SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 957
ONLINE BACKUP AND RECOVERY USING AMAZON S3
Ameya Kanitkar1
, Shreyas Joshi2
, Sumit Chitnis3
, Mayur Gite4
1
Student, Information Technology Department, MMCOE, Maharashtra, India
2
Student, Information Technology Department, MMCOE, Maharashtra, India
3
Student, Information Technology Department, MMCOE, Maharashtra, India
4
Student, Information Technology Department, MMCOE, Maharashtra, India
Abstract
The project on File recovery and backup involves using of the emerging cloud based technology Amazon Simple Storage Service
(S3).This project caters the purpose of safe and secure storage of the data as well as backup of that data for an Educational Institute
such as a school or a college. The process in this project involves registering the client using Facebook or Google Accounts or simple
sign up form. Then client gets his own manageable storage space for storing the data on the Amazon servers. The project involves
creating server side webpage which eases the Signup process. For Backup and recovery of the customer data, project uses the java
platform to create client side software. The software involves the simple UI for uploading the data onto the Amazon servers. A person
can share the particular data by making that data public, data is stored safely on the cloud as they use different encryption methods.
And it involves a feature known as time URL which makes selected data on the cloud available to person or group of persons for a
specified interval of the time. The project uses Amazon S3 Technology because Amazon servers provide Easy robust and durable
storage of the data and they provide complete (99.9999 percent) availability. And also they are inexpensive and reliable than the
physical storage options.
Keywords: Amazon S3, Cloud Computing, Backup, etc
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
The storage and security of the data is one of the most
important aspects of the modern day computing. Keeping the
data safe and secure is one of the top most priorities for most
of the important aspects as data should be readily available
every time the user needs it.
Traditionally storage of the data was limited to the hardware
components like floppies, CD, DVDs, flash drives etc.
Although all those hardware storage media shared problems
and they were prone to the hardware failure. Cloud computing
based recovery and backup systems provide the memory space
for the storage of the user‟s content on the servers of the
Cloud service provider. Each user is assigned an account, it
grants access and authorization for the user to use the data.
Cloud computing is emerging as a trending technology in the
technological world, as it provides high durability and
reliability of the data. It also provides several innovative
features such as direct server streaming media, timed URL,
sharing of the data within the clouds etc.
1.1 Aim and Features
Purpose of this project is to provide an „easy to use‟ client side
application for managing users files, while ensuring user
safety and security of the data.
1.1.1 One Account Multiple Users
This software is made for Educational Institute wherein one
Administrator (For eg: Head of Department) owns the account
and his/her staff and students use it for uploading ,
downloading and sharing files.
The users must register once using the Easy Login Mechanism
provided by the software.
1.1.2 Easy Login Mechanism
The users can either register by filling a simple form on the
webpage hosted by the institute‟s server or even register using
their current Gmail account. For Gmail Account registration
method, we have implemented the OAuth 2.0 protocol.
1.1.3 Groups
Administrator can easily create, edit and delete groups of users
from his/her institute with a single click.
Also adding and deleting members in a group has been made
fairly easy.
1.1.4 Sharing
Users can share files with a single user or with a whole group
with a single click.
For example: A teacher can share a presentation file with the
whole class which can be included in a single group.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 958
1.1.5 Timed URLS
Users can share a file for a specified time or permanently
according to the need.
For example: If a user shares a file for 3 hours, after 3 hours,
the URL for that file will not yield the file, the URL will
expire and Amazon Server will reject the request.
1.1.6 Portability
User can easily install the software (basically Java Swing
Client side software) and access the account files.
