Your SlideShare is downloading. ×
0
Cloud computing has been envisioned as the next-generation architecture of ITenterprise. In contrast to traditional soluti...
What is cloud Computing?• key to the defination of cloud computing is the “cloud” itself.  here cloud is the group of larg...
From the perspective of data security, which has always been an important aspect  of quality of service, Cloud Computing i...
In this paper, we propose an effective and flexible distributed scheme with explicitdynamic data support to ensure the cor...
The hardware used for the development of the project is:     PROCESSOR                  :       PENTIUM V     RAM         ...
TIME LINE CHART
Ensuring d.s
Ensuring d.s
Ensuring d.s
Ensuring d.s
Ensuring d.s
Ensuring d.s
Upcoming SlideShare
Loading in...5
×

Ensuring d.s

372

Published on

Ensuring Data storage in cloud computing

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
372
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Ensuring d.s"

  1. 1. Cloud computing has been envisioned as the next-generation architecture of ITenterprise. In contrast to traditional solutions, where the IT services are under properphysical, logical and personnel controls, cloud computing moves the application softwareand databases to the large data centers, where the management of the data and servicesmay not be fully trustworthy. This unique attribute, however, poses many new securitychallenges which have not been well understood. In this article, we focus on cloud datastorage security, which has always been an important aspect of quality of service. Toensure the correctness of users data in the cloud, we propose an effective and flexibledistributed scheme with two salient features, opposing to its predecessors. By utilizing thehomomorphic token with distributed verification of erasure-coded data, our schemeachieves the integration of storage correctness insurance and data error localization, i.e.,the identification of misbehaving server (s). Unlike most prior works, the new schemefurther supports secure and efficient dynamic operations on data blocks, including: dataupdate, delete and append. Extensive security and performance analysis shows that theproposed scheme is highly efficient and resilient against Byzantine failure, malicious datamodification attack, and even server colluding attacks.
  2. 2. What is cloud Computing?• key to the defination of cloud computing is the “cloud” itself. here cloud is the group of large group of interconnected computers• these computers can be personal or network servers.• the cloud of computers extend beyond a single company or entity. the application and data served by cloud are available to broader group of users, cross enterprise,and cross platform.• access is via internet. any authorized user can access these documents, application from any computer over the internet.
  3. 3. From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.1. Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing.2. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc.
  4. 4. In this paper, we propose an effective and flexible distributed scheme with explicitdynamic data support to ensure the correctness of users’ data in the cloud. We rely onerasure correcting code in the file distribution preparation to provide redundanciesand guarantee the data dependability. This construction drastically reduces thecommunication and storage overhead as compared to the traditional replication-based file distribution techniques.1.Compared to many of its predecessors, which only provide binary results about thestorage state across the distributed servers, the challenge-response protocol in ourwork further provides the localization of data error.2.Unlike most prior works for ensuring remote data integrity, the new scheme supportssecure and efficient dynamic operations on data blocks, including: update, delete andappend.3.Extensive security and performance analysis shows that the proposed scheme ishighly efficient and resilient against Byzantine failure, malicious data modificationattack, and even server colluding attacks.
  5. 5. The hardware used for the development of the project is: PROCESSOR : PENTIUM V RAM : 128 MD SD RAM HARD DISK : 20 GB KEYBOARD : STANDARD 102 KEYSOPERATING SYSTEM :Windows XP ProfessionalENVIRONMENT : Visual Studio .NET 2008/asp .Net.NET FRAMEWORK :Version 3.5LANGUAGE :C#.NETWEB TECHNOLOGY :Active Server Pages.NETWEB SERVER :Internet Information Server 5.0
  6. 6. TIME LINE CHART
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×