Final Review PPT Template

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 17

VELS INSTITUTE OF SCIENCE,TECHNOLOGY

&
ADVANCED STUDIES (VISTAS)

OPTIMIZING INFORMATION LEAKAGE IN


MULTIPLE CLOUD STORAGE SYSTEM

Final Review
Batch No. : 02
DATE : 18/05/2022
Presented by :
Supervisor :
Arnold Beverly - 19139145
Vimal Raj - 19139143 Mrs.Kotteshwari
Dayan Sheriff - 19139151
Hemanth.G - 191391 Project Guide
Objective

In this project we introduced new technique


that is Fully Homomorphic Encryption (FHE)
for take Multi files of data, File security, Data
Corrupted.

2
Domain Description
Cloud computing
The practice of using a network of remote servers
hosted on the internet to store, manage,and process
data ,rather than a local server or a personal computer

Allows consumers and businesses to use application


without installation and access the personal files at
any computer with internet access

3
Abstract

Multi files Means, data to be copied in multiple server. In the


project owner to upload the data in cloud server with
automatically data to take multiple files then that files are
stored in multiple server.

If upload the data in multi server to avoid the data loss from
Hacking and server crash.

In this project we introduced new technique that is Fully


Homomorphic Encryption(FHE) for take Multi files of data,
File security, Data Corrupted.
4
Literature Review
Paper1

Title: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.

Author: Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou

Abstract:

The first time, we define and solve the challenging problem of privacy-preserving multi-keyword
ranked search over encrypted data in cloud computing (MRSE). We establish a set of strict
privacy requirements for such a secure cloud data utilization system. We further use “inner
product similarity” to quantitatively evaluate such similarity measure. We first propose a basic
idea for the MRSE based on secure inner product computation, and then give two significantly
improved MRSE schemes to achieve various stringent privacy requirements in two different
threat models. To improve search experience of the data search service, we further extend these
two schemes to support more search semantics. Thorough analysis investigating privacy and
efficiency guarantees of proposed schemes is given.. 5
Literature Review
Paper2

Title: VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data

Author: Qingji Zheng, Shouhuai Xu, and Giuseppe Ateniese.

Abstract:

It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the
outsourced data should be encrypted. This however brings a range of problems, such as: How should a data owner grant
search capabilities to the data users? How can the authorized data users search over a data owner’s outsourced encrypted
data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated
by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS).
The solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data
owner’s outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the
cloud has faithfully executed the search operations.

6
Architecture Diagram

7
List of Modules

• Cloud Service provider


• User upload with keygeneration
• File Convert
• Authorized users
• File request
• File recovery
• Report generation

8
Module Description
Cloud Service provider:

Cloud Service provider to provide the service to user.


User register the details to service provider before send the
file.
After user registration admin verify the user profile and
accept the user request.
Admin may be reject the Unauthorized profile details.

9
Module Description

User upload with keygen:

After admin verify the user details, User to upload the file to
cloud server.While upload the file, files are encrypted and stored in the
database and folder. While upload the data are split and store the three
server. Because hacker, cannot not hack server data. Because data parts
are stored in three servers.Key gen algorithm used in data upload and
encrypted.

10
Module Description

File Convert:

While upload data to server. All data are in ZIP format for reduce
the file occupy memory.

Authorized users:

Authorised users, these users only to download the file from the
others users. These users to send the file requset to admin and file owner

11
Module Description

File request:

User may be share the our files to another users. Shared users to fetch the
file from file owner. Shared user to send the file request to file owner
and automatically same request send to admin. Then Admin verify the
server and provide the clearance to provide the key from file owner.
After file owner to send the temporary key to shared users.if shared users
download the shared file the temporary key automatically expire.

12
Module Description
File recovery:

If user file may be corrupt or may be delete. So if user delete any


file from server,user can recover the deleted files from file sever. It is
very useful to all cloud users.If user to recover the deleted file, user login
and get the deleted files

Report Generation:

Admin to generate the reports for how many user register in the cloud.
And alos prepare the verify and not verify details.

13
Screen Shots

14
Conclusion and Future Work

Most of the people are storing their data over the multiple
clouds for security purpose. However, unplanned distribution
of data over the multiple clouds may produce the probability
to loss all data, which increase degree of information leakage
in multicloud. To optimize information leakage, I provided
StoreSim system, which is a storage system, that aware
information loss in multiple clouds and storing the similar
data to same cloud. I designed MinHash algorithm to
efficiently generate similarity-preserving signatures for data
chunks and designed a function to compute the information
leakage based on these signatures which are hashed by
fingerprint algorithms such as SHA-1, MD5
15
References
[1] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa, “Depsky: dependable and
secure storage in a cloud-of-clouds,” ACM Transactions onStorage (TOS), vol. 9, no. 4, p. 12,
2013.

[2] H. Chen, Y. Hu, P. Lee, and Y. Tang, “Nccloud: A network-coding-based storage system in a
cloudof-clouds,” 2013.

[3] T. G. Papaioannou, N. Bonvin, and K. Aberer, “Scalia: an adaptive scheme for efficient
multicloud storage,” in Proceedings of the International Conference on High Performance
Computing, Networking, Storage and Analysis. IEEE Computer Society Press, 2012, p. 20.

[4] Z. Wu, M. Butkiewicz, D. Perkins, E. KatzBassett, and H. V. Madhyastha,“Spanstore:


Costeffective geo-replicated storage spanning multiple cloud services,” in Proceedings of the
TwentyFourth ACM Symposium on Operating Systems Principles. ACM, 2013, pp. 292–308.

[5] U. Manber et al., “Finding similar files in a large file system.” in UsenixWinter, vol. 94, 1994, pp.
1–10

16
THANK YOU

You might also like