SlideShare a Scribd company logo
1 of 30
SECURE DATA TRANSMISSION AND
DELETION FROM BLOOM FILTER IN
CLOUD COMPUTING
BY
SANGUSAI KRISHNA-19WJ1A05R3
SAPAVATH PAVAN -19WJ1A05R4
SABAVATHSRIKANTH-20WJ5A0525
INTERNAL GUIDE: DR.S.MADHU
Overview:
■ Introduction
■ Existing System
■ Proposed System
■ Architecture
■ Modules
■ Data Flow Diagrams
■ Conclusion
Introduction:
Cloud computing, an emerging and very promising computing paradigm, connects
large scale distributed storage resources, computing resources and network
bandwidths together.By using these resources, it can provide tenants with plenty of
high-quality cloud services.
Due to the attractive advantages, the services (especially cloud storage service) have
been widely applied, by which the resource-constraint data owners can outsource
their data to the cloud server, which can greatly reduce the data owners’ local
storage overhead.
To enjoy more suitable cloud storage service, the data owners might change the cloud
storage service providers. Hence, they might migrate their out sourced data from one
cloud to another, and then delete the transferred data from the original cloud.
Bloom Filter is a probabilistic data structure used mainly for checking if an element
exists in a set or not. It is known to be space-efficient as it uses only bits for storing
the data.
Also, one of the Bloom Filter’s advantages is time-efficiency because it takes a
constant time complexity to add and look-up an element. Bloom Filters depend on
hashing functions to assign elements into slots..
Existing System:
In Existing approaches to securely migrate the data from one cloud to another and
permanently delete the transferred data from the original cloud becomes a primary
concern of data owners.
In short, the cloud storage service is economically attractive, but it inevitably suffers from
some serious security challenges, specifically for the secure.
These challenges, if not solved suitably, might prevent the public from accepting and
employing cloud storage service.
Disadvantages of Existing System:
■ Does not provide more security
■ Less Efficient and practical.
■ Not maintained public verifiability
Proposed System:
We construct a new counting Bloom filter-based scheme in this paper.
The proposed scheme not only can achieve secure data transfer but also can realize permanent data
deletion.
Additionally, the proposed scheme can satisfy the public verifiability without requiring any trusted third
party.
We aim to achieve verifiable data transfer between two different clouds and reliable data deletion in
cloud storage.
Advantages of the Proposed System:
■ We prove that our new proposal can satisfy the desired design goals through security analysis.
■ Our new proposal is more efficient and practical.
■ We briefly introduce the system framework, security challenges and security goals.
Architecture:
Modules:
– User Interface Design
– Data Owner
– Cloud A
– Cloud B
User Interface Design:
To connect with server user must give their username and password then only they can able
to connect the server. If the user already exits directly can login into the server else user
must register their details such as username, password, Email id, City and Country into the
server. Database will create the account for the entire user to maintain upload and download
rate. Name will be set as user id. Logging in is usually used to enter a specific page. It will
search the query and display the query.
User Login Page
Server
Error Message
User Page
Database
Data Owner:
This is the second module in our project where Data Owner process. Data Owner has to
register and login with valid username and password. After login successful he can do some
operations such as user details. If Data Owner what to Upload Data click on Upload Data and
storage status it shows Memory in cloud A. Data Owner wants to view files in Cloud A click on
view files. Data Owner wants to transfer files/Delete files result click on transfer Result/Delete
result, these files from Cloud B.
Cloud A:
This is the third module in our project where Cloud A plays the main server part of the
project role.
Enter Cloud A name and password then login to the application. First verified in database
then display home page.
When Cloud A click on View Users it shows Registered Data Owners, when Cloud A click on
Accept User Files it shows User files for Accept.
If Cloud A wants to View User files click on View User files, when click on Transfer Request
from DO it shows Transfer Request Files from Data Owner and send to Cloud B for transfer
the File when click on FeedBack it shows feedback Messages from clients.
Cloud B:
This is the fourth module in our project where Cloud B plays the main server part of the
project role.
Enter Cloud B name and password then login to the application. First verified in database
then display home page.
If Cloud B wants to View User Files click on View User Files in Cloud B.
If Cloud B wants to Accept Transfer request, click on Transfer Request from Cloud A and
accept it.
If Cloud B wants to View Delete request, click on Delete Request from Cloud A and accept
it.
GIVEN INPUT EXPECTED OUTPUT:
User Interface Design
Input : Enter Login name and Password (User, Router, CA, Publisher)
Output : If valid user name and password then directly open the home page otherwise show error message and
redirect to the registration page.
 Data Owner
Input : Data Owner Login name and Password
Output: If valid operator name and password then directly open the operator home page otherwise show error message
and if Data Owner what to Upload Data click on Upload Data and storage status it shows Memory in cloud A.
 Cloud A
Input : Enter email and password , verify all details.
Output : Cloud A verify all data owner requests and accept DO data then data send to DO. Admin will verify all data
status and DO feedback also.
Cloud B
Input : Enter the name and password and stored data.
Output: If valid Cloud B name and password then directly open the Cloud B home page. All the resources added by
some options. If Cloud B wants to Accept Transfer request, click on Transfer Request from Cloud A and accept it.
Register
All Data Owners
Transfer Request From DO
Delete Request From DO
Login
Data Owner Request
Accept Data Owner
Data Owner
Database
Cloud A
Cloud B
Transfer Request From Cloud A
Data Flow Diagrams:
Use Case Diagram:
Class Diagram:
Object Diagram:
Cloud A : Cloud A Register : Register
Cloud B : Cloud B
Login : Login DataOwner : DataOwner
Database : Database
State Diagram:
Data Owner Cloud A
Cloud B
Upload Data
View Users View User Files in Cloud B
Storage Status Accept User Files
Transfer Request From Cloud
View Files
View User Files
Delete Request From Cloud
Transfer/Delete Request From DO Result
Database
Register / Login
Transfer Result/Delete
Sequence Diagram:
Data Owner Login Home Files Transfer Logout
1 : login()
2 : verification()
3 : if fail()
4 : if success()
5 : upload file()
6 : success()
7 : file storage()
8 : view files()
9 : Transfer file()
10 : success()
11 : Delete request()
12 : success()
13 : Transfer or delete result()
14 : logout request()
15 : loggedout()
Collaboration Diagram:
Data Owner
Login
Home
Files
Transfer
Logout
1 : login()
2 : verification()
3 : if fail()
4 : if success()
5 : upload file()
6 : file storage()
7 : view files()
8 : Transfer file()
9 : Delete request()
10 : Transfer or delete result()
11 : logout request()
12 : loggedout()
Activity Diagram:
Data Owner
Login
Home
Data Storage
Upload Data View Data Transfer Data Delete Data
yes
No
Logout
Component Diagram:
Secure Data Transfer and Deletion fromCounting BloomFilter in Cloud Computing
Cloud A Cloud B
Data Owner
Files
Trasnsfer
Delete
E-R Diagram:
Data Flow Diagram:
LEVEL 0:
LEVEL 1:
Deployment Diagram:
Cloud A Login Register
Database
Data
Owner
Cloud B
Conclusion:
In cloud storage, the data owner does not believe that the cloud server might
execute the data transfer and deletion operations honestly.
To solve this problem, we propose a CBF-based secure data transfer scheme,
which can also realize verifiable data deletion.
In our scheme, the cloud B can check the transferred data integrity, which can
guarantee the data is entirely migrated.
Moreover, the cloud A should adopt CBF to generate a deletion evidence after
deletion, which will be used to verify the deletion result by the data owner.
Hence, the cloud A cannot behave maliciously and cheat the data owner
successfully.
Finally, the security analysis and simulation results validate the security and
practicability of our proposal, respectively.
THANK YOU

