Vous êtes sur la page 1sur 13

VIVEKANANDA INSTITUTE OF TECHNOLOGY & SCIENCE(N9)

(Affiliated to Jawaharlal Nehru Technological University)


Karimnagar- 505001. T.S., INDIA

D.SOUJANYA
N.ASHWINI KUMARI
P.SRAVANTHI
A.SAMATHA

(127G1A0514)
(127G1A0503)
(127G1A0507)
(107G1A0506)

Under the Guidance of


Mr.SRINIVAS
Assistant Professor
1

Abstract
Introduction
Existing System
Disadvantages of existing system
Proposed System
Advantages of proposed system
Software Requirements
Hardware Requirements
Conclusion

Public Auditing on the integrity of shared data with


these existing mechanisms will inevitably reveal
confidential information identity privacy to public
verifiers.
Cloud data services stores data in the cloud as well as
shares data among many users.
Preserving the data in the cloud is very difficult.
To overcome this problem we propose a novel privacy
preserving mechanism that supports public auditing
on shared data stored in the cloud.
4

Users should be able to just use the cloud storage as if it is local ,


without worrying about the need to verify its integrity.
Public auditing mechanism for secure cloud storage.
Users can resort to a Third Party Auditor (TPA) to check the
integrity of outsourced data.
It is a computing in which large group of remote servers are
networked to allow centralized data storage and online access to
computer services.

Many mechanisms have been proposed to allow not only a data


owner itself but also a public verifier to efficiently perform the
integrity checking without downloading the entire data from the
cloud , which is referred to as Public Auditing.
Sharing data among multiple users is one of the most attractive
features that motivates the cloud storage.
Unique problem aroused during the process of public auditing
shared data in the cloud is how to preserve identity privacy from
TPA.
A public verifier cloud be a data user (e.g. researcher) who would
like to utilize the owners data via the cloud or Third Party Auditor
who can provide expert integrity checking services.
6

Failing to preserve identity privacy on shared data during public


auditing will reveal significant confidential information to public
verifiers.

Protect these confidential information is essential and critical to


preserve identity privacy from public verifiers during public
auditing.
Data Redundency.
Encryption.
7

Our schemes supports an external auditor to audit users outsourced


data in the cloud.
A public verifier is able to verify the integrity of shared data without
retrieving the entire data while the identity of a signer on each block
in shared data is kept private from public verifier.

A Public verifier is able to correctly verify shared data integrity.


A Public verifier cannot distinguish the identity of the signer on
each block in shared data during the process of auditing.
Storage Correctness.
Light Weight.
Batch Auditing.

Operating System

: Windows XP/7

Front End

: Swings & AWT

Scripts

: Java Script

Database

: My SQL

Database Connectivity : JDBC

10

Processor

- Pentium IV

Speed

1.1 GHz

RAM

512MB (min)

Hard Disk

- 40 GB

11

12

13

Vous aimerez peut-être aussi