To get this project's source code, synopsis, video, documentation and ppt,
Mail Us at:
info@ocularsystems.in
or
Visit Us:
http://blog.ocularsystems.in/blog
Mail Us at:
info@ocularsystems.in
or
Visit Us:
http://blog.ocularsystems.in/blog
ABSTRACT
Cloud computing has been envisioned as
the next-generation architecture of IT enterprise. In contrast to
traditional solutions, where the IT services are under proper physical,
logical and personnel controls, cloud computing moves the application
software and databases to the large data centers, where the management
of the data and services may not be fully trustworthy. This unique
attribute, however, poses many new security challenges which have not
been well understood. In this article, we focus on cloud data storage
security, which has always been an important aspect of quality of
service. To ensure the correctness of users’ data in the cloud, we
propose an effective and flexible distributed scheme with two salient
features, opposing to its predecessors. By utilizing the homo-morphic
token with distributed verification of erasure-coded data, our scheme
achieves the integration of storage correctness insurance and data error
localization, i.e., the identification of misbehaving server (s).
Unlike most prior works, the new scheme further supports secure and
efficient dynamic operations on data blocks, including: data update,
delete and append. Extensive security and performance analysis shows
that the proposed scheme is highly efficient and resilient against
Byzantine failure, malicious data modification attack, and even server
colluding attacks.
System Architecture:
Existing System:
From the perspective of data security,
which has always been an important aspect of quality of service, Cloud
Computing inevitably poses new challenging security threats for number
of reasons.
1 . Firstly, traditional cryptographic
primitives for the purpose of data security protection can not be
directly adopted due to the users’ loss control of data under Cloud
Computing. Therefore, verification of correct data storage in the cloud
must be conducted without explicit knowledge of the whole data.
Considering various kinds of data for each user stored in the cloud and
the demand of long term continuous assurance of their data safety, the
problem of verifying correctness of data storage in the cloud becomes
even more challenging.
2 . Secondly, Cloud Computing is not
just a third party data warehouse. The data stored in the cloud may be
frequently updated by the users, including insertion, deletion,
modification, appending, reordering, etc. To ensure storage correctness
under dynamic data update is hence of paramount importance.
These techniques, while can be useful to
ensure the storage correctness without having users possessing data,
can not address all the security threats in cloud data storage, since
they are all focusing on single server scenario and most of them do not
consider dynamic data operations. As an complementary approach,
researchers have also proposed distributed protocols for ensuring
storage correctness across multiple servers or peers. Again, none of
these distributed schemes is aware of dynamic data operations. As a
result, their applicability in cloud data storage can be drastically
limited.
Proposed System:
In this paper, we propose an effective
and flexible distributed scheme with explicit dynamic data support to
ensure the correctness of users’ data in the cloud. We rely on erasure
correcting code in the file distribution preparation to provide
redundancies and guarantee the data dependability. This construction
drastically reduces the communication and storage overhead as compared
to the traditional replication-based file distribution techniques. By
utilizing the homo-morphic token with distributed verification of
erasure-coded data, our scheme achieves the storage correctness
insurance as well as data error localization: whenever data corruption
has been detected during the storage correctness verification, our
scheme can almost guarantee the simultaneous localization of data
errors, i.e., the identification of the misbehaving server(s).
1. Compared to many of its predecessors,
which only provide binary results about the storage state across the
distributed servers, the challenge-response protocol in our work further
provides the localization of data error.
2. Unlike most prior works for ensuring
remote data integrity, the new scheme supports secure and efficient
dynamic operations on data blocks, including: update, delete and append.
3. Extensive security and performance
analysis shows that the proposed scheme is highly efficient and
resilient against Byzantine failure, malicious data modification attack,
and even server colluding attacks.
System Requirements:
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
Software Requirements:
• Operating system : – Windows XP.
• Coding Language : -JAVA,Swing,RMI,J2me(WirelessToolkit)
• Tool Used : – Eclipse 3.3
hii sir i want this cloud computing project how can i get this.
ReplyDelete@Lavish Jain:
ReplyDeleteJust mail us on info@ocularsystems.in