
preserving public auditing for data storage security in cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525– 533.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber
=7004787&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F12%2F4358213%2F07004787.pdf%3Farnumber%3D7004787
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber
=6808577&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6808577
9/11/2015 18