SlideShare a Scribd company logo
1 of 11
Privacy-Preserving Public Auditing for
Regenerating-Code-Based Cloud
Storage
TABLE OF CONTENTS
 Abstract
 Problem Definition
 Existing System
 Proposed System
 Hardware Requirements
 Software Requirements
ABSTRACT
• Existing remote checking methods for regenerating-coded data
only provide private auditing, requiring data owners to always
stay online and handle auditing, as well as repairing, which is
sometimes impractical.
• Here, we propose a public auditing scheme for the
regenerating-code-based cloud storage.
PROBLEM DEFINITION
• To protect outsourced data in cloud storage against
corruptions, adding fault tolerance to cloud storage together
with data integrity checking and failure reparation becomes
critical.
• Regenerating codes have gained popularity due to their lower
repair bandwidth while providing fault tolerance.
Existing System
• The integrity of outsourced data without a local copy have
been proposed under different system and security models up
to now.
• The most significant work among these studies are the PDP
(provable data possession) model and POR (proof of re-
trievability) model, which were originally proposed for the
single-server scenario by Ateniese et al. and Juels and Kaliski,
respectively.
DISADVANTAGES:
• Security is less.
• They are designed for private audit, only the data owner is
allowed to verify the integrity and repair the faulty servers.
• The auditing schemes in existing imply the problem that users
need to always stay online, which may impede its adoption in
practice, especially for long-term archival storage
PROPOSED SYSTEM
• we focus on the integrity verification problem in regenerating-
code-based cloud storage, especially with the functional repair
strategy.
• The data integrity and save the users’ computation resources
as well as online burden, we propose a public auditing scheme
for the regenerating-code-based cloud storage, in which the
integrity checking and regeneration (of failed data blocks and
authenticators) are implemented by a third-party auditor and a
semi-trusted proxy separately on behalf of the data owner.
Advantages:
• Security is high.
• Utilizing the linear subspace of the regenerating codes, the
authenticators can be computed efficiently.
• Besides, it can be adapted for data owners equipped with low
end computation devices (e.g. Tablet PC etc.) in which they
only need to sign the native blocks.
Software Requirements
• Operating System : Windows XP/XP2/XP7
• Front End : JAVA(JDBC,Servlet,JSP)
• Back End : MySQL 5.5
• Server : Apache Tomcat Server
Hardware Requirements
• Processor :Any Processor above 500 MHz
• Hard Disk :80 GB and above.
• Ram :512 MB and above.
THANK YOU

More Related Content

What's hot

Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditingvmshimavm
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudNexgen Technology
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationJSPM's JSCOE , Pune Maharashtra.
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilitySunkaraHariNarayana
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computinghasimshah
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Naveena N
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession forIMPULSE_TECHNOLOGY
 

What's hot (20)

Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 

Viewers also liked

Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
A scalable and reliable matching service for content based publish subscribe ...
A scalable and reliable matching service for content based publish subscribe ...A scalable and reliable matching service for content based publish subscribe ...
A scalable and reliable matching service for content based publish subscribe ...somnath goud
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet Papitha Velumani
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 
HYDROGEN SUPERHIGHWAY
HYDROGEN SUPERHIGHWAYHYDROGEN SUPERHIGHWAY
HYDROGEN SUPERHIGHWAYSachin Sp
 
hydrogen fuel cell vehicle ppt
hydrogen fuel cell vehicle ppthydrogen fuel cell vehicle ppt
hydrogen fuel cell vehicle pptRaghu sai G
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionPramod M Mithyantha
 

Viewers also liked (11)

Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
A scalable and reliable matching service for content based publish subscribe ...
A scalable and reliable matching service for content based publish subscribe ...A scalable and reliable matching service for content based publish subscribe ...
A scalable and reliable matching service for content based publish subscribe ...
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Hydrogen super highway
Hydrogen super highwayHydrogen super highway
Hydrogen super highway
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 
HYDROGEN SUPERHIGHWAY
HYDROGEN SUPERHIGHWAYHYDROGEN SUPERHIGHWAY
HYDROGEN SUPERHIGHWAY
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
hydrogen fuel cell vehicle ppt
hydrogen fuel cell vehicle ppthydrogen fuel cell vehicle ppt
hydrogen fuel cell vehicle ppt
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure Selection
 

Similar to Privacy preserving public auditing for regenerating-code-based

JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...chennaijp
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D... Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...Prasadu Peddi
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxPadmaNaban32
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queriesPapitha Velumani
 
Production grade edge computing on Kubernetes OSS EU 2018
Production grade edge computing on Kubernetes   OSS EU 2018Production grade edge computing on Kubernetes   OSS EU 2018
Production grade edge computing on Kubernetes OSS EU 2018Steve Wong
 
enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...swathi78
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentationSymantec
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Prasadu Peddi
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.skarthi j
 