More Related Content

Similar to SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx

Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture
Rajesh Kumar
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
 

Similar to SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx (20)

Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Why NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB AtlasWhy NBC Universal Migrated to MongoDB Atlas
Why NBC Universal Migrated to MongoDB Atlas
 
ME_Snowflake_Introduction_for new students.pptx
ME_Snowflake_Introduction_for new students.pptxME_Snowflake_Introduction_for new students.pptx
ME_Snowflake_Introduction_for new students.pptx
 
Tableau powerpoint
Tableau powerpointTableau powerpoint
Tableau powerpoint
 
Dropbox to Sharepoint
Dropbox to SharepointDropbox to Sharepoint
Dropbox to Sharepoint
 
Dropbox to SharePoint Migration Guide for IT Admins
Dropbox to SharePoint Migration Guide for IT AdminsDropbox to SharePoint Migration Guide for IT Admins
Dropbox to SharePoint Migration Guide for IT Admins
 
Dropbox to Sharepoint
Dropbox to SharepointDropbox to Sharepoint
Dropbox to Sharepoint
 
Migration to Cloud - How difficult is it ? A sample migration scenario
Migration to Cloud - How difficult is it ? A sample migration scenarioMigration to Cloud - How difficult is it ? A sample migration scenario
Migration to Cloud - How difficult is it ? A sample migration scenario
 
Oracle Autonomous Data Warehouse Cloud and Data Visualization
Oracle Autonomous Data Warehouse Cloud and Data VisualizationOracle Autonomous Data Warehouse Cloud and Data Visualization
Oracle Autonomous Data Warehouse Cloud and Data Visualization
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Tableau Server Basics
Tableau Server BasicsTableau Server Basics
Tableau Server Basics
 
O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...O po r enabling proof of retrievability in cloud computing with resource cons...
O po r enabling proof of retrievability in cloud computing with resource cons...
 
Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture
 
CloudStack Metering – Working with the Usage Data
CloudStack Metering – Working with the Usage DataCloudStack Metering – Working with the Usage Data
CloudStack Metering – Working with the Usage Data
 
CloudStack Metering – Working with the Usage Data
CloudStack Metering – Working with the Usage DataCloudStack Metering – Working with the Usage Data
CloudStack Metering – Working with the Usage Data
 
PartnerSkillUp_Enable a Streaming CDC Solution
PartnerSkillUp_Enable a Streaming CDC SolutionPartnerSkillUp_Enable a Streaming CDC Solution
PartnerSkillUp_Enable a Streaming CDC Solution
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Work with data in ASP.NET
Work with data in ASP.NETWork with data in ASP.NET
Work with data in ASP.NET
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 

Recently uploaded

DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DrGurudutt
 

Recently uploaded (20)

ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptxROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdf
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 
ANSI(ST)-III_Manufacturing-I_05052020.pdf
ANSI(ST)-III_Manufacturing-I_05052020.pdfANSI(ST)-III_Manufacturing-I_05052020.pdf
ANSI(ST)-III_Manufacturing-I_05052020.pdf
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 

SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx

  • 1. SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER IN CLOUD COMPUTING BY SANGUSAI KRISHNA-19WJ1A05R3 SAPAVATH PAVAN -19WJ1A05R4 SABAVATHSRIKANTH-20WJ5A0525 INTERNAL GUIDE: DR.S.MADHU
  • 2. Overview: ■ Introduction ■ Existing System ■ Proposed System ■ Architecture ■ Modules ■ Data Flow Diagrams ■ Conclusion
  • 3. Introduction: Cloud computing, an emerging and very promising computing paradigm, connects large scale distributed storage resources, computing resources and network bandwidths together.By using these resources, it can provide tenants with plenty of high-quality cloud services. Due to the attractive advantages, the services (especially cloud storage service) have been widely applied, by which the resource-constraint data owners can outsource their data to the cloud server, which can greatly reduce the data owners’ local storage overhead. To enjoy more suitable cloud storage service, the data owners might change the cloud storage service providers. Hence, they might migrate their out sourced data from one cloud to another, and then delete the transferred data from the original cloud. Bloom Filter is a probabilistic data structure used mainly for checking if an element exists in a set or not. It is known to be space-efficient as it uses only bits for storing the data. Also, one of the Bloom Filter’s advantages is time-efficiency because it takes a constant time complexity to add and look-up an element. Bloom Filters depend on hashing functions to assign elements into slots..
  • 4. Existing System: In Existing approaches to securely migrate the data from one cloud to another and permanently delete the transferred data from the original cloud becomes a primary concern of data owners. In short, the cloud storage service is economically attractive, but it inevitably suffers from some serious security challenges, specifically for the secure. These challenges, if not solved suitably, might prevent the public from accepting and employing cloud storage service. Disadvantages of Existing System: ■ Does not provide more security ■ Less Efficient and practical. ■ Not maintained public verifiability
  • 5. Proposed System: We construct a new counting Bloom filter-based scheme in this paper. The proposed scheme not only can achieve secure data transfer but also can realize permanent data deletion. Additionally, the proposed scheme can satisfy the public verifiability without requiring any trusted third party. We aim to achieve verifiable data transfer between two different clouds and reliable data deletion in cloud storage. Advantages of the Proposed System: ■ We prove that our new proposal can satisfy the desired design goals through security analysis. ■ Our new proposal is more efficient and practical. ■ We briefly introduce the system framework, security challenges and security goals.
  • 7. Modules: – User Interface Design – Data Owner – Cloud A – Cloud B
  • 8. User Interface Design: To connect with server user must give their username and password then only they can able to connect the server. If the user already exits directly can login into the server else user must register their details such as username, password, Email id, City and Country into the server. Database will create the account for the entire user to maintain upload and download rate. Name will be set as user id. Logging in is usually used to enter a specific page. It will search the query and display the query.
  • 9. User Login Page Server Error Message User Page Database