1.1.7 Centralized Control
Administrator has full control over a user‟s account. He may
remove the user and define access permissions for users using
the Amazon S3 bucket access policies. He may also assign
storage spaces for particular class of users. For example:
Teachers get 500MB Storage while Students get 100MB
Storage space.
1.1.8 Extra utilities
 Chat
Users can use the live chat feature to chat with other group
members in real time. Also group chat feature is up and
running.
This not only limits this software to handle files but enables
users to communicate important messages.
 Reminder
Students can set a reminder for submission of an assignment
or planning when to retrieve or upload files for future use. The
reminder feature notifies the user at appropriate time to
perform certain tasks.
2. THE AMAZON CLOUD
The core concepts of Amazon cloud include objects and
buckets.
 Object: An object is a file uploaded on the Amazon
cloud. It has several properties like name, size, date
modified etc. also called its metadata .Metadata is
created automatically by the cloud service when a user
creates a file. Each object can be retrieved even by a
URL with the condition being that it should be signed
with account owner‟s keys and a signing method used
by Amazon.
 Buckets: A bucket acts as a container for holding
objects. There is a limit on number of buckets a user
can create. Also, bucket names are unique so as to
avoid naming clashes. This is because the buckets are
backed up in different regions to provide a great deal of
availability.
2.1 Why Amazon S3
2.1.1 Pricing
Amazon AWS has introduced a new free usage tier which
provides cheapest services among the other cloud systems.
2.1.2 Mechanisms
Amazon S3 provides mechanisms to control the access of your
account. Following mechanisms are provided:
2.1.2.1 Identity and Access Management (IAM
USERS)
AWS IAM allows the account owner to create multiple users
and manage their permissions.
2.1.2.2 Access Control Lists (ACL)
Amazon ACL is applicable to every object (an object is a
file on cloud) and bucket (a bucket is a container or folder for
files). It determines which groups or users can access certain
objects and buckets.
2.1.2.3 Bucket Policies
Bucket Policies are used to choose which permissions to allow
and which permissions to deny. Only a bucket owner has the
authority to write bucket policies.
2.1.2.4 Query String Authentication
Query String authentication is used to authenticate browsers or
HTTP requests.
These are authenticated by signing the URL with Owner‟s
Credentials, appending a signature to the URL which should
match with the signature computed by Amazon S3.
2.1.3 Storage Types
Amazon S3 offers several storage types which are different in
terms of availability, reliability, storage regions etc.
The types include Standard Storage, Reduced Redundancy and
Glacier Storage.
3. SYSTEM DESIGN
3.1 Users
Users can use their storage areas from the client machines
using this Software. This same software provides Login
Mechanism for user by communicating with the institute‟s
server.
The software for use is hosted by the Institute Server for free
downloading. The software includes User Interface for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 959
Sharing Files, both with groups or single users, and for
uploading or downloading files with a single click of a button!
3.2 Institute Server
The server is essential for authenticating users, managing
users. Server also does the job of routing requests from users.
Each request always goes to the server, gets authenticated by
the use of signature generated from administrator keys and is
sent to Amazon Cloud for validation and a reply.
The Server is totally controlled by the Administrator who can
assign Storage limits to users. The Server runs PHP code
which uses the Amazon S3 API for PHP for creation of
Command objects.
Fig -1: System Design
3.3 Amazon Cloud
The Amazon Cloud provides request servicing, request
authentication, executing backup operations, object and bucket
management, applying appropriate policies etc.
The Amazon Cloud also provides options to select a region to
store your files which is geographically near to your location.
4. IMPLEMENTATION
The implementation of the system is described in this section
in complete detail:
4.1 Login
User Logs in using username and password created during
registration.
4.2 Send Request to Institute Server
User sends appropriate request like uploading, downloading,
deleting, viewing or sharing the files, which is received by the
institute‟s server.
