Sei sulla pagina 1di 4

1

INTRODUCTION
1.1 OBJECTIVE OF THE PROJECT

People can easily work together in a group by Sharing and storing the services in the
cloud. To protect the integrity of data in the cloud, number of mechanisms have been
proposed. In these mechanisms, a signature is attached to each block in data, and the integrity
of data relies on the correctness of all the signatures. One of the most significant and common
features of these mechanisms is to allow a Public Auditor to efficiently check data integrity in
the cloud without downloading the entire data, referred to as public auditing. This Public
Auditor could be a client who would like to utilize cloud data for particular purposes (e.g.,
search, computation, data mining, etc.) or Third Party Auditor(TPA) who is able to provide
verification services on data integrity to users. With shared data, once a user modifies a
block, that user also needs to compute a new signature for the modified block. Due to the
modifications from different users, different blocks are signed by different users.

The proposed mechanism allows a public Auditor to efficiently check the data integrity
in the cloud without downloading the entire data. This mechanism preserves the
confidentiality of the shared data by using the proxy re-signature mechanism. In this
mechanism the blocks which were previously assign to revoked user will be re-signed by the
existing user. For the security purpose secret key will be provided while login. Public
verification techniques allow the users to outsource their data into the cloud and consistency
of the data is checked by a trusted third party called auditor. Objective of the public
verification scheme is to avoid external adversary attacks on the data outsourced by the
owner.

SYSTEM ANALYSIS
2

2.1 EXISTING SYSTEM


 Regenerating codes are implemented to minimize repair traffic in the network.
 It does not reading and reconstructing the whole file during the repair time.
 It reads a set of chunks smaller than the original file from the other servers and
reconstructs only the lost contents.
 Functional minimum-storage regenerating (FMSR) codes allow the clients to
remotely verify the integrity of the data in server.
 The servers are only need to support standard read or write functionalities.
 It enables the integrity protection, fault tolerance, and efficient recovery for cloud
storage.
 MAC algorithm is used for check the data integrity.

2.1.1 DISADVANTAGES OF EXISTING SYSTEM


 The server cannot communicate with each other in case of status failure
 The system will result in high delay for selecting active server communication

2.2 PROPOSED SYSTEM


3

 The system uses Centralized TPA to analyze the status of each server in regular
interval
 The system provides selection of server in case of meta data download request
 The auditing system will index the files stored in the servers.

2.2.1 ADVANTAGES OF PROPOSED SYSTEM


 The delay will be very lower that the existing system.
 The proposed system will result higher accuracy of data selection.
 Also, the selection of server will be easily analyzed before download request will
improve the efficiency of the system.

SYSTEM SPECIFICATION
4

3.1 HARDWARE REQUIREMENTS

COMPONENT SPECIFICATION
CPU Intel Dual Core 2.4 GHz or Later
RAM 2GB DDR2
Hard Disk 160 GB
Display Wide VGA (Video Graphics Array)
Input Keyboard and Mouse

3.2 SOFTWARE REQUIREMENTS

COMPONENT SPECIFICATION
Front End JAVA
Back End MySQL (XAMPP)
IDE NETBEANS
Platform Windows 7 or later

Potrebbero piacerti anche