0% found this document useful (0 votes)
8 views

Index

Uploaded by

csindirareddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Index

Uploaded by

csindirareddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

A

Project Report
On
Dynamic Group-Oriented Provable Data Possession in the Cloud
Submitted In partial fulfillment of the Requirements
for the award of the degree of
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
Submitted by
C.Indira(TL) (20BG1A0514)
C.Sai Kumari(20BG1A0513)
S.Nikitha(20BG1A0553)
B.Naga Jyothi (20BG1A0504)
L.Anusha (20BG1A0535)
M.Supriya(17BG1A0523)

Under the Guidance of


Mrs. J.KALYANI MCA
Assistant Professor, Dept of CSE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SRI VENKATESWARA INSTITUTE OF SCIENCE AND
TECHNOLOGY
TADIGOTALA (V),YSR KADAPADISTRICT, AP- 516003
Jawaharlal Nehru Technological University, Ananthapur ,AP ,India

2020-24

SRI VENKATESWARA INSTITUTE OF SCIENCE


AND TECHNOLOGY

BONAFIDECERTIFICATE

Certified that this project report” Dynamic Group-Oriented Provable Data


Possession in the Cloud” is the bonafide work done by “C.Indira (TL), B.Naga
Jyothi,S.Nikitha,M.Supriya