Towards secure & dependable storage services in cloud computing

9,725 views

Published on

Published in: Technology, Business
9 Comments
1 Like
Statistics
Notes
  • please send me whole documentation
    coolynshinde@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • i too need the whole documentation help me
    plz
    appari.shiva@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • i need full documentation and coding
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • i need documentation
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • nice
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
9,725
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
433
Comments
9
Likes
1
Embeds 0
No embeds

No notes for slide

Towards secure & dependable storage services in cloud computing

  1. 1. PLATFORM : JAVA DOMAIN : CLOUD COMPUTING Guided By : Mr.P.N.Renjith TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTINGPRESENTED BYRahid.A.K Naabih.C.S Manoj.K.S
  2. 2. Zeroth Review Details Algorithm used :  Byzantine Fault Tolerance Algorithm  Token Pre-computation  Correctness Verification and Error Localization  Error recovery  Reed –Solomon Algorithm  Homomorphic Linear Algorithm
  3. 3. Existing System and Limitations  Byzantine Error Occurrence.  Physical possession of outsourced data.  Pre-Requisition for Client manipulation.
  4. 4. Design Module Description 1.Login 2.New User 3.Client Manipulation 4.Administrator Login 5.Admin Manipulation
  5. 5. Operational Module Description • Adversary Module • Cloud Data Storage Module • Third Party auditing Module • Dynamic Data operation Module
  6. 6. Login Module• Client Login  Provided a user name and password  correctness checked by Correctness Verification and Error Localization• New User Login  Registration form for each user  Validation done by providing Captcha and verifying email Id and Telephone number.
  7. 7. Client Manipulation Module• Provided with operations such as Download Upload View Delete
  8. 8. Use-case diagram for user login: LOGIN VALIDATION REQUEST Server Client RESPONSE
  9. 9. Use-case diagram for client manipulation : UPLOAD DOWNLOAD VIEW DATABASE CLIENT DELETE
  10. 10. Class diagram:
  11. 11. Flowchart : Start Home Yes Yes Server login Client login Server page Client page Cloud System End
  12. 12. Dataflow Diagram : Client Home Request to CSP Validate User Deny Access Manipulation Client Acknowledgement Database Monitoring
  13. 13. Applications :
  14. 14. Project Status : 25%

×