4.3 Create Command Object
Institute Server creates a command object using PHP API for
Amazon S3.
4.4 Send Request to Cloud
Institute Server forwards the complete request to Amazon
Cloud.
4.5 Validate Request
Amazon receives and interprets the request. It stores the
signature provided with the request and computes request
signature by the same method as that of the Institute Server
with administrator‟s keys. This signature is then matched with
received signature. If signatures match, it means the requester
also has necessary keys and has the authorization to access a
certain resource. While uploading files, MD5 hash code of the
file is sent to Amazon for verification of data integrity. It
ensures that the file attempting to be uploaded is not a victim
of attacks like “Man in the middle”. If signature does not
match, Amazon Server sends a 403 response code: Forbidden
Request.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 960
Fig -2: Request work flow
4.6 Response from Cloud
The reply is then sent back to institute server. It contains either
requested data or an error code
4.7 Reply from Institute Server
The institute server returns it back to the client who made the
request. Efficient communication mechanism (JSON/XML) is
used for communicating data between client and the Institute
Server.
4.8 User Execute the URL
The user executes the received URL which completes the task
required by the user. So user gets his work executed.
5. CONCLUSIONS
Amazon cloud server‟s high Reliability and Availability can
be harnessed for building better performing , secure and easy
to use applications in daily life. Our work can be applied in
different other domains as well. This paper demonstrates the
use of client side applications for increased user friendliness
which previously was not offered by the Old -school browser
based applications.
ACKNOWLEDGEMENTS
We take this opportunity to thank our project guide Mrs. Preeti
Joshi and Head of the Department Rupali Chopde for their
valuable guidance and for providing all the necessary
facilities, which were indispensable in the completion of this
project report. We are also thankful to all the staff members of
the Department of Information technology of MMCOE,
PUNE for their valuable time, support, comments, suggestions
and persuasion. We would also like to thank the institute for
providing the required facilities, Internet access and important
books.
REFERENCES
[1]. Amazon S3. http://aws.amazon.com/s3/.
[2]. Arthur Rahumed, Henry C.H. Chen, Yang Tang, Patrick
P. C. Lee, and John C. S. Lui: A Secure Cloud Backup System
with Assured Deletion and Version Control.
[3]. Hobin Yoon, Ada Gavrilovska, Karsten Schwan, Jim
Donahue: Interactive Use of Cloud Services: Amazon SQS
and S3.
[4]. Jing Nie: Design the Desktop Backup System Based on
Cloud Computing.
[5]. M. Noureddine, R. Bashroush: A Provisioning Model
towards OAuth 2.0 Performance Optimization.
[6]. SNIA. Cloud Data Management Interface(CDMI).
http://cdmi.sniacloud.com.131-133. (references)
[7]. Ghemawat,S.,Gobioff,H.,AND Lueng,S.-T. Google File
System. In 19th ACM Symposium on Operating Systems
Principles.518-519.
[8]. ZuquanTang,MinshenQu,ZhijingXu. Design the File
Backup System Based on FileSystem Watcher. Electronic
design project. Volume 18 phase 3: page 12.
[9]. Wuhan Zhao, Xiaoqin Hu, HongminDeng, Xiaoxu Ma.
The Efficient file backup methods Based on Internet .
Electronic design project.Volume 36 phase 2: page 247.
[10]. “AWS Forum.” Available:
https://forums.aws.amazon.com/forum.jspa?forumID = 12 &
start=0
[11]. Bitcurrent, “Cloud performance from the end user
perspective,” 2011. Available: http://www.bitcurrent.com/
download/cloud-performance-from-the-end-user-perspective
[12]. M. Kagan, “Global cloud performance data,” 2011.
[Online]. Available: http://www.cloudconnectevent.com/
2011/presentations/free/76-marty-kagan.pdf
[13]. “AWS Import/Export.” [Online]. Available: http://aws.
amazon.com/importexport
[14]. “AWS Direct Connect,” 2011. [Online]. Available:
http://aws.amazon.com/directconnect
[15]. A. Gavrilovska, “High Performance IP-Based
Transports,”September 2009.
[16] S. L. Garfinkel, “An Evaluation of Amazons Grid
Computing Services: EC2, S3, and SQS,” Center for, Tech.
Rep., 2007.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 961
BIOGRAPHIES
Ameya Vidyadhar Kanitkar, Student,
Department of IT MMCOE, Pune
Shreyas Ramesh Joshi, Student, Department of
IT, MMCOE, Pune
Sumit Suhas Chitnis, Student, Department of
IT, MMCOE, Pune
Mayur Bhagwat Gite, Student, Department of
IT, MMCOE, Pune

