Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

PRIVACY PRESERVING PUBLIC-AUDITING FOR SECURE CLOUD STORAGE

No description
by

Anu Singh

on 7 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of PRIVACY PRESERVING PUBLIC-AUDITING FOR SECURE CLOUD STORAGE

At a Glance:
Introduction
Existing System
Proposed System
Modules
Design

System Requirements
Advantages
Future Enhancement
Conclusion
Reference

Introduction
"Cloud Computing"
Used to remotely store data and enjoy high quality applications and services from a shared pool of resources
aims to cut cost

Disadvantage: data may get corrupted as user submits his/her data to the cloud
Hence, enabling public auditing for secure cloud storage becomes very important
Auditing process shouldn't bring in new vulnerabilities to user data

PRIVACY PRESERVING PUBLIC-AUDITING FOR SECURE CLOUD STORAGE
Presented by:
Anu Singh(12113012)
Aparna S Menon(12113013)
Nisha T Radhakrishnan
(12113042)

Existing System
User data is prone to vulnerabilities
High chance of data corruption
Encryption and decryption
of data not present (also key generation)

PROPOSED SYSTEM

Proposal: a secure cloud storage system,supporting privacy preserving public auditing
Third Party Auditor: Performs audits for users
Makes use of efficient encryption and decryption algorithms (RSA algorithm)




PROPOSED SYSTEM..
An assymetric key is generated before the encryption process via an algorithm.
Digital Signatures are also generated via a Hashing Algorithm(SHA Algorithm)
This generates a digital signature that helps in preserving data integrity.

At a Glance..
Introduction..
Data Flow Diagram(DFD)
Level 0 DFD
LEVEL 1.0 Admin
Level 1 DFD
Data Flow Diagram (DFD)
LEVEL 0 DFD
LEVEL 1.0 DFD - ADMIN
LEVEL 1 .1 DFD -USER

LEVEL1.2 DFD-TPA
MODULES
1. ADMIN MODULE
2. User Module
SYSTEM SPECIFICATIONS
HARDWARE REQUIREMENTS
3.TPA MODULE
HASHING MODULE
ENCRYPTION AND DECRYPTION MODULE

1. VALIDATION MODULE
2. NOTIFICATION MODULE
SOFTWARE REQUIREMENTS
Processor - Pentium –III

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Operating System :Windows95/98/2000/XP

Application Server : Tomcat5.0/6.X

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Server side Script : Java Server Pages.

Database : Mysql
Database Connectivity : JDBC.

ADVANTAGES
High Security
Authentication
Integrity-Hashing
CONCLUSION
Proposed a privacy-preserving public auditing system for data storage security in Cloud Computing.

Guarantee that the TPA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process

Eliminates the burden of cloud from the tedious and possibly expensive auditing task


FUTURE SCOPE

Third party notification
-with time

Third party included within
the cloud with less
overhead.
REFERENCES
http://www.bangaloresunday.com/IEEE%202013%20Java%20Basepaper/Privacy-Preserving%20Public%20Auditing%20for%20Secure%20Cloud%20Storage.pdf
THANK YOU

Hardware Requirements
Software Requirements
Full transcript