Sunteți pe pagina 1din 6

Introduction

Remote data integrity checking is a crucial technology

in cloud computing. Existing protocols can support both features with the help of a third party auditor. In this paper, we adapt to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers.

Existing System
In existing system, the clients store the data in server

that server is trustworthy and after the third party auditor can audit the client files. So, the third party auditor can stolen the files.

Disadvantages of Existing System


Existing protocols can support both features with the

help of a third party auditor.

Proposed System
We propose a remote data integrity checking protocol

for cloud storage. The proposed protocol inherits the support of data dynamics, and supports public verifiability and privacy against third-party verifiers, while at the same time it doesnt need to use a thirdparty auditor. We give a security analysis of the proposed protocol, which shows that it is secure against the un-trusted server and private against third party verifiers.

Advantages
The client stores their data in the server without

keeping a local copy. It is of critical importance that the client should be able to verify the integrity of the data stored in the remote Un-trusted server.

System Requirements

Hardware Requirements:

Processor Hard Disk Ram

: Intel Processor above than 3.0 Ghz : 20 GB. : 1 GB

Software Requirements:

Operating system .NET Framework Reporting Tool Other Application

: Windows XP SP2 or Higher : 3.5 Or Higher : Crystal Reports XI Or Higher : Adobe Acrobat Reader, M S Excel.

S-ar putea să vă placă și