SlideShare a Scribd company logo
1 of 18
Download to read offline
Public Authentication Inspection for Shared
Dynamic Cloud Data with Group User
Revocation Including Backup And Data
Storage.
- PUSHKAR ZAGADE
- SHRUTI YADAV
- AISHWARYA SHAH
Guide : Prof. R. P. Bachate
9/11/2015 1
 With traditional desktop computing, we run copies of
software programs on our own computer. The documents
we create are stored on our own pc.
 Although documents can be accessed from other computers
on the network, they can’t be accessed by computers
outside the network. This is PC-centric.
 With cloud computing, the software programs use
aren’t run from one’s personal computer, but are
rather stored on servers accessed via the Internet.
9/11/2015 2
 If a computer crashes, the software is still available for
others to use. Same goes for the documents one create;
they’re stored on a collection of servers accessed via the
Internet.
 Anyone with permission can not only access the
documents, but can also edit and collaborate on those
documents in real time.
 Unlike traditional computing, this cloud computing model is
not PC-centric, it is document-centric.
9/11/2015 3
1. Lower computer costs.
2. Improved performance.
3. Reduced software costs.
4. Improved document format compatibility.
5. Unlimited storage capacity.
6. Increased data reliability.
7. Universal document access.
8. Latest version availability.
9. Device independence.
9/11/2015 4
1. Requires a constant Internet connection.
2. Does not work well with low-speed connections.
3. Features might be limited.
4. Can be slow.
5. Stored data might not be secure.
6. Stored data can be lost.
9/11/2015 5
 In untrusted cloud, data can be easily lost and
corrupted due to human error or hardware failure.
It will be very difficult to recover corrupted data.
 As there are increasing data storage on cloud
which causes lots of memory consumption. So,
there is need of removal of data duplication.
9/11/2015 6
 Some commercial cloud storage services, such as the
simple storage service(S3) on-line data backup services
of Amazon and some practical cloud based software
Google Drive, Dropbox, Mozy, Bitcasa, and Memopal,
have been built for cloud application.
 The cloud servers may return an invalid result in some
cases, such as server hardware/software failure, human
maintenance and malicious attack.
9/11/2015 7
 Solves the security and efficiency problems of
public data integrity auditing with multi-user
modification.
 Some basic tools have been used to construct our
scheme.
 We assume that the underlying building blocks are
secure, which include the vector commitment,
group signature, and asymmetric group key
agreement scheme and data recovery.
9/11/2015 8
Our Contributions will be:
 We will explore on the secure and efficient shared
data integrity auditing for multi-user operation for
cipher text database.
 We will propose an efficient data auditing scheme
while at the same time provide some new features,
such as traceability and count ability with data backup
and storage.
 As there is ever-increasing data storage on cloud,
there is need to sort the data in such a way that the
data duplication is removed and memory wastage can
be avoided. Hence we will be using deduplication
algorithm for eliminating this problem.
9/11/2015 9
 Data Owner
 Third Party Auditor (TPA)
 User
 Cloud Admin
 Data Server
 Back Cloud
9/11/2015 10
DATA OWNER
In this module an owner has to upload its files in a
cloud server, But he/she should register first. Then only
he/she can be able to do it.
Third Party Auditor (TPA)
 Third Party Auditor (TPA) also known as cloud
maintainer. He/she need to register and login first.
 After third party auditor gets logged in, He/ She can
see how many data owners have uploaded their files
into the cloud.
9/11/2015 11
USER
 In this module if a user wants to access the data which
is stored in a cloud, he/she should register their details
first. These details are maintained in a Database.
 If the user is an authorized user, he/she can download
the file by using file id which has been stored by data
owner.
Cloud Admin
In this module, admin will maintain user details and
examine shared files from user. Admin also maintain
details of those files.
9/11/2015 12
Cloud Server
 In this module, cloud server is responsible for to
check the backup request which made by user.
 Cloud server forward this request to Back Cloud
by using file id.
Back Cloud
 In this module, Back cloud verify the backup
request and send data to user.
9/11/2015 13
9/11/2015 14
1. More Security
2. More Efficiency
3. Correctness Of Results.
4. Successful Recovery Of Data
5. No Duplication Of Data
9/11/2015 15
Hardware Requirements:
 Processor - Dual Core
 Speed - 1.1 GHz
 Ram - 256mb (Min)
 Hard Disk - 20 Gb
 Key Board - Standard Window Keyboard
 Mouse - Two or three mouse button
 Monitor - SVGA
9/11/2015 16
Software Requirements:
 Operating System - Windows XP/7/8 or Linux
 Front End - HTML,JAVA,JSP
 Scripts - JavaScript
 Server Side Script - JAVA Server Pages
 Database - MySQL
 Database Connectivity - JDBC
 IDE - Eclipse / NetBeans
 Tools - OpenStack ( For Cloud Creation )
9/11/2015 17
.
 C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-
preserving public auditing for data storage security in
cloud computing,” in Proc. of IEEE INFOCOM 2010, CA,
USA, Mar. 2010, pp. 525– 533.
 http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber
=7004787&url=http%3A%2F%2Fieeexplore.ieee.org%2Fi
el7%2F12%2F4358213%2F07004787.pdf%3Farnumber%
3D7004787
 http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber
=6808577&url=http%3A%2F%2Fieeexplore.ieee.org%2Fx
pls%2Fabs_all.jsp%3Farnumber%3D6808577
9/11/2015 18

