Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

WELCOME

TO
POWER POINT
PRESENTATION
AUDITING DATA INTEGRITY
&
DATA STORGE USING CLOUD
AUDITING DATA INTEGRITY &
DATA STORGE USING CLOUD
BY

ASWIN.S
NARESH.R
NAVEEN PRASATH.T.K.
RANJITH KUMAR .V
ABSTRACT
 Using Cloud Storage, users can remotely store their data and enjoy the on-

demand high quality applications and services from a shared pool of configurable

computing resources, without the burden of local data storage and maintenance.

 However, the fact that users no longer have physical possession of the outsourced

data makes the data integrity protection in Cloud Computing a formidable task, especially

for users with constrained computing resources.


EXISTING SYSTEM
 To securely introduce an effective third party auditor (TPA), the following two

fundamental requirements have to be met TPA should be able to efficiently audit the cloud

data storage without demanding the local copy of data, and introduce no additional on-line

burden to the cloud user The third party auditing process should bring in no new vulnerabilities

towards user data privacy.

Drawbacks of existing system:

1.The record of backup time is not maintained

2.Path can be changed when talking backup


PROPOSED SYSTEM
 In this paper, we utilize the public Provable data possession (PDP),which

is a cryptographic technique for verifying the integrity of data without retrieving

it at an untrusted server; can be used to realize audit services.

 Extensive security and performance analysis shows the proposed schemes

are provably secure and highly efficient. We also show how to extent our main

scheme to support batch auditing for TPA upon delegations from multi-users .
SYSTEM REQURIMENTS
HARDWARE REQUIREMENT :

 System : Pentium Dual Core (OR) Higher.


 Hard Disk : 120 GB (Min).
 Monitor : 15” LED.
 Input Devices : Keyboard , Mouse.
 RAM : 4 GB (Min).
SOFTWARE REQUIREMENT :

 Operating System : Windows 7/10.

 Front End : ASP.Net, C#.Net.

 Back End : Sql Server 2005.


MODULES
 AUDIT SERVICE SYSTEM

 In this module we provide an efficient and secure cryptographic


interactive audit scheme for public audit ability. We provide an efficient and
secure cryptographic interactive retains the soundness property and zero-
knowledge propert of proof systems. These two properties ensure that our
scheme can not only prevent the deception and forgery of cloud storage
providers, but also prevent the leakage of outsourced data in the process of
verification.
 DATA STORAGE SERVICE SYSTEM
IN THIS MODULE, WE CONSIDERED FOUR ENTITIES TO STORE THE DATA IN
SECURE MANNER:
DATA OWNER (DO)
WHO HAS A LARGE AMOUNT OF DATA TO BE STORED IN THE CLOUD.
CLOUD SERVICE PROVIDER (CSP)
WHO PROVIDES DATA STORAGE SERVICE AND HAS ENOUGH STORAGE
SPACES AND COMPUTATION RESOURCES.
THIRD PARTY AUDITOR (TPA)
WHO HAS CAPABILITIES TO MANAGE OR MONITOR – OUTSOURCED DATA
UNDER THE DELEGATION OF DATA OWNER.
GRANTED APPLICATIONS (GA)
WHO HAVE THE RIGHT TO ACCESS AND MANIPULATE STORED DATA . THESE
APPLICATIONS CAN BE EITHER INSIDE CLOUDS OR OUTSIDE CLOUDS ACCORDING
TO THE SPECIFIC REQUIREMENTS.
SYSTEM DESIGN
CONCLUTION
 One of the most often used methods is keyword-based
search. Users may pick which files they want to retrieve using
this keyword search method, which has been widely utilised in
plaintext search scenarios. Unfortunately, owing to data
encryption, normal plaintext search methods for encrypted
cloud data fail, limiting users' ability to do keyword searches
and necessitating the protection of keyword privacy. Rank
search substantially improves system usability by matching files
in a ranked order based on given relevancy criteria.
THANKYOU…

You might also like