Preserving Integrity through Cloud
Cloud computing is the long dreamed vision of
computing, where users can remotely store their data into
the cloud to enjoy high quality applications.
By data outsourcing, users can be relieved from the burden
of local data storage and maintenance.
Data integrity protection in CC a very challenging
task, especially for users.
To introduce an effective TPA.
by using the technique “bilinear aggregate signature we
can perform Multiple auditing task simultaneously.
Data in a cloud environment can be formidable and
expensive for the cloud users.
It is crucial to realize public audit ability for CSS, so
that data owners may resort to a TPA.
Audit service is significantly important for digital
forensics and credibility in clouds.
To implement Public audit ability, Retrievability and
provable data possession have been proposed by
It is based on Probabilistic proof technique for
Disadvantages: Lack of rigorous performance analysis for
constructed audit system.
It is crucial to develop a more efficient and
secure mechanism for DAS.
Single TPA take more time to auditing the
In this paper, we introduce a Dynamic Audit Service for
integrity verification of untrusted and outsourced
Our audit system, based on novel audit system
architecture, can support dynamic data operations.
Techniques such as fragment structure , random
sampling, index-hash table.
Approach based on probabilistic query & periodic
lower computation cost & shorter extra storage for
Improve performance & reduce extra storage.
Audit activities are efficiently scheduled in an
Each TPA to audit for a batch of files and to
save the times for auditing the files.
Swings , AWT
My Eclipse 8.6
Privacy preserving auditing
Support for batch auditing
Support for data dynamics
Version control system
File is divided into number of blocks.
File is encrypted &Use Key generation. Add file + key
this is in cipher text reach to destination. This is called
pseduo random results.
In this there are 4 steps
Key generation:- Based on file size generate the
Signature:- In this we add the signature that is unique
Generation proof:- after data is transmited,same data is
deliver in destination with same signature.
Verification proof:- If proof is matched then it is
authentication data and integrity satisfis.
Physical layer + MAC layer. Two layers are present so
no possibility of attakers.
Single audit schemes verifed by TPA.
Multiple auditing schemes— so optimal solution.
Privacy preserving auditing:
All number of blocks deliver in destination.
Once again verify those block in destination using
Two cases deliver or not deliver.& encryption and
Support for batch auditing:
concurrent authentication schemes we are perform in
implementation of project after implementation of
authentication schemes distinct files are deliver in
Support for data dynamics:
In less amount of time whatever corrupted files are
removed and update the original in fraction of
seconds by TPA. This support data dynamics.
Version control system:
In cloud server some blocks are modified those
blocks are updated to new version of browser.
Whenever changes the hash function and browser
version it is some what complex for accessing data.
it uses HLA. In Multiple audit tasks one audit task is
fail total information is incorrect.
All audit tasks are correct then only data is security. It
is know as zero round knowledge proof.
Use case diagram
It shows a set of classes ,interfaces and collaborations and
Use case Diagram:
it shows a set of use cases and other Actors and their
It shows a set of objects and the message sent and received
by those objects
It is an interaction diagram that emphasizes the structural
organization of objects that send and receive messages.
It shows asset of special kind of doing that shows the flow
from one activity to other activity within the system
C. Wang, Q. Wang, k. Ren, and W. Lou, “Privacy-
Preserving Public auditing for Storage Security in
CC.” in Proc. Of IEEE INFOCOM’10, March 2010.
Cloud Security Alliance, “Top threats to Cloud
Storage Services in Cloud Computing,” IEEE
Transactions on Service Computing,2011,to