SlideShare une entreprise Scribd logo
1  sur  22
Preserving Integrity through Cloud
Computing………….
................
 Cloud computing is the long dreamed vision of






computing, where users can remotely store their data into
the cloud to enjoy high quality applications.
By data outsourcing, users can be relieved from the burden
of local data storage and maintenance.
Data integrity protection in CC a very challenging
task, especially for users.
To introduce an effective TPA.
by using the technique “bilinear aggregate signature we
can perform Multiple auditing task simultaneously.
 Data in a cloud environment can be formidable and






expensive for the cloud users.
It is crucial to realize public audit ability for CSS, so
that data owners may resort to a TPA.
Audit service is significantly important for digital
forensics and credibility in clouds.
To implement Public audit ability, Retrievability and
provable data possession have been proposed by
some researchers.
It is based on Probabilistic proof technique for
Storage.
Disadvantages: Lack of rigorous performance analysis for

constructed audit system.
 It is crucial to develop a more efficient and
secure mechanism for DAS.
 Single TPA take more time to auditing the
files.
 In this paper, we introduce a Dynamic Audit Service for







integrity verification of untrusted and outsourced
storages.
Our audit system, based on novel audit system
architecture, can support dynamic data operations.
Techniques such as fragment structure , random
sampling, index-hash table.
Approach based on probabilistic query & periodic
verification.
lower computation cost & shorter extra storage for
integrity verification.
Advantages:
 Improve performance & reduce extra storage.
 Audit activities are efficiently scheduled in an

audit period.
 Each TPA to audit for a batch of files and to
save the times for auditing the files.
System Requirements:
Hardware Requirements:
Processor
Hard Disk
RAM

:
:
:

Pentium 4.
80 GB.
1 GB

Software Requirements:
Operating System
Coding Language
Front end
, Applets
IDE

:
:
:

windows XP
Java
Swings , AWT

:

My Eclipse 8.6
Modules:
 Key Generation
 Design Framework
 Basic Schemes
 Privacy preserving auditing
 Support for batch auditing
 Support for data dynamics
 Version control system
 Generalization
Key generation:
 File is divided into number of blocks.
 File is encrypted &Use Key generation. Add file + key

this is in cipher text reach to destination. This is called
pseduo random results.

Design Framework:
In this there are 4 steps
 Key generation:- Based on file size generate the
randomized key.
 Signature:- In this we add the signature that is unique
signature.
 Generation proof:- after data is transmited,same data is
deliver in destination with same signature.
 Verification proof:- If proof is matched then it is
authentication data and integrity satisfis.
Basic Schemes:
 Physical layer + MAC layer. Two layers are present so

no possibility of attakers.
 Single audit schemes verifed by TPA.
 Multiple auditing schemes— so optimal solution.

Privacy preserving auditing:
 All number of blocks deliver in destination.
 Once again verify those block in destination using

HLA.
 Two cases deliver or not deliver.& encryption and
decryption.
Support for batch auditing:
 concurrent authentication schemes we are perform in

implementation of project after implementation of
authentication schemes distinct files are deliver in
destination.

Support for data dynamics:
 In less amount of time whatever corrupted files are

removed and update the original in fraction of
seconds by TPA. This support data dynamics.
Version control system:
 In cloud server some blocks are modified those

blocks are updated to new version of browser.
 Whenever changes the hash function and browser
version it is some what complex for accessing data.

Generalization:
 it uses HLA. In Multiple audit tasks one audit task is

fail total information is incorrect.
 All audit tasks are correct then only data is security. It
is know as zero round knowledge proof.
Design:
UML Diagrams:
 Class diagram
 Use case diagram
 Sequence diagram
 Collaboration diagram
 Activity diagram
Class Diagram:
It shows a set of classes ,interfaces and collaborations and
their relationship.
Use case Diagram:
it shows a set of use cases and other Actors and their
relationship.
Sequence Diagram:
It shows a set of objects and the message sent and received
by those objects
Collaboration Diagram:
It is an interaction diagram that emphasizes the structural
organization of objects that send and receive messages.
Activity Diagram:
It shows asset of special kind of doing that shows the flow
from one activity to other activity within the system
DFD Diagram:
References:
 C. Wang, Q. Wang, k. Ren, and W. Lou, “Privacy-

Preserving Public auditing for Storage Security in
CC.” in Proc. Of IEEE INFOCOM’10, March 2010.
 Cloud Security Alliance, “Top threats to Cloud
Computing,” 2010.
 Storage Services in Cloud Computing,” IEEE
Transactions on Service Computing,2011,to
appear.
Thank You

Contenu connexe

Tendances

Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Sathya Moorthy
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
sibidlegend
 

Tendances (20)

Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 

En vedette

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Cloud storage solution technical requirement
Cloud storage solution  technical requirementCloud storage solution  technical requirement
Cloud storage solution technical requirement
taotao1240
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloud
Susheenthiran Sujith
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
kadalisrikanth
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
IAEME Publication
 

En vedette (19)

Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwardingSecure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
 
Cloud storage solution technical requirement
Cloud storage solution  technical requirementCloud storage solution  technical requirement
Cloud storage solution technical requirement
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloud
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applications
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_centerC3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
 
Spatial approximate string search Doc
Spatial approximate string search DocSpatial approximate string search Doc
Spatial approximate string search Doc
 
