Sunteți pe pagina 1din 6

Identity-Based Proxy-Oriented Data Uploading and

Remote Data Integrity Checking in Public Cloud

A Project report submitted In fulfillment of the requirements for the Award of the
Degree of

MASTER OF COMPUTER APPLICATION


Submitted By

APPAPURAM SUBHANI Reg No: 14AH1F0003


Under The Esteemed Guidance of

U. BABU, M.C.A
Assoc. Professor

DEPARTMENT OF COMPUTER APPLICATION

AMARA INSTITUTE OF ENGINEERING AND TECHNOLOGY


(Approved by AICTE-New Delhi & Affiliated to JNTU Kakinada)
Satulur-522549, Narasaraopet, Guntur District
AMARA INSTITUTE OF ENGINEERING AND TECHNOLOGY
(Approved by AICTE-New Delhi & Affiliated to JNTU Kakinada)
Satulur-522549, Narasaraopet, Guntur District

DEPARTMENT OF MASTER OF COMPUTER APPLICATION

CERTIFICATE
This is to certify that this Project work entitled Identity-Based Proxy-Oriented Data
Uploading and Remote Data Integrity Checking in Public Cloud that is being submitted
by APPAPURAM SUBHANI Reg No:(14AH1F0003) in Partial fulfillment of
the requirements for the award of the degree of the MASTER OF COMPUTER
APPLICATIONS in MASTER OF COMPUTER APPLICATIONS is a record of bonafied
work carried out under the Guidance and Supervision during the Academic Year 2016-2017 and
found worthy of Acceptance to Requirements of the JAWAHARLALNEHRU
TECHNOLOGICAL UNIVERSITY, KAKINADA.

PROJECT GUIDE HEAD OF THE DEPARTMENT


U. BABU, Asst. Prof U.BABU, Assoc. Prof

EXTERNAL EXAMINER
ACKNOWLEDGEMENT
We wish to express my thanks to various personalities who are responsible. The
Completion of the project. We are extremely thankful to our Chairman Sri AMARA
VENKTESWARAO, who took keen interest on us in every effort throughout this course. We
owe out Gratitude to our principal Dr. M. ROJA RANI for his kind attention and valuable
guidance throughout the course.

We express my deep felt gratitude to MR U.BABU, HOD of MCA Dept. and coordinator
of the project for his encouragement. Their proud knowledge and Willingness have been a source
of inspiration for me through out of this project work.

We extend my sincere thanks to our guide MR U.BABU, Assoc. Prof, whose valuable
guidance and unstinting encouragement enabled us to accomplish our project successfully in
time.

We affectionately acknowledge the encouragement received from our friends and in


giving those who involved valuable suggestions and clarifying out doubts which had really
helped us in successfully completing our project.
ABSTRACT

More and more clients would like to store their data to PCS (public cloud servers) along with
the rapid development of cloud computing. New security problems have to be solved in
order to help more clients process their data in public cloud. When the client is restricted to
access PCS, he will delegate its proxy to process his data and upload them. On the other
hand, remote data integrity checking is also an important security problem in public cloud
storage. It makes the clients check whether their outsourced data is kept intact without
downloading the whole data. From the security problems, we propose a novel proxy-oriented
data uploading and remote data integrity checking model in identity-based public key
cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data
integrity checking in public cloud). We give the formal definition, system model and
security model. Then, a concrete ID-PUIC protocol is designed by using the bilinear
pairings. The proposed ID-PUIC protocol is provably secure based on the hardness of CDH
(computational Diffie-Hellman) problem. Our ID-PUIC protocol is also efficient and
flexible. Based on the original clients authorization, the proposed ID-PUIC protocol can
realize private remote data integrity checking, delegated remote data integrity checking and
public remote data integrity checking.
CONTENTS

NAME PAGE

1. INTRODUCTION 1
2. SYSTEM ANALYSIS 3
2.1 INTRODUCTION
2.2 STUDY OF THE SYSTEM
2.3 HARDWARE AND SOFTWARE SPECIFICATIONS
2.4 PROPOSED SYSTEM
2.5 FUNCTIONAL REQUIREMENTS
2.6 PROCESS MODEL
3. FEASIBILITY REPORT 13
3.1 TECHNICAL FEASIBILITY
3.2 OPERATIONAL FEASIBILITY
3.3 ECONOMICAL FEASIBILITY
4. SOFTWARE REQUIREMENTS 15
4.1 FUNCTIONAL REQUIREMENTS
4.2 PERFORMANCE REQUIREMENTS
5. LITERATURE SURVEY 21
5.1 INTRODUCTION
5.2 C# .NET
6. SYSTEM DESIGN 38
6.1 NORMALIZATION
6.2 E-R DIAGRAMS
6.3 DATA FLOW DIAGRAMS
6.4 UML DIAGRAMS
7. SYSTEM TESTING 67
7.1 INTRODUCTION
7.2 SECURITY SOFTWARE
8. CODING 69
8.1 STRATEGIC APPROACH
8.2 SAMPLE CODE
9. SCREENSHOTS 95
10. CONCLUSION 100
11. REFERENCE 101

S-ar putea să vă placă și