ODW 2021 - Automated patching and compliance to improve database security.pptx
ODW 2021 - Automated patching and compliance to improve database security.pptxODW 2021 - Automated patching and compliance to improve database security.pptx
ODW 2021 - Automated patching and compliance to improve database security.pptxPaul Breniuc
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSMaurvi04
 
SCALE 16x on-prem container orchestrator deployment
SCALE 16x on-prem container orchestrator deploymentSCALE 16x on-prem container orchestrator deployment
SCALE 16x on-prem container orchestrator deploymentSteve Wong
 
A Year of “Testing” the Cloud for Development and Test
A Year of “Testing” the Cloud for Development and TestA Year of “Testing” the Cloud for Development and Test
A Year of “Testing” the Cloud for Development and TestTechWell
 
HPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyHPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyPeter Clapham
 

Similar to Privacy preserving public auditing for regenerating-code-based (20)

JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D... Attribute Based Storage Supporting Secure    Deduplication  of  Encrypted  D...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Integrity for join queries
Integrity for join queriesIntegrity for join queries
Integrity for join queries
 
Production grade edge computing on Kubernetes OSS EU 2018
Production grade edge computing on Kubernetes   OSS EU 2018Production grade edge computing on Kubernetes   OSS EU 2018
Production grade edge computing on Kubernetes OSS EU 2018
 
enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 
ODW 2021 - Automated patching and compliance to improve database security.pptx
ODW 2021 - Automated patching and compliance to improve database security.pptxODW 2021 - Automated patching and compliance to improve database security.pptx
ODW 2021 - Automated patching and compliance to improve database security.pptx
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
rakesh_resume
rakesh_resumerakesh_resume
rakesh_resume
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
SCALE 16x on-prem container orchestrator deployment
SCALE 16x on-prem container orchestrator deploymentSCALE 16x on-prem container orchestrator deployment
SCALE 16x on-prem container orchestrator deployment
 
A Year of “Testing” the Cloud for Development and Test
A Year of “Testing” the Cloud for Development and TestA Year of “Testing” the Cloud for Development and Test
A Year of “Testing” the Cloud for Development and Test
 
HPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyHPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journey
 

More from Nagamalleswararao Tadikonda

Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkNagamalleswararao Tadikonda
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksNagamalleswararao Tadikonda
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksNagamalleswararao Tadikonda
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsNagamalleswararao Tadikonda
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsNagamalleswararao Tadikonda
 

More from Nagamalleswararao Tadikonda (8)

Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation framework
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
You tube video promotion by cross network
You tube video promotion by cross networkYou tube video promotion by cross network
You tube video promotion by cross network
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook Applications
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
A seminar report on i cloud
A  seminar report on i cloudA  seminar report on i cloud
A seminar report on i cloud
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Privacy preserving public auditing for regenerating-code-based

  • 1. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
  • 2. TABLE OF CONTENTS  Abstract  Problem Definition  Existing System  Proposed System  Hardware Requirements  Software Requirements
  • 3. ABSTRACT • Existing remote checking methods for regenerating-coded data only provide private auditing, requiring data owners to always stay online and handle auditing, as well as repairing, which is sometimes impractical. • Here, we propose a public auditing scheme for the regenerating-code-based cloud storage.
  • 4. PROBLEM DEFINITION • To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. • Regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance.
  • 5. Existing System • The integrity of outsourced data without a local copy have been proposed under different system and security models up to now. • The most significant work among these studies are the PDP (provable data possession) model and POR (proof of re- trievability) model, which were originally proposed for the single-server scenario by Ateniese et al. and Juels and Kaliski, respectively.
  • 6. DISADVANTAGES: • Security is less. • They are designed for private audit, only the data owner is allowed to verify the integrity and repair the faulty servers. • The auditing schemes in existing imply the problem that users need to always stay online, which may impede its adoption in practice, especially for long-term archival storage
  • 7. PROPOSED SYSTEM • we focus on the integrity verification problem in regenerating- code-based cloud storage, especially with the functional repair strategy. • The data integrity and save the users’ computation resources as well as online burden, we propose a public auditing scheme for the regenerating-code-based cloud storage, in which the integrity checking and regeneration (of failed data blocks and authenticators) are implemented by a third-party auditor and a semi-trusted proxy separately on behalf of the data owner.
  • 8. Advantages: • Security is high. • Utilizing the linear subspace of the regenerating codes, the authenticators can be computed efficiently. • Besides, it can be adapted for data owners equipped with low end computation devices (e.g. Tablet PC etc.) in which they only need to sign the native blocks.
  • 9. Software Requirements • Operating System : Windows XP/XP2/XP7 • Front End : JAVA(JDBC,Servlet,JSP) • Back End : MySQL 5.5 • Server : Apache Tomcat Server
  • 10. Hardware Requirements • Processor :Any Processor above 500 MHz • Hard Disk :80 GB and above. • Ram :512 MB and above.