SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
Provable Multicopy Dynamic Data Possession in Cloud
Computing Systems
ABSTRACT:
Increasingly more and more organizations are opting for outsourcing data to
remote cloud service providers (CSPs). Customers can rent the CSPs storage
infrastructure to store and retrieve almost unlimited amount of data by paying fees
metered in gigabyte/month. For an increased level of scalability, availability, and
durability, some customers may want their data to be replicated on multiple servers
across multiple data centers. The more copies the CSP is asked to store, the more
fees the customers are charged. Therefore, customers need to have a strong
guarantee that the CSP is storing all data copies that are agreed upon in the service
contract, and all these copies are consistent with the most recent modifications
issued by the customers. In this paper, we propose a map-based provable
multicopy dynamic data possession (MB-PMDDP) scheme that has the following
features: 1) it provides an evidence to the customers that the CSP is not cheating by
storing fewer copies; 2) it supports outsourcing of dynamic data, i.e., it supports
block-level operations, such as block modification, insertion, deletion, and append;
and 3) it allows authorized users to seamlessly access the file copies stored by the
CSP. We give a comparative analysis of the proposed MB-PMDDP scheme with a
reference model obtained by extending existing provable possession of dynamic
single-copy schemes. The theoretical analysis is validated through experimental
results on a commercial cloud platform. In addition, we show the security against
colluding servers, and discuss how to identify corrupted copies by slightly
modifying the proposed scheme.
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
EXISTING SYSTEM:
 Once the data has been outsourced to a remote CSP which may not be
trustworthy, the data owners lose the direct control over their sensitive data.
This lack of control raises new formidable and challenging tasks related to
data confidentiality and integrity protection in cloud computing. The
confidentiality issue can be handled by encrypting sensitive data before
outsourcing to remote servers. As such, it is a crucial demand of customers
to have a strong evidence that the cloud servers still possess their data and it
is not being tampered with or partially deleted over time. Consequently,
many researchers have focused on the problem of provable data possession
(PDP) and proposed different schemes to audit the data stored on remote
servers.
 One of the core design principles of outsourcing data is to provide dynamic
behavior of data for various applications. This means that the remotely
stored data can be not only accessed by the authorized users, but also
updated and scaled (through block level operations) by the data owner. PDP
schemes presented focus on only static or warehoused data, where the
outsourced data is kept unchanged over remote servers. Examples of PDP
constructions that deal with dynamic data. The latter are however for a single
copy of the data file.
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
DISADVANTAGES OF EXISTING SYSTEM:
Once the data has been outsourced to a remote CSP which may not be trustworthy,
the data owners lose the direct control over their sensitive data. This lack of control
raises new formidable and challenging tasks related to data confidentiality and
integrity protection in cloud computing.
PROPOSED SYSTEM:
 When verifying multiple data copies, the overall system integrity check fails
if there is one or more corrupted copies. To address this issue and recognize
which copies have been corrupted, we discuss a slight modification to be
applied to the proposed scheme.
 We propose a map-based provable multi-copy dynamic data possession
(MB-PMDDP) scheme. This scheme provides an adequate guarantee that the
CSP stores all copies that are agreed upon in the service contract. Moreover,
the scheme supports outsourcing of dynamic data, i.e., it supports block-
level operations such as block modification, insertion, deletion, and append.
The authorized users, who have the right to access the owner’s file, can
seamlessly access the copies received from the CSP.
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
 We give a thorough comparison of MB-PMDDP with a reference scheme,
which one can obtain by extending existing PDP models for dynamic single-
copy data.
 We show the security of our scheme against colluding servers, and discuss a
slight modification of the proposed scheme to identify corrupted copies.
 In this work, we do not encode the data to be outsourced for the following
reasons. First, we are dealing with dynamic data, and hence if the data file is
encoded before outsourcing, modifying a portion of the file requires re-
encoding the data file which may not be acceptable in practical applications
due to high computation overhead.
 Second, we are considering economically-motivated CSPs that may attempt
to use less storage than required by the service contract through deletion of a
few copies of the file. The CSPs have almost no financial benefit by deleting
only a small portion of a copy of the file.
 Third, and more importantly, unlike erasure codes, duplicating data files
across multiple servers achieves scalability which is a fundamental customer
requirement in CC systems. A file that is duplicated and stored strategically
on multiple servers – located at various geographic locations
ADVANTAGES OF PROPOSED SYSTEM:
 Although PDP schemes have been presented for multiple copies of static
data, to the best of our knowledge, this work is the first PDP scheme directly
dealing with multiple copies of dynamic data.
 The storage model used in this work can be adopted by many practical
applications. For example, e-Health applications can be envisioned by this
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
model where the patients’ database that contains large and sensitive
information can be stored on the cloud servers. In these types of
applications, the e-Health organization can be considered as the data owner,
and the physicians as the authorized users who have the right to access the
patients’ medical history. Many other practical applications like financial,
scientific, and educational applications can be viewed in similar settings.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
Softroniics
Softroniics www.softroniics.com
Calicut||Coimbatore||Palakkad 9037291113,9037061113
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL
REFERENCE:
Ayad F. Barsoum and M. Anwar Hasan, “Provable Multicopy Dynamic Data
Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH
2015.

