auditing cloud data with group

18
Public Authentication Inspection for Shared Dynamic Cloud Data with Group User Revocation Including Backup And Data Storage. - PUSHKAR ZAGADE - SHRUTI YADAV - AISHWARYA SHAH Guide : Prof. R. P. Bachate 9/11/2015 1

Upload: jspms-jscoe-pune-maharashtra

Post on 17-Jan-2017

280 views

Category:

Education


1 download

TRANSCRIPT

Public Authentication Inspection for Shared

Dynamic Cloud Data with Group User

Revocation Including Backup And Data

Storage.

- PUSHKAR ZAGADE - SHRUTI YADAV - AISHWARYA SHAH

Guide : Prof. R. P. Bachate

9/11/2015 1

With traditional desktop computing, we run copies of

software programs on our own computer. The documents

we create are stored on our own pc.

Although documents can be accessed from other computers

on the network, they can’t be accessed by computers

outside the network. This is PC-centric.

With cloud computing, the software programs use

aren’t run from one’s personal computer, but are

rather stored on servers accessed via the Internet.

9/11/2015 2

If a computer crashes, the software is still available for

others to use. Same goes for the documents one create;

they’re stored on a collection of servers accessed via the

Internet.

Anyone with permission can not only access the

documents, but can also edit and collaborate on those

documents in real time.

Unlike traditional computing, this cloud computing model is

not PC-centric, it is document-centric.

9/11/2015 3

1. Lower computer costs.

2. Improved performance.

3. Reduced software costs.

4. Improved document format compatibility.

5. Unlimited storage capacity.

6. Increased data reliability.

7. Universal document access.

8. Latest version availability.

9. Device independence.

9/11/2015 4

1. Requires a constant Internet connection.

2. Does not work well with low-speed connections.

3. Features might be limited.

4. Can be slow.

5. Stored data might not be secure.

6. Stored data can be lost.

9/11/2015 5

In untrusted cloud, data can be easily lost and

corrupted due to human error or hardware failure.

It will be very difficult to recover corrupted data.

As there are increasing data storage on cloud

which causes lots of memory consumption. So,

there is need of removal of data duplication.

9/11/2015 6

Some commercial cloud storage services, such as the

simple storage service(S3) on-line data backup services

of Amazon and some practical cloud based software

Google Drive, Dropbox, Mozy, Bitcasa, and Memopal,

have been built for cloud application.

The cloud servers may return an invalid result in some

cases, such as server hardware/software failure, human

maintenance and malicious attack.

9/11/2015 7

Solves the security and efficiency problems of

public data integrity auditing with multi-user

modification.

Some basic tools have been used to construct our

scheme.

We assume that the underlying building blocks are

secure, which include the vector commitment,

group signature, and asymmetric group key

agreement scheme and data recovery.

9/11/2015 8

Our Contributions will be:

We will explore on the secure and efficient shared data integrity auditing for multi-user operation for cipher text database.

We will propose an efficient data auditing scheme while at the same time provide some new features, such as traceability and count ability with data backup and storage.

As there is ever-increasing data storage on cloud, there is need to sort the data in such a way that the data duplication is removed and memory wastage can be avoided. Hence we will be using deduplication algorithm for eliminating this problem.

9/11/2015 9

Data Owner

Third Party Auditor (TPA)

User

Cloud Admin

Data Server

Back Cloud

9/11/2015 10

DATA OWNER In this module an owner has to upload its files in a

cloud server, But he/she should register first. Then only

he/she can be able to do it.

Third Party Auditor (TPA)

Third Party Auditor (TPA) also known as cloud

maintainer. He/she need to register and login first.

After third party auditor gets logged in, He/ She can

see how many data owners have uploaded their files

into the cloud.

9/11/2015 11

USER

In this module if a user wants to access the data which

is stored in a cloud, he/she should register their details

first. These details are maintained in a Database.

If the user is an authorized user, he/she can download

the file by using file id which has been stored by data

owner.

Cloud Admin

In this module, admin will maintain user details and

examine shared files from user. Admin also maintain

details of those files.

9/11/2015 12

Cloud Server

In this module, cloud server is responsible for to

check the backup request which made by user.

Cloud server forward this request to Back Cloud

by using file id.

Back Cloud

In this module, Back cloud verify the backup

request and send data to user.

9/11/2015 13

9/11/2015 14

1. More Security

2. More Efficiency

3. Correctness Of Results.

4. Successful Recovery Of Data

5. No Duplication Of Data

9/11/2015 15

Hardware Requirements:

Processor - Dual Core

Speed - 1.1 GHz

Ram - 256mb (Min)

Hard Disk - 20 Gb

Key Board - Standard Window Keyboard

Mouse - Two or three mouse button

Monitor - SVGA

9/11/2015 16

Software Requirements:

Operating System - Windows XP/7/8 or Linux

Front End - HTML,JAVA,JSP

Scripts - JavaScript

Server Side Script - JAVA Server Pages

Database - MySQL

Database Connectivity - JDBC

IDE - Eclipse / NetBeans

Tools - OpenStack ( For Cloud Creation )

9/11/2015 17

. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-

preserving public auditing for data storage security in cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525– 533.

http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber

=7004787&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F12%2F4358213%2F07004787.pdf%3Farnumber%3D7004787

http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber

=6808577&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6808577

9/11/2015 18