Professional Documents
Culture Documents
Final Review PPT Template
Final Review PPT Template
Final Review PPT Template
&
ADVANCED STUDIES (VISTAS)
Final Review
Batch No. : 02
DATE : 18/05/2022
Presented by :
Supervisor :
Arnold Beverly - 19139145
Vimal Raj - 19139143 Mrs.Kotteshwari
Dayan Sheriff - 19139151
Hemanth.G - 191391 Project Guide
Objective
2
Domain Description
Cloud computing
The practice of using a network of remote servers
hosted on the internet to store, manage,and process
data ,rather than a local server or a personal computer
3
Abstract
If upload the data in multi server to avoid the data loss from
Hacking and server crash.
Author: Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou
Abstract:
The first time, we define and solve the challenging problem of privacy-preserving multi-keyword
ranked search over encrypted data in cloud computing (MRSE). We establish a set of strict
privacy requirements for such a secure cloud data utilization system. We further use “inner
product similarity” to quantitatively evaluate such similarity measure. We first propose a basic
idea for the MRSE based on secure inner product computation, and then give two significantly
improved MRSE schemes to achieve various stringent privacy requirements in two different
threat models. To improve search experience of the data search service, we further extend these
two schemes to support more search semantics. Thorough analysis investigating privacy and
efficiency guarantees of proposed schemes is given.. 5
Literature Review
Paper2
Title: VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
Abstract:
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the
outsourced data should be encrypted. This however brings a range of problems, such as: How should a data owner grant
search capabilities to the data users? How can the authorized data users search over a data owner’s outsourced encrypted
data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated
by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS).
The solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data
owner’s outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the
cloud has faithfully executed the search operations.
6
Architecture Diagram
7
List of Modules
8
Module Description
Cloud Service provider:
9
Module Description
After admin verify the user details, User to upload the file to
cloud server.While upload the file, files are encrypted and stored in the
database and folder. While upload the data are split and store the three
server. Because hacker, cannot not hack server data. Because data parts
are stored in three servers.Key gen algorithm used in data upload and
encrypted.
10
Module Description
File Convert:
While upload data to server. All data are in ZIP format for reduce
the file occupy memory.
Authorized users:
Authorised users, these users only to download the file from the
others users. These users to send the file requset to admin and file owner
11
Module Description
File request:
User may be share the our files to another users. Shared users to fetch the
file from file owner. Shared user to send the file request to file owner
and automatically same request send to admin. Then Admin verify the
server and provide the clearance to provide the key from file owner.
After file owner to send the temporary key to shared users.if shared users
download the shared file the temporary key automatically expire.
12
Module Description
File recovery:
Report Generation:
Admin to generate the reports for how many user register in the cloud.
And alos prepare the verify and not verify details.
13
Screen Shots
14
Conclusion and Future Work
Most of the people are storing their data over the multiple
clouds for security purpose. However, unplanned distribution
of data over the multiple clouds may produce the probability
to loss all data, which increase degree of information leakage
in multicloud. To optimize information leakage, I provided
StoreSim system, which is a storage system, that aware
information loss in multiple clouds and storing the similar
data to same cloud. I designed MinHash algorithm to
efficiently generate similarity-preserving signatures for data
chunks and designed a function to compute the information
leakage based on these signatures which are hashed by
fingerprint algorithms such as SHA-1, MD5
15
References
[1] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa, “Depsky: dependable and
secure storage in a cloud-of-clouds,” ACM Transactions onStorage (TOS), vol. 9, no. 4, p. 12,
2013.
[2] H. Chen, Y. Hu, P. Lee, and Y. Tang, “Nccloud: A network-coding-based storage system in a
cloudof-clouds,” 2013.
[3] T. G. Papaioannou, N. Bonvin, and K. Aberer, “Scalia: an adaptive scheme for efficient
multicloud storage,” in Proceedings of the International Conference on High Performance
Computing, Networking, Storage and Analysis. IEEE Computer Society Press, 2012, p. 20.
[5] U. Manber et al., “Finding similar files in a large file system.” in UsenixWinter, vol. 94, 1994, pp.
1–10
16
THANK YOU