Contenu connexe

Plus de shanofa sanu

Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...shanofa sanu
 
electronics-embedded-project-topics-list-softroniics
electronics-embedded-project-topics-list-softroniicselectronics-embedded-project-topics-list-softroniics
electronics-embedded-project-topics-list-softroniicsshanofa sanu
 
11.paqcs physical design aware fault-tolerant quantum circuit synthesis
11.paqcs physical design aware fault-tolerant quantum circuit synthesis11.paqcs physical design aware fault-tolerant quantum circuit synthesis
11.paqcs physical design aware fault-tolerant quantum circuit synthesisshanofa sanu
 
11.1 automatic moving object extraction (1)
11.1 automatic moving object extraction  (1)11.1 automatic moving object extraction  (1)
11.1 automatic moving object extraction (1)shanofa sanu
 
272465451 raspberry-pi-based-project-abstracts
272465451 raspberry-pi-based-project-abstracts272465451 raspberry-pi-based-project-abstracts
272465451 raspberry-pi-based-project-abstractsshanofa sanu
 
Discovering latent semantics in web documents
Discovering latent semantics in web documentsDiscovering latent semantics in web documents
Discovering latent semantics in web documentsshanofa sanu
 

Plus de shanofa sanu (7)

Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
electronics-embedded-project-topics-list-softroniics
electronics-embedded-project-topics-list-softroniicselectronics-embedded-project-topics-list-softroniics
electronics-embedded-project-topics-list-softroniics
 
Power decoupling
Power decouplingPower decoupling
Power decoupling
 
11.paqcs physical design aware fault-tolerant quantum circuit synthesis
11.paqcs physical design aware fault-tolerant quantum circuit synthesis11.paqcs physical design aware fault-tolerant quantum circuit synthesis
11.paqcs physical design aware fault-tolerant quantum circuit synthesis
 
11.1 automatic moving object extraction (1)
11.1 automatic moving object extraction  (1)11.1 automatic moving object extraction  (1)
11.1 automatic moving object extraction (1)
 
272465451 raspberry-pi-based-project-abstracts
272465451 raspberry-pi-based-project-abstracts272465451 raspberry-pi-based-project-abstracts
272465451 raspberry-pi-based-project-abstracts
 
Discovering latent semantics in web documents
Discovering latent semantics in web documentsDiscovering latent semantics in web documents
Discovering latent semantics in web documents
 

Dernier

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Dernier (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Provable multicopy-dynamic-data-possession-in-cloud-computing-systems (1)