More Related Content

What's hot

Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageNagamalleswararao Tadikonda
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.Venkat Projects
 
panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...swathi78
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 

What's hot (19)

Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
 
panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 

Viewers also liked

HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUE
HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUEHEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUE
HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUEMauricio Campos Suarez
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Nadezhda Pchelnikova
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana JhaArchana Jha
 
Презентация "НаноСерв" для сахарных заводов
Презентация "НаноСерв" для сахарных заводовПрезентация "НаноСерв" для сахарных заводов
Презентация "НаноСерв" для сахарных заводовNadezhda Pchelnikova
 
Hope and Dream (Biographical Recount)
Hope and Dream (Biographical Recount)Hope and Dream (Biographical Recount)
Hope and Dream (Biographical Recount)Annisa Alfath
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapportLoïc Stouff
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1ojo olurinde
 

Viewers also liked (11)

Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
 
HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUE
HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUEHEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUE
HEALTH CARE & PHARMACEUTICAL BUSINESS: KEY CHALLENGES & IT VALUE
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
 
Sithen SUM's Profile 2015
Sithen SUM's Profile 2015Sithen SUM's Profile 2015
Sithen SUM's Profile 2015
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana Jha
 
Nallen c v 15
Nallen c v 15Nallen c v 15
Nallen c v 15
 
Презентация "НаноСерв" для сахарных заводов
Презентация "НаноСерв" для сахарных заводовПрезентация "НаноСерв" для сахарных заводов
Презентация "НаноСерв" для сахарных заводов
 
Hope and Dream (Biographical Recount)
Hope and Dream (Biographical Recount)Hope and Dream (Biographical Recount)
Hope and Dream (Biographical Recount)
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapport
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1
 

Similar to Integrity Auditing Of Dynamic Cloud Data With Group User Revocation

Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Cloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaCloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaRajat Shukla
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsGaruda Trainings
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3Utphala P
 
Clouding computing
Clouding computingClouding computing
Clouding computingMadhavi39
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptxMSMuthu5
 

Similar to Integrity Auditing Of Dynamic Cloud Data With Group User Revocation (20)

Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Cloud computing by Rajat Shukla
Cloud computing by Rajat ShuklaCloud computing by Rajat Shukla
Cloud computing by Rajat Shukla
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
computing
computingcomputing
computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 

Recently uploaded

DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 

Recently uploaded (20)

DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 

Integrity Auditing Of Dynamic Cloud Data With Group User Revocation

  • 1. Public Authentication Inspection for Shared Dynamic Cloud Data with Group User Revocation Including Backup And Data Storage. - PUSHKAR ZAGADE - SHRUTI YADAV - AISHWARYA SHAH Guide : Prof. R. P. Bachate 9/11/2015 1
  • 2.  With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our own pc.  Although documents can be accessed from other computers on the network, they can’t be accessed by computers outside the network. This is PC-centric.  With cloud computing, the software programs use aren’t run from one’s personal computer, but are rather stored on servers accessed via the Internet. 9/11/2015 2
  • 3.  If a computer crashes, the software is still available for others to use. Same goes for the documents one create; they’re stored on a collection of servers accessed via the Internet.  Anyone with permission can not only access the documents, but can also edit and collaborate on those documents in real time.  Unlike traditional computing, this cloud computing model is not PC-centric, it is document-centric. 9/11/2015 3
  • 4. 1. Lower computer costs. 2. Improved performance. 3. Reduced software costs. 4. Improved document format compatibility. 5. Unlimited storage capacity. 6. Increased data reliability. 7. Universal document access. 8. Latest version availability. 9. Device independence. 9/11/2015 4
  • 5. 1. Requires a constant Internet connection. 2. Does not work well with low-speed connections. 3. Features might be limited. 4. Can be slow. 5. Stored data might not be secure. 6. Stored data can be lost. 9/11/2015 5
  • 6.  In untrusted cloud, data can be easily lost and corrupted due to human error or hardware failure. It will be very difficult to recover corrupted data.  As there are increasing data storage on cloud which causes lots of memory consumption. So, there is need of removal of data duplication. 9/11/2015 6
  • 7.  Some commercial cloud storage services, such as the simple storage service(S3) on-line data backup services of Amazon and some practical cloud based software Google Drive, Dropbox, Mozy, Bitcasa, and Memopal, have been built for cloud application.  The cloud servers may return an invalid result in some cases, such as server hardware/software failure, human maintenance and malicious attack. 9/11/2015 7
  • 8.  Solves the security and efficiency problems of public data integrity auditing with multi-user modification.  Some basic tools have been used to construct our scheme.  We assume that the underlying building blocks are secure, which include the vector commitment, group signature, and asymmetric group key agreement scheme and data recovery. 9/11/2015 8
  • 9. Our Contributions will be:  We will explore on the secure and efficient shared data integrity auditing for multi-user operation for cipher text database.  We will propose an efficient data auditing scheme while at the same time provide some new features, such as traceability and count ability with data backup and storage.  As there is ever-increasing data storage on cloud, there is need to sort the data in such a way that the data duplication is removed and memory wastage can be avoided. Hence we will be using deduplication algorithm for eliminating this problem. 9/11/2015 9
  • 10.  Data Owner  Third Party Auditor (TPA)  User  Cloud Admin  Data Server  Back Cloud 9/11/2015 10
  • 11. DATA OWNER In this module an owner has to upload its files in a cloud server, But he/she should register first. Then only he/she can be able to do it. Third Party Auditor (TPA)  Third Party Auditor (TPA) also known as cloud maintainer. He/she need to register and login first.  After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. 9/11/2015 11
  • 12. USER  In this module if a user wants to access the data which is stored in a cloud, he/she should register their details first. These details are maintained in a Database.  If the user is an authorized user, he/she can download the file by using file id which has been stored by data owner. Cloud Admin In this module, admin will maintain user details and examine shared files from user. Admin also maintain details of those files. 9/11/2015 12
  • 13. Cloud Server  In this module, cloud server is responsible for to check the backup request which made by user.  Cloud server forward this request to Back Cloud by using file id. Back Cloud  In this module, Back cloud verify the backup request and send data to user. 9/11/2015 13
  • 15. 1. More Security 2. More Efficiency 3. Correctness Of Results. 4. Successful Recovery Of Data 5. No Duplication Of Data 9/11/2015 15
  • 16. Hardware Requirements:  Processor - Dual Core  Speed - 1.1 GHz  Ram - 256mb (Min)  Hard Disk - 20 Gb  Key Board - Standard Window Keyboard  Mouse - Two or three mouse button  Monitor - SVGA 9/11/2015 16
  • 17. Software Requirements:  Operating System - Windows XP/7/8 or Linux  Front End - HTML,JAVA,JSP  Scripts - JavaScript  Server Side Script - JAVA Server Pages  Database - MySQL  Database Connectivity - JDBC  IDE - Eclipse / NetBeans  Tools - OpenStack ( For Cloud Creation ) 9/11/2015 17
  • 18. .  C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- preserving public auditing for data storage security in cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp. 525– 533.  http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber =7004787&url=http%3A%2F%2Fieeexplore.ieee.org%2Fi el7%2F12%2F4358213%2F07004787.pdf%3Farnumber% 3D7004787  http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber =6808577&url=http%3A%2F%2Fieeexplore.ieee.org%2Fx pls%2Fabs_all.jsp%3Farnumber%3D6808577 9/11/2015 18