More Related Content

Viewers also liked

Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acideSAT Publishing House
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receivereSAT Publishing House
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridseSAT Publishing House
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyeSAT Publishing House
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingeSAT Publishing House
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudseSAT Publishing House
 
Elevating forensic investigation system for file clustering
Elevating forensic investigation system for file clusteringElevating forensic investigation system for file clustering
Elevating forensic investigation system for file clusteringeSAT Publishing House
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandeSAT Publishing House
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractioneSAT Publishing House
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss surveyeSAT Publishing House
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack oneSAT Publishing House
 
Searching and tracking of neighboring base stations
Searching and tracking of neighboring base stationsSearching and tracking of neighboring base stations
Searching and tracking of neighboring base stationseSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perceptioneSAT Publishing House
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...eSAT Publishing House
 
Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...eSAT Publishing House
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumeSAT Publishing House
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingeSAT Publishing House
 
Study on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficStudy on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficeSAT Publishing House
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaeSAT Publishing House
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangulareSAT Publishing House
 

Viewers also liked (20)

Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiver
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power grids
 
Heat transfer through journal bearing a case study
Heat transfer through journal bearing a case studyHeat transfer through journal bearing a case study
Heat transfer through journal bearing a case study
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
 
Elevating forensic investigation system for file clustering
Elevating forensic investigation system for file clusteringElevating forensic investigation system for file clustering
Elevating forensic investigation system for file clustering
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sand
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extraction
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss survey
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
 
Searching and tracking of neighboring base stations
Searching and tracking of neighboring base stationsSearching and tracking of neighboring base stations
Searching and tracking of neighboring base stations
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...
 
Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminum
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
 
Study on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficStudy on pedestrian and slow moving traffic
Study on pedestrian and slow moving traffic
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal area
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangular
 

Similar to Online backup and recovery using amazon s3

Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudeSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Migration of application schema to windows azure
Migration of application schema to windows azureMigration of application schema to windows azure
Migration of application schema to windows azureeSAT Publishing House
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
Getting started with oracle eprcs
Getting started with oracle eprcsGetting started with oracle eprcs
Getting started with oracle eprcsRati Sharma
 

Similar to Online backup and recovery using amazon s3 (20)

Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Migration of application schema to windows azure
Migration of application schema to windows azureMigration of application schema to windows azure
Migration of application schema to windows azure
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
Getting started with oracle eprcs
Getting started with oracle eprcsGetting started with oracle eprcs
Getting started with oracle eprcs
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Online backup and recovery using amazon s3