  • 1. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems ABSTRACT: Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount of data by paying fees metered in gigabyte/month. For an increased level of scalability, availability, and durability, some customers may want their data to be replicated on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more fees the customers are charged. Therefore, customers need to have a strong guarantee that the CSP is storing all data copies that are agreed upon in the service contract, and all these copies are consistent with the most recent modifications issued by the customers. In this paper, we propose a map-based provable multicopy dynamic data possession (MB-PMDDP) scheme that has the following features: 1) it provides an evidence to the customers that the CSP is not cheating by storing fewer copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level operations, such as block modification, insertion, deletion, and append; and 3) it allows authorized users to seamlessly access the file copies stored by the CSP. We give a comparative analysis of the proposed MB-PMDDP scheme with a reference model obtained by extending existing provable possession of dynamic single-copy schemes. The theoretical analysis is validated through experimental results on a commercial cloud platform. In addition, we show the security against colluding servers, and discuss how to identify corrupted copies by slightly modifying the proposed scheme.
  • 2. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113 EXISTING SYSTEM:  Once the data has been outsourced to a remote CSP which may not be trustworthy, the data owners lose the direct control over their sensitive data. This lack of control raises new formidable and challenging tasks related to data confidentiality and integrity protection in cloud computing. The confidentiality issue can be handled by encrypting sensitive data before outsourcing to remote servers. As such, it is a crucial demand of customers to have a strong evidence that the cloud servers still possess their data and it is not being tampered with or partially deleted over time. Consequently, many researchers have focused on the problem of provable data possession (PDP) and proposed different schemes to audit the data stored on remote servers.  One of the core design principles of outsourcing data is to provide dynamic behavior of data for various applications. This means that the remotely stored data can be not only accessed by the authorized users, but also updated and scaled (through block level operations) by the data owner. PDP schemes presented focus on only static or warehoused data, where the outsourced data is kept unchanged over remote servers. Examples of PDP constructions that deal with dynamic data. The latter are however for a single copy of the data file.
  • 3. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113 DISADVANTAGES OF EXISTING SYSTEM: Once the data has been outsourced to a remote CSP which may not be trustworthy, the data owners lose the direct control over their sensitive data. This lack of control raises new formidable and challenging tasks related to data confidentiality and integrity protection in cloud computing. PROPOSED SYSTEM:  When verifying multiple data copies, the overall system integrity check fails if there is one or more corrupted copies. To address this issue and recognize which copies have been corrupted, we discuss a slight modification to be applied to the proposed scheme.  We propose a map-based provable multi-copy dynamic data possession (MB-PMDDP) scheme. This scheme provides an adequate guarantee that the CSP stores all copies that are agreed upon in the service contract. Moreover, the scheme supports outsourcing of dynamic data, i.e., it supports block- level operations such as block modification, insertion, deletion, and append. The authorized users, who have the right to access the owner’s file, can seamlessly access the copies received from the CSP.
  • 4. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113  We give a thorough comparison of MB-PMDDP with a reference scheme, which one can obtain by extending existing PDP models for dynamic single- copy data.  We show the security of our scheme against colluding servers, and discuss a slight modification of the proposed scheme to identify corrupted copies.  In this work, we do not encode the data to be outsourced for the following reasons. First, we are dealing with dynamic data, and hence if the data file is encoded before outsourcing, modifying a portion of the file requires re- encoding the data file which may not be acceptable in practical applications due to high computation overhead.  Second, we are considering economically-motivated CSPs that may attempt to use less storage than required by the service contract through deletion of a few copies of the file. The CSPs have almost no financial benefit by deleting only a small portion of a copy of the file.  Third, and more importantly, unlike erasure codes, duplicating data files across multiple servers achieves scalability which is a fundamental customer requirement in CC systems. A file that is duplicated and stored strategically on multiple servers – located at various geographic locations ADVANTAGES OF PROPOSED SYSTEM:  Although PDP schemes have been presented for multiple copies of static data, to the best of our knowledge, this work is the first PDP scheme directly dealing with multiple copies of dynamic data.  The storage model used in this work can be adopted by many practical applications. For example, e-Health applications can be envisioned by this
  • 5. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113 model where the patients’ database that contains large and sensitive information can be stored on the cloud servers. In these types of applications, the e-Health organization can be considered as the data owner, and the physicians as the authorized users who have the right to access the patients’ medical history. Many other practical applications like financial, scientific, and educational applications can be viewed in similar settings. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.
  • 6. Softroniics Softroniics www.softroniics.com Calicut||Coimbatore||Palakkad 9037291113,9037061113  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Ayad F. Barsoum and M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015.