Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

1 Vendor Invoicing MyFloridaMarketPlace supports electronic invoice reconciliation within Ariba Buyer (purchase order, receipt, and invoice are needed.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
User Registration. Click on ‘Sign Up’ button. Enter Registration details and click on submit button.
For new coming user, you need to request account before log-in to the system by 1. Go to 2. Click “Register”
Powered by : Multiicon USER GUIDE 1.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
WELCOME TO. Click on Products Click Online Product=> Tax Professional.
CONTENTS  ABSTRACT  INTRODUCTION  HARDWARE & SOFTWARE REQUIREMENTS  PROBLEM ANALYSIS  MODULES DESCRIPTION  TABLE DESIGN  ER DIAGRAM  SCREEN SHOTS.
MKCL’s (ERA)Online Examination Software Installation & User Guide For use by Yashwantrao Chavan Maharashtra Open University (YCMOU)
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
Under the Guidance of: Mr S.Karthikeyan.MCA..  The project is entitled as “ SMS Based Student Information System” created by using Visual Basic.  Flexible.
Company/Product Overview. You have lots of files all over the place.
CONNECTION SETTINGS FOR USE WITH THE MOTION COMPUTING MODEL-F5 TABLET COMPUTER AKA: SIMON October 8, 2011 (And other useful information.)
ABSTRACT Before the evolution of computers, all the details in a banking systems used to be maintained manually. This is not advisable because maintenance.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
Webos Submitted by Rafeek. INTRODUCTION The term "WEBOS" has been used to describe a browser-based application that provides a desktop-like environment.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
VASP PREPAYMENT SYSTEM Training Module for CLIENTS.
Tutorial 10 Adding Spry Elements and Database Functionality Dreamweaver CS3 Tutorial 101.
Internal Guide: Prof S M Narayana By: Meghana(1MS07CS049) Padmavathi T(1MS07CS057) Priyanka A L(1MS07CS069) Sandeep Kumar B(1MS07CS082)
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Skype Presentation By: B. Hardman Image used from
Bonrix SMPP Client. Index Introduction Software and Hardware Requirements Architecture Set Up Installation HTTP API Features Screen-shots.
Credit Union National Association Installing and Uploading Project Zip Code.
Otasuke GP-EX! Chapter 11 GP-Viewer EX
Safe Access File Exchange (SAFE). Safe Access File Exchange  The SAFEFTP application seeks to provide a means to distribute UNCLASSIFIED files as an.
Identity-Based Secure Distributed Data Storage Schemes.
MOBILITY BILL DEFRAYMENT
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B Exercise on “How to register to centralized.
Present :Arezoo Mollahasani. Step 1  Define your server connection Open MySQL WorkBench and click New Server Instance on the right of the window.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Using the Supplier Portal Updated September 12, 2011 Using the Supplier Portal.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Privacy Preserving Delegated Access Control in Public Clouds.
How to create a forum account on the Serbia FC forum
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
INTERNAL GUIDE: T.BENERJI BY: CH MAHESH KUMAR 07D31A1237 B.CHANDRAKANTH 07D31A1209 CH.GOWTHAM 07D31A1217 ARUN KUMAR MISHRA 07D31A1205 M.Tech( Ph.D )
Creating Web Page Forms COE 201- Computer Proficiency.
Visa Processing Information System
Communicable Disease Press any Key to get into Application.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Presented By: Kasey Campbell John Geer.  Hermes Company Transfer will allow the passing of files, large or small, between companies.  All files are.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
Presented By Shrikant Ravindra Kamble MCA 3 rd year.
UNIVERSITY MANAGEMENT SYSTEM
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
Presentation on Online Shopping
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
Copyright © SkyeyTech, Inc. CRMdesk Power and elegance.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
BY S.S.SUDHEER VARMA (13NT1D5816)
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
Department Of Computer Science Engineering
Registration of Arcot Soft Token in Client Connection
SEEM4570 Tutorial 07: Filezilla and PHP
Practice Management & Patient Health Record sharing system
Presentation transcript:

Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A

The main technical contribution is that the proxy re- encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding.

General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Storing data in a third party’s cloud system causes serious concern on data confidentiality.

There are three problems in the above straightforward integration of encryption and encoding. First, the user has to do most computation and the communication traffic between the user and storage servers is high. Second, the user has to manage his cryptographic keys.

We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back.

By using the threshold proxy re-encryption scheme, we present a secure cloud storage system that provides secure data storage and secure data forwarding functionality in a decentralized structure.

Processor- Pentium –III Speed- 1.1 Ghz RAM- 256 MB(min) Hard Disk- 20 GB Floppy Drive MB Key Board- Standard Windows Mouse- Two or Three Button Mouse Monitor- SVGA

Operating System: Windows XP Application Server: Tomcat5.0/6.X Front End: HTML, Java, JSP Script: JavaScript. Server side Script: Java Server Pages. Database: MYSQL

Construction of Cloud Data Storage Module Data Encryption Module Data Forwarding Module Data Retrieval Module

In Admin Module the admin can login to give his username and password. Then the server setup method can be opened. In server setup process the admin first set the remote servers IP-address for send that IP-address to the receiver. Then the server can skip the process to activate or Deactivate the process. For activating the process the storage server can display the IP-address. For deactivating the process the storage server cannot display the IP- address. These details can be viewed by clicking the key server. The activated IP-addresses are stored in available storage server. By clicking the available storage server button we can view the currently available IP-addresses.

In cloud login module the user can login his own details. If the user cannot have the account for that cloud system first the user can register his details for using and entering into the cloud system. The Registration process details are Username, , password, confirm password, date of birth, gender and also the location. After entering the registration process the details can be stored in database of the cloud system. Then the user has to login to give his corrected username and password the code has to be send his/her . Then the user will go to open his account and view the code that can be generated from the cloud system.

In forward module first we can see the storage details for the uploaded files. When click the storage details option we can see the file name, question, answer, folder name, forward value (true or false), forward . If the forward column display the forwarded value is true the user cannot forward to another person. If the forward column display the forwarded value is false the user can forward the file into another person. In file forward processes contains the selected file name, address of the forwarder and enter the code to the forwarder. Now, another user can check his account properly and view the code forwarded from the previous user. Then the current user has login to the cloud system and to check the receive details. In receive details the forwarded file is present then the user will go to the download process.

In Download module contains the following details. There are username and file name. First, the server process can be run which means the server can be connected with its particular client. Now, the client has to download the file to download the file key. In file key downloading process the fields are username, filename, question, answer and the code. Now clicking the download option the client can view the encrypted key. Then using that key the client can view the file and use that file appropriately.

User name: ravi Password: ravi

Hsiao-Ying Lin, and Wen-Guey Tzeng, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 6, JUNE 2012.

THANK YOU