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 957 ONLINE BACKUP AND RECOVERY USING AMAZON S3 Ameya Kanitkar1 , Shreyas Joshi2 , Sumit Chitnis3 , Mayur Gite4 1 Student, Information Technology Department, MMCOE, Maharashtra, India 2 Student, Information Technology Department, MMCOE, Maharashtra, India 3 Student, Information Technology Department, MMCOE, Maharashtra, India 4 Student, Information Technology Department, MMCOE, Maharashtra, India Abstract The project on File recovery and backup involves using of the emerging cloud based technology Amazon Simple Storage Service (S3).This project caters the purpose of safe and secure storage of the data as well as backup of that data for an Educational Institute such as a school or a college. The process in this project involves registering the client using Facebook or Google Accounts or simple sign up form. Then client gets his own manageable storage space for storing the data on the Amazon servers. The project involves creating server side webpage which eases the Signup process. For Backup and recovery of the customer data, project uses the java platform to create client side software. The software involves the simple UI for uploading the data onto the Amazon servers. A person can share the particular data by making that data public, data is stored safely on the cloud as they use different encryption methods. And it involves a feature known as time URL which makes selected data on the cloud available to person or group of persons for a specified interval of the time. The project uses Amazon S3 Technology because Amazon servers provide Easy robust and durable storage of the data and they provide complete (99.9999 percent) availability. And also they are inexpensive and reliable than the physical storage options. Keywords: Amazon S3, Cloud Computing, Backup, etc ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The storage and security of the data is one of the most important aspects of the modern day computing. Keeping the data safe and secure is one of the top most priorities for most of the important aspects as data should be readily available every time the user needs it. Traditionally storage of the data was limited to the hardware components like floppies, CD, DVDs, flash drives etc. Although all those hardware storage media shared problems and they were prone to the hardware failure. Cloud computing based recovery and backup systems provide the memory space for the storage of the user‟s content on the servers of the Cloud service provider. Each user is assigned an account, it grants access and authorization for the user to use the data. Cloud computing is emerging as a trending technology in the technological world, as it provides high durability and reliability of the data. It also provides several innovative features such as direct server streaming media, timed URL, sharing of the data within the clouds etc. 1.1 Aim and Features Purpose of this project is to provide an „easy to use‟ client side application for managing users files, while ensuring user safety and security of the data. 1.1.1 One Account Multiple Users This software is made for Educational Institute wherein one Administrator (For eg: Head of Department) owns the account and his/her staff and students use it for uploading , downloading and sharing files. The users must register once using the Easy Login Mechanism provided by the software. 1.1.2 Easy Login Mechanism The users can either register by filling a simple form on the webpage hosted by the institute‟s server or even register using their current Gmail account. For Gmail Account registration method, we have implemented the OAuth 2.0 protocol. 1.1.3 Groups Administrator can easily create, edit and delete groups of users from his/her institute with a single click. Also adding and deleting members in a group has been made fairly easy. 1.1.4 Sharing Users can share files with a single user or with a whole group with a single click. For example: A teacher can share a presentation file with the whole class which can be included in a single group.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 958 1.1.5 Timed URLS Users can share a file for a specified time or permanently according to the need. For example: If a user shares a file for 3 hours, after 3 hours, the URL for that file will not yield the file, the URL will expire and Amazon Server will reject the request. 1.1.6 Portability User can easily install the software (basically Java Swing Client side software) and access the account files. 1.1.7 Centralized Control Administrator has full control over a user‟s account. He may remove the user and define access permissions for users using the Amazon S3 bucket access policies. He may also assign storage spaces for particular class of users. For example: Teachers get 500MB Storage while Students get 100MB Storage space. 1.1.8 Extra utilities  Chat Users can use the live chat feature to chat with other group members in real time. Also group chat feature is up and running. This not only limits this software to handle files but enables users to communicate important messages.  Reminder Students can set a reminder for submission of an assignment or planning when to retrieve or upload files for future use. The reminder feature notifies the user at appropriate time to perform certain tasks. 2. THE AMAZON CLOUD The core concepts of Amazon cloud include objects and buckets.  Object: An object is a file uploaded on the Amazon cloud. It has several properties like name, size, date modified etc. also called its metadata .Metadata is created automatically by the cloud service when a user creates a file. Each object can be retrieved even by a URL with the condition being that it should be signed with account owner‟s keys and a signing method used by Amazon.  Buckets: A bucket acts as a container for holding objects. There is a limit on number of buckets a user can create. Also, bucket names are unique so as to avoid naming clashes. This is because the buckets are backed up in different regions to provide a great deal of availability. 2.1 Why Amazon S3 2.1.1 Pricing Amazon AWS has introduced a new free usage tier which provides cheapest services among the other cloud systems. 2.1.2 Mechanisms Amazon S3 provides mechanisms to control the access of your account. Following mechanisms are provided: 2.1.2.1 Identity and Access Management (IAM USERS) AWS IAM allows the account owner to create multiple users and manage their permissions. 2.1.2.2 Access Control Lists (ACL) Amazon ACL is applicable to every object (an object is a file on cloud) and bucket (a bucket is a container or folder for files). It determines which groups or users can access certain objects and buckets. 2.1.2.3 Bucket Policies Bucket Policies are used to choose which permissions to allow and which permissions to deny. Only a bucket owner has the authority to write bucket policies. 2.1.2.4 Query String Authentication Query String authentication is used to authenticate browsers or HTTP requests. These are authenticated by signing the URL with Owner‟s Credentials, appending a signature to the URL which should match with the signature computed by Amazon S3. 2.1.3 Storage Types Amazon S3 offers several storage types which are different in terms of availability, reliability, storage regions etc. The types include Standard Storage, Reduced Redundancy and Glacier Storage. 3. SYSTEM DESIGN 3.1 Users Users can use their storage areas from the client machines using this Software. This same software provides Login Mechanism for user by communicating with the institute‟s server. The software for use is hosted by the Institute Server for free downloading. The software includes User Interface for
