ensurinddatasecurityincloudcoputing 130824115443 phpapp02 (1)

12
PROJECT PRESENTATION Department of ISE, SKSVMACET, LAXMESHWER

Upload: soumya-sambit

Post on 19-Aug-2015

215 views

Category:

Documents


0 download

DESCRIPTION

Cloud computing moves the application software and databases to the large data centers, where the data security is not trustworthy. Hence it leads to many new security challenges.

TRANSCRIPT

PROJECT PRESENTATIONDepartment of ISE,SKSVMACET,LAXMESHWERENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING`WHAT IS CLOUD COMPUTING?Key to the defination of co!d comp!tin" i# the $co!d% it#ef& here co!d i# the ar"e "ro!p of interconnected comp!ter#The#e comp!ter# can 'e per#ona or net(or) #er*er#&The co!d of comp!ter# e+tend 'eyond a #in"e company or entity& The appication and data #er*ed 'y co!d are a*aia'e to 'roader "ro!p of !#er#, cro## enterpri#e,and cro## patform&Acce## i# *ia internet& any a!thori,ed !#er can acce## the#e doc!ment#, appication from any comp!ter o*er the internet& Cloud computing moves the application software and databases to the large data centers, where the data security is not trustworthy. Hence it leads to many new security challenges. By utilizing the homomorphic token with distributed verifcation of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identifcation of misbehaving server. he new schemesupports secure and e!cient dynamic operations on data blocks, including" data update, delete and append. #$tensive security and performance analysis shows that the proposed scheme is highly e!cient as we restrict some %& address and even authenticate the e$isting users to avoidmalicious data modifcation attack.INTRODUCTIONLITERATURE SURVEYEXISTING SYSTEM:DISADVANTAGES: 'rom the perspective of data security, which has always been an important aspect of (uality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.1. Firstly,traditionalcryptographicprimitivesforthepurposeofdatasecurity protectioncannotbedirectlyadoptedduetotheuserslosscontrolofdata under Cloud Computing. 2. Secondly, Cloud Computing is not just a third party data warehouse. The data storedinthecloudmaybefreuentlyupdatedbytheusers,including insertion, deletion, modification, appending, reordering, etc. PROPOSED SYSTEM: we propose an e)ective and *e$ible distributed scheme with e$plicit dynamic data support to ensure the correctness of users+ data in the cloud. ,e rely on erasure correcting code in the fle distribution preparation to provide redundancies and guarantee the data dependability. hisreduces the communication and storage overhead as compared to the traditional replication-based fle distribution techni(ues.ADVANTAGES:-.Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error.../nlike most prior works for ensuring remote data integrity, the new scheme supports secure and e!cient dynamic operations on data blocks, including" update, delete and append.0.#$tensive security and performance analysis shows that the proposed scheme is highly e!cient and resilient against Byzantine failure, malicious data modifcation attack, and even server colluding attacks.REQUIREMENTS256 MB RAM.40 MB Hard Disk SpaceEthernet card with an Internet or Internet zero.SOFTWARE REQUIREMENTS:! Operating system:Windows XP.! Coding Language : JAVA,Swing,R!,J"me#Wire$ess%oo$&it"HARDWARE REQUIREMENTS:Main Modules Client 1odule 2ystem 1odule Cloud data storage 1odule Cloud 3uthentication 2erver /nauthorized data modifcationand corruptionmodule 3dversary 1odule

%1&4#1#53%65CONCLUSIONCo!d comp!tin" pro*ide# a #!percomp!tin" po(er& i&e it e+tend# 'eyond a #in"e company or enterpri#e& To en#!re the correctne## of !#er#- data in co!d data #tora"e, (e propo#ed an effecti*e and fe+i'e di#tri'!ted #cheme (ith e+picit dynamic data #!pport, inc!din" 'oc)!pdate, deete, and append&We 'eie*e that data #tora"e #ec!rity in Co!d Comp!tin", an area f! of chaen"e#&THANKYOU