Sunteți pe pagina 1din 3

Novel Efficient Remote Data Possession Checking Protocol

in Cloud Storage.

ABSTRACT:

In this project , As an important application in cloud computing, cloud storage offers user
scalable, flexible and high quality data storage and computation services. A growing number of
data owners choose to outsource data files to the cloud. Because cloud storage servers are not
fully trustworthy, data owners need dependable means to check the possession for their files
outsourced to remote cloud servers. To address this crucial problem, some remote data
possession checking (RDPC) protocols have been presented. But many existing schemes have
vulnerabilities in efficiency or data dynamics. In this project , we provide a new efficient RDPC
protocol based on homomorphic hash function. The new scheme is provably secure against
forgery attack, replace attack and replay attack based on a typical security model. To support
data dynamics, an operation record table (ORT) is introduced to track operations on file blocks.
We further give a new optimized implementation for the ORT which makes the cost of accessing
ORT nearly constant. Moreover, we make the comprehensive performance analysis which shows
that our scheme has advantages in computation and communication costs. Prototype
implementation and experiments exhibit that the scheme is feasible for real applications.

EXISTING SYSTEM

Cloud computing has been envisioned as the de-facto solution to the rising storage
costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at
which data is being generated it proves costly for enterprises or individual users to frequently
update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also
helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers,
which are remotely located, on which user does not have any control. However, this unique
feature of the cloud poses many new security challenges which need to be clearly understood and
resolved. We provide a scheme which gives a proof of data integrity in the cloud which the
customer can employ to check the correctness of his data in the cloud. This proof can be agreed
upon by both the cloud and the customer and can be incorporated in the Service level agreement
(SLA).

PROPOSED SYSTEM

In this project , we investigate the cloud storage system including two participants: CSS and data
owner. Cloud storage moves the user’s data to large data centers, which are remotely located, on
which user does not have any control. The CSS has powerful storage ability and computation
resources, it accepts the data owner's requests to store the outsourced data files and supplies
access service. Every File owner upload tag name and set private key and send to cloud . cloud
should generate proof for file to return for owner and owner verify this proof and modify this file
owner give primary file setting key Also request to clued to modify for file . Using our new data
structure, the data owner can perform insert, modify or delete operation on file blocks with high
efficiency cloud view owner request and action for based owner request. Return to result to
owner.

Fig 1: Work procedure of our RDPC protocol


SYSTEM REQUIREMENTS

Hardware Requirements:

Hardware - Pentium

Speed - 1.1 GHz

RAM - 1GB

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

Software Requirements:

Operating System : Windows

Technology : Java and J2EE

Web Technologies : Html, JavaScript, CSS

IDE : My Eclipse (mars 2.0)

Web Server : Tomcat 8.0

Database : My SQL

Java Version : jdk 1.8

S-ar putea să vă placă și