#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD
DATA
ABSTRACT
 Cloud users no longer physically possess their data, so how to ensure the integrity of their
outsourced data becomes a challenging task.
 Moreover, threat models in these schemes usually assume an honest data owner and focus
on detecting a dishonest cloud service provider despite the fact that clients may also
misbehave.
 This paper proposes a public auditing scheme with data dynamics support and fairness
arbitration of potential disputes.
 In particular, we design an index switcher to eliminate the limitation of index usage in tag
computation in current schemes and achieve efficient handling of data dynamics.
EXISTING SYSTEM
 Our work also adopts the idea of signature exchange to ensure the metadata correctness
and protocol fairness, and we concentrate on combining efficient data dynamics support
and fair dispute arbitration into a single auditing scheme.
 To address the fairness problem in auditing, we introduce a third-party arbitrator (TPAR)
into our threat model.
 Professional institute for conflicts arbitration and is trusted and payed by both data
owners and the CSP.
 A number of VPH applications are designed to access data from local disk, which will
not work if the data is stored in some remote storage system.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM
 Out sourcing data to the cloud brings about many new security threats.
 Firstly, despite the powerful machines and strong security mechanisms provided by cloud
service providers (CSP), remote data still face network attacks, hardware failures and
administrative errors.
 Secondly, CSP may reclaim storage of rarely or never accessed data, or even hide loss
accidents for reputation reasons.
 As users no longer physically posses their data and consequently lose direct control over
the data, direct employment of traditional cryptographic primitives like hash or
encryption to ensure remote data’s integrity may lead to many security loopholes.
HARDWARE REQUIREMENTS
 System : Pentium IV 2.4 GHz
 Hard disk : 40 GB
 Monitor : 15 VGA color
 Mouse : Sony
 Ram : 512 Mb
SOFTWARE REQUIREMENTS
 Operating system : windows XP
 Coding language : ASP .Net with C#
 Data base : SQL Server 2005

Dynamic and public auditing with fair arbitration for cloud data

  • 1.
    #13/ 19, 1stFloor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA ABSTRACT  Cloud users no longer physically possess their data, so how to ensure the integrity of their outsourced data becomes a challenging task.  Moreover, threat models in these schemes usually assume an honest data owner and focus on detecting a dishonest cloud service provider despite the fact that clients may also misbehave.  This paper proposes a public auditing scheme with data dynamics support and fairness arbitration of potential disputes.  In particular, we design an index switcher to eliminate the limitation of index usage in tag computation in current schemes and achieve efficient handling of data dynamics. EXISTING SYSTEM  Our work also adopts the idea of signature exchange to ensure the metadata correctness and protocol fairness, and we concentrate on combining efficient data dynamics support and fair dispute arbitration into a single auditing scheme.  To address the fairness problem in auditing, we introduce a third-party arbitrator (TPAR) into our threat model.  Professional institute for conflicts arbitration and is trusted and payed by both data owners and the CSP.  A number of VPH applications are designed to access data from local disk, which will not work if the data is stored in some remote storage system.
  • 2.
    #13/ 19, 1stFloor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM  Out sourcing data to the cloud brings about many new security threats.  Firstly, despite the powerful machines and strong security mechanisms provided by cloud service providers (CSP), remote data still face network attacks, hardware failures and administrative errors.  Secondly, CSP may reclaim storage of rarely or never accessed data, or even hide loss accidents for reputation reasons.  As users no longer physically posses their data and consequently lose direct control over the data, direct employment of traditional cryptographic primitives like hash or encryption to ensure remote data’s integrity may lead to many security loopholes. HARDWARE REQUIREMENTS  System : Pentium IV 2.4 GHz  Hard disk : 40 GB  Monitor : 15 VGA color  Mouse : Sony  Ram : 512 Mb SOFTWARE REQUIREMENTS  Operating system : windows XP  Coding language : ASP .Net with C#  Data base : SQL Server 2005