3. AUDITING DATA INTEGRITY &
DATA STORGE USING CLOUD
BY
ASWIN.S
NARESH.R
NAVEEN PRASATH.T.K.
RANJITH KUMAR .V
4. ABSTRACT
Using Cloud Storage, users can remotely store their data and enjoy the on-demand
high quality applications and services from a shared pool of configurable computing
resources, without the burden of local data storage and maintenance.
However, the fact that users no longer have physical possession of the outsourced data
makes the data integrity protection in Cloud Computing a formidable task, especially for
users with constrained computing resources.
5. EXISTING SYSTEM
To securely introduce an effective third party auditor (TPA), the following two
fundamental requirements have to be met TPA should be able to efficiently audit the cloud
data storage without demanding the local copy of data, and introduce no additional on-line
burden to the cloud user The third party auditing process should bring in no new
vulnerabilities towards user data privacy.
Drawbacks of existing system:
1.The record of backup time is not maintained
2.Path can be changed when talking backup
6. PROPOSED SYSTEM
In this paper, we utilize the public Provable data possession (PDP),which is a
cryptographic technique for verifying the integrity of data without retrieving it at an
untrusted server; can be used to realize audit services.
Extensive security and performance analysis shows the proposed schemes are
provably secure and highly efficient. We also show how to extent our main scheme
to support batch auditing for TPA upon delegations from multi-users.
7. SYSTEM REQURIMENTS
HARDWARE REQUIREMENT :
System : Pentium Dual Core (OR) Higher.
Hard Disk : 120 GB (Min).
Monitor : 15” LED.
Input Devices : Keyboard , Mouse.
RAM : 4 GB (Min).
8. SOFTWARE REQUIREMENT :
Operating System : Windows 7/10.
Front End : ASP.Net, C#.Net.
Back End : Sql Server 2005.
9. MODULES
AUDIT SERVICE SYSTEM
In this module we provide an efficient and secure cryptographic
interactive audit scheme for public audit ability. We provide an efficient
and secure cryptographic interactive retains the soundness property and
zero-knowledge propert of proof systems. These two properties ensure
that our scheme can not only prevent the deception and forgery of
cloud storage providers, but also prevent the leakage of outsourced data
in the process of verification.
10. DATA STORAGE SERVICE SYSTEM
IN THIS MODULE, WE CONSIDERED FOUR ENTITIES TO STORE THE DATA IN
SECURE MANNER:
DATA OWNER (DO)
WHO HAS A LARGE AMOUNT OF DATA TO BE STORED IN THE CLOUD.
CLOUD SERVICE PROVIDER (CSP)
WHO PROVIDES DATA STORAGE SERVICE AND HAS ENOUGH STORAGE SPACES
AND COMPUTATION RESOURCES.
THIRD PARTY AUDITOR (TPA)
WHO HAS CAPABILITIES TO MANAGE OR MONITOR – OUTSOURCED DATA UNDER
THE DELEGATION OF DATA OWNER.
GRANTED APPLICATIONS (GA)
WHO HAVE THE RIGHT TO ACCESS AND MANIPULATE STORED DATA . THESE
APPLICATIONS CAN BE EITHER INSIDE CLOUDS OR OUTSIDE CLOUDS ACCORDING TO
THE SPECIFIC REQUIREMENTS.
13. CONCLUTION
One of the most often used methods is
keyword-based search. Users may pick which files
they want to retrieve using this keyword search
method, which has been widely utilised in plaintext
search scenarios. Unfortunately, owing to data
encryption, normal plaintext search methods for
encrypted cloud data fail, limiting users' ability to do
keyword searches and necessitating the protection
of keyword privacy. Rank search substantially
improves system usability by matching files in a