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 959 Sharing Files, both with groups or single users, and for uploading or downloading files with a single click of a button! 3.2 Institute Server The server is essential for authenticating users, managing users. Server also does the job of routing requests from users. Each request always goes to the server, gets authenticated by the use of signature generated from administrator keys and is sent to Amazon Cloud for validation and a reply. The Server is totally controlled by the Administrator who can assign Storage limits to users. The Server runs PHP code which uses the Amazon S3 API for PHP for creation of Command objects. Fig -1: System Design 3.3 Amazon Cloud The Amazon Cloud provides request servicing, request authentication, executing backup operations, object and bucket management, applying appropriate policies etc. The Amazon Cloud also provides options to select a region to store your files which is geographically near to your location. 4. IMPLEMENTATION The implementation of the system is described in this section in complete detail: 4.1 Login User Logs in using username and password created during registration. 4.2 Send Request to Institute Server User sends appropriate request like uploading, downloading, deleting, viewing or sharing the files, which is received by the institute‟s server. 4.3 Create Command Object Institute Server creates a command object using PHP API for Amazon S3. 4.4 Send Request to Cloud Institute Server forwards the complete request to Amazon Cloud. 4.5 Validate Request Amazon receives and interprets the request. It stores the signature provided with the request and computes request signature by the same method as that of the Institute Server with administrator‟s keys. This signature is then matched with received signature. If signatures match, it means the requester also has necessary keys and has the authorization to access a certain resource. While uploading files, MD5 hash code of the file is sent to Amazon for verification of data integrity. It ensures that the file attempting to be uploaded is not a victim of attacks like “Man in the middle”. If signature does not match, Amazon Server sends a 403 response code: Forbidden Request.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 960 Fig -2: Request work flow 4.6 Response from Cloud The reply is then sent back to institute server. It contains either requested data or an error code 4.7 Reply from Institute Server The institute server returns it back to the client who made the request. Efficient communication mechanism (JSON/XML) is used for communicating data between client and the Institute Server. 4.8 User Execute the URL The user executes the received URL which completes the task required by the user. So user gets his work executed. 5. CONCLUSIONS Amazon cloud server‟s high Reliability and Availability can be harnessed for building better performing , secure and easy to use applications in daily life. Our work can be applied in different other domains as well. This paper demonstrates the use of client side applications for increased user friendliness which previously was not offered by the Old -school browser based applications. ACKNOWLEDGEMENTS We take this opportunity to thank our project guide Mrs. Preeti Joshi and Head of the Department Rupali Chopde for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project report. We are also thankful to all the staff members of the Department of Information technology of MMCOE, PUNE for their valuable time, support, comments, suggestions and persuasion. We would also like to thank the institute for providing the required facilities, Internet access and important books. REFERENCES [1]. Amazon S3. http://aws.amazon.com/s3/. [2]. Arthur Rahumed, Henry C.H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui: A Secure Cloud Backup System with Assured Deletion and Version Control. [3]. Hobin Yoon, Ada Gavrilovska, Karsten Schwan, Jim Donahue: Interactive Use of Cloud Services: Amazon SQS and S3. [4]. Jing Nie: Design the Desktop Backup System Based on Cloud Computing. [5]. M. Noureddine, R. Bashroush: A Provisioning Model towards OAuth 2.0 Performance Optimization. [6]. SNIA. Cloud Data Management Interface(CDMI). http://cdmi.sniacloud.com.131-133. (references) [7]. Ghemawat,S.,Gobioff,H.,AND Lueng,S.-T. Google File System. In 19th ACM Symposium on Operating Systems Principles.518-519. [8]. ZuquanTang,MinshenQu,ZhijingXu. Design the File Backup System Based on FileSystem Watcher. Electronic design project. Volume 18 phase 3: page 12. [9]. Wuhan Zhao, Xiaoqin Hu, HongminDeng, Xiaoxu Ma. The Efficient file backup methods Based on Internet . Electronic design project.Volume 36 phase 2: page 247. [10]. “AWS Forum.” Available: https://forums.aws.amazon.com/forum.jspa?forumID = 12 & start=0 [11]. Bitcurrent, “Cloud performance from the end user perspective,” 2011. Available: http://www.bitcurrent.com/ download/cloud-performance-from-the-end-user-perspective [12]. M. Kagan, “Global cloud performance data,” 2011. [Online]. Available: http://www.cloudconnectevent.com/ 2011/presentations/free/76-marty-kagan.pdf [13]. “AWS Import/Export.” [Online]. Available: http://aws. amazon.com/importexport [14]. “AWS Direct Connect,” 2011. [Online]. Available: http://aws.amazon.com/directconnect [15]. A. Gavrilovska, “High Performance IP-Based Transports,”September 2009. [16] S. L. Garfinkel, “An Evaluation of Amazons Grid Computing Services: EC2, S3, and SQS,” Center for, Tech. Rep., 2007.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 961 BIOGRAPHIES Ameya Vidyadhar Kanitkar, Student, Department of IT MMCOE, Pune Shreyas Ramesh Joshi, Student, Department of IT, MMCOE, Pune Sumit Suhas Chitnis, Student, Department of IT, MMCOE, Pune Mayur Bhagwat Gite, Student, Department of IT, MMCOE, Pune