Real-time data integration to the cloud
Real-time data integration to the cloudReal-time data integration to the cloud
Real-time data integration to the cloud
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
document1-2 FINAL-FINALLL
document1-2 FINAL-FINALLLdocument1-2 FINAL-FINALLL
document1-2 FINAL-FINALLL
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 

Similaire à cloud computing preservity

Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
 
E031102034039
E031102034039E031102034039
E031102034039
theijes
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
MdjunaidAli3
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
Dipak Badhe
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
IJMTST Journal
 

Similaire à cloud computing preservity (20)

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Voldemort & Hadoop @ Linkedin, Hadoop User Group Jan 2010
Voldemort & Hadoop @ Linkedin, Hadoop User Group Jan 2010Voldemort & Hadoop @ Linkedin, Hadoop User Group Jan 2010
Voldemort & Hadoop @ Linkedin, Hadoop User Group Jan 2010
 
Hadoop and Voldemort @ LinkedIn
Hadoop and Voldemort @ LinkedInHadoop and Voldemort @ LinkedIn
Hadoop and Voldemort @ LinkedIn
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

cloud computing preservity

  • 1. Preserving Integrity through Cloud Computing…………. ................
  • 2.  Cloud computing is the long dreamed vision of     computing, where users can remotely store their data into the cloud to enjoy high quality applications. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Data integrity protection in CC a very challenging task, especially for users. To introduce an effective TPA. by using the technique “bilinear aggregate signature we can perform Multiple auditing task simultaneously.
  • 3.
  • 4.  Data in a cloud environment can be formidable and     expensive for the cloud users. It is crucial to realize public audit ability for CSS, so that data owners may resort to a TPA. Audit service is significantly important for digital forensics and credibility in clouds. To implement Public audit ability, Retrievability and provable data possession have been proposed by some researchers. It is based on Probabilistic proof technique for Storage.
  • 5. Disadvantages: Lack of rigorous performance analysis for constructed audit system.  It is crucial to develop a more efficient and secure mechanism for DAS.  Single TPA take more time to auditing the files.
  • 6.  In this paper, we introduce a Dynamic Audit Service for     integrity verification of untrusted and outsourced storages. Our audit system, based on novel audit system architecture, can support dynamic data operations. Techniques such as fragment structure , random sampling, index-hash table. Approach based on probabilistic query & periodic verification. lower computation cost & shorter extra storage for integrity verification.
  • 7. Advantages:  Improve performance & reduce extra storage.  Audit activities are efficiently scheduled in an audit period.  Each TPA to audit for a batch of files and to save the times for auditing the files.
  • 8. System Requirements: Hardware Requirements: Processor Hard Disk RAM : : : Pentium 4. 80 GB. 1 GB Software Requirements: Operating System Coding Language Front end , Applets IDE : : : windows XP Java Swings , AWT : My Eclipse 8.6
  • 9. Modules:  Key Generation  Design Framework  Basic Schemes  Privacy preserving auditing  Support for batch auditing  Support for data dynamics  Version control system  Generalization
  • 10. Key generation:  File is divided into number of blocks.  File is encrypted &Use Key generation. Add file + key this is in cipher text reach to destination. This is called pseduo random results. Design Framework: In this there are 4 steps  Key generation:- Based on file size generate the randomized key.  Signature:- In this we add the signature that is unique signature.  Generation proof:- after data is transmited,same data is deliver in destination with same signature.  Verification proof:- If proof is matched then it is authentication data and integrity satisfis.
  • 11. Basic Schemes:  Physical layer + MAC layer. Two layers are present so no possibility of attakers.  Single audit schemes verifed by TPA.  Multiple auditing schemes— so optimal solution. Privacy preserving auditing:  All number of blocks deliver in destination.  Once again verify those block in destination using HLA.  Two cases deliver or not deliver.& encryption and decryption.
  • 12. Support for batch auditing:  concurrent authentication schemes we are perform in implementation of project after implementation of authentication schemes distinct files are deliver in destination. Support for data dynamics:  In less amount of time whatever corrupted files are removed and update the original in fraction of seconds by TPA. This support data dynamics.
  • 13. Version control system:  In cloud server some blocks are modified those blocks are updated to new version of browser.  Whenever changes the hash function and browser version it is some what complex for accessing data. Generalization:  it uses HLA. In Multiple audit tasks one audit task is fail total information is incorrect.  All audit tasks are correct then only data is security. It is know as zero round knowledge proof.
  • 14. Design: UML Diagrams:  Class diagram  Use case diagram  Sequence diagram  Collaboration diagram  Activity diagram
  • 15. Class Diagram: It shows a set of classes ,interfaces and collaborations and their relationship.
  • 16. Use case Diagram: it shows a set of use cases and other Actors and their relationship.
  • 17. Sequence Diagram: It shows a set of objects and the message sent and received by those objects
  • 18. Collaboration Diagram: It is an interaction diagram that emphasizes the structural organization of objects that send and receive messages.
  • 19. Activity Diagram: It shows asset of special kind of doing that shows the flow from one activity to other activity within the system
  • 21. References:  C. Wang, Q. Wang, k. Ren, and W. Lou, “Privacy- Preserving Public auditing for Storage Security in CC.” in Proc. Of IEEE INFOCOM’10, March 2010.  Cloud Security Alliance, “Top threats to Cloud Computing,” 2010.  Storage Services in Cloud Computing,” IEEE Transactions on Service Computing,2011,to appear.