Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar(96608205043) C.Karthik(96608205022) H.Sheik mohideen(96608205046) S.Lakshmi rajan(96608205023)

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
Distributed Data Processing
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Operating System Security
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 1 – Introduction
Managing Data Resources
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Chapter 1 Introduction to Databases
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Database Systems: Design, Implementation, and Management Ninth Edition
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
 Introduction to Operating System Introduction to Operating System  Types Of An Operating System Types Of An Operating System  Single User Single User.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Privacy-Preserving Public Auditing for Secure Cloud Storage
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
m-Privacy for Collaborative Data Publishing
Optimal Client-Server Assignment for Internet Distributed Systems.
Identity-Based Secure Distributed Data Storage Schemes.
Incentive Compatible Privacy-Preserving Data Analysis.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
Speaker: Meng-Ting Tsai Date:2010/11/16 Toward Publicly Auditable Secure Cloud Data Storage Services Cong Wang and Kui Ren..etc IEEE Communications Society.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
Anomaly Detection via Online Over-Sampling Principal Component Analysis.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
Privacy-Enhanced Web Service Composition. Abstract Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources.
Privacy-Preserving and Content-Protecting Location Based Queries.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Load Rebalancing for Distributed File Systems in Clouds.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Prepared by K.Phani Kumar.  Introduction:  This project is aimed at developing a system by which the employees in the organization submit the bills.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
UNIVERSITY MANAGEMENT SYSTEM
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
BY S.S.SUDHEER VARMA (13NT1D5816)
File-System Management
Chapter 6: Securing the Cloud
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Department Of Computer Science Engineering
Cloud Testing Shilpi Chugh.
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
An Introduction to Computer Networking
Practice Management & Patient Health Record sharing system
Presentation transcript:

Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( ) Guided By Ms.M.Kalai Selvi (Asst. Prof. I T )

Introduction of Cloud Computing: Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This brings about many new security challenges,. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud.. Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public Auditability or dynamic data operations, this paper achieves both.

ABSTRACT  Cloud computing is a internet based computing which enables sharing of services. Many users place their data in the cloud, so correctness of data and security is a prime concern.  Our work is ensuring the integrity and security of data storage in cloud computing  To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the data stored in the cloud  To ensure security, the data block is signed before sending to the cloud

ExistingSystem: 1.Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. 2.Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance.

Disadvantages of Existing System: These techniques, while can be useful to ensure the storage correctness without having users possessing data, cannot address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As an complementary approach, researchers have also proposed distributed protocols A for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited.

Proposed system we start with some basic solution aiming to provide integrity assurance of the cloud data TCP protocol which support public auditability and data dynamics To effectively support public auditability without having to retrieve the data blocks themselves. We restore to the homomorphic authenticator technique. our scheme achieves the storage correctness insurance as well as data error localization: whenever data corruption has been detected during the storage correctness verification, Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

Advantages of Proposed system: 1. Unlike most prior works for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 2. our scheme can almost guarantee the simultaneous localization of data errors

Cloud Data Storage Architecture

MODULES: Client: an entity, which has large data files to be stored in the cloud and relies on the cloud for data maintenance and computation, can be either individual consumers or organizations. Cloud Storage Server (CSS): an entity, which is managed by Cloud Service Provider (CSP), has significant storage space and computation resource to maintain the clients data. Third Party Auditor: an entity, which has expertise and capabilities that clients do not have, is trusted to assess and expose risk of cloud storage services on behalf of the clients upon request.

System Requirement Specification SOFTWARE : OPERATING SYSTEM: Windows xp PLATFORM:Dot Net DATABASE: SQL Server 2005, Protocol: TCP HARDWARE : Processor: Pentium-IV, Speed: 2.2 GHZ, RAM: 2GB, HDD: 80 GB

Thank You