  • 10. Data Owner: This is the second module in our project where Data Owner process. Data Owner has to register and login with valid username and password. After login successful he can do some operations such as user details. If Data Owner what to Upload Data click on Upload Data and storage status it shows Memory in cloud A. Data Owner wants to view files in Cloud A click on view files. Data Owner wants to transfer files/Delete files result click on transfer Result/Delete result, these files from Cloud B.
  • 11.
  • 12. Cloud A: This is the third module in our project where Cloud A plays the main server part of the project role. Enter Cloud A name and password then login to the application. First verified in database then display home page. When Cloud A click on View Users it shows Registered Data Owners, when Cloud A click on Accept User Files it shows User files for Accept. If Cloud A wants to View User files click on View User files, when click on Transfer Request from DO it shows Transfer Request Files from Data Owner and send to Cloud B for transfer the File when click on FeedBack it shows feedback Messages from clients.
  • 13.
  • 14. Cloud B: This is the fourth module in our project where Cloud B plays the main server part of the project role. Enter Cloud B name and password then login to the application. First verified in database then display home page. If Cloud B wants to View User Files click on View User Files in Cloud B. If Cloud B wants to Accept Transfer request, click on Transfer Request from Cloud A and accept it. If Cloud B wants to View Delete request, click on Delete Request from Cloud A and accept it.
  • 15.
  • 16. GIVEN INPUT EXPECTED OUTPUT: User Interface Design Input : Enter Login name and Password (User, Router, CA, Publisher) Output : If valid user name and password then directly open the home page otherwise show error message and redirect to the registration page.  Data Owner Input : Data Owner Login name and Password Output: If valid operator name and password then directly open the operator home page otherwise show error message and if Data Owner what to Upload Data click on Upload Data and storage status it shows Memory in cloud A.  Cloud A Input : Enter email and password , verify all details. Output : Cloud A verify all data owner requests and accept DO data then data send to DO. Admin will verify all data status and DO feedback also. Cloud B Input : Enter the name and password and stored data. Output: If valid Cloud B name and password then directly open the Cloud B home page. All the resources added by some options. If Cloud B wants to Accept Transfer request, click on Transfer Request from Cloud A and accept it.
  • 17. Register All Data Owners Transfer Request From DO Delete Request From DO Login Data Owner Request Accept Data Owner Data Owner Database Cloud A Cloud B Transfer Request From Cloud A Data Flow Diagrams: Use Case Diagram:
  • 19. Object Diagram: Cloud A : Cloud A Register : Register Cloud B : Cloud B Login : Login DataOwner : DataOwner Database : Database
  • 20. State Diagram: Data Owner Cloud A Cloud B Upload Data View Users View User Files in Cloud B Storage Status Accept User Files Transfer Request From Cloud View Files View User Files Delete Request From Cloud Transfer/Delete Request From DO Result Database Register / Login Transfer Result/Delete
  • 21. Sequence Diagram: Data Owner Login Home Files Transfer Logout 1 : login() 2 : verification() 3 : if fail() 4 : if success() 5 : upload file() 6 : success() 7 : file storage() 8 : view files() 9 : Transfer file() 10 : success() 11 : Delete request() 12 : success() 13 : Transfer or delete result() 14 : logout request() 15 : loggedout()
  • 22. Collaboration Diagram: Data Owner Login Home Files Transfer Logout 1 : login() 2 : verification() 3 : if fail() 4 : if success() 5 : upload file() 6 : file storage() 7 : view files() 8 : Transfer file() 9 : Delete request() 10 : Transfer or delete result() 11 : logout request() 12 : loggedout()
  • 23. Activity Diagram: Data Owner Login Home Data Storage Upload Data View Data Transfer Data Delete Data yes No Logout
  • 24. Component Diagram: Secure Data Transfer and Deletion fromCounting BloomFilter in Cloud Computing Cloud A Cloud B Data Owner Files Trasnsfer Delete
  • 28. Deployment Diagram: Cloud A Login Register Database Data Owner Cloud B
  • 29. Conclusion: In cloud storage, the data owner does not believe that the cloud server might execute the data transfer and deletion operations honestly. To solve this problem, we propose a CBF-based secure data transfer scheme, which can also realize verifiable data deletion. In our scheme, the cloud B can check the transferred data integrity, which can guarantee the data is entirely migrated. Moreover, the cloud A should adopt CBF to generate a deletion evidence after deletion, which will be used to verify the deletion result by the data owner. Hence, the cloud A cannot behave maliciously and cheat the data owner successfully. Finally, the security analysis and simulation results validate the security and practicability of our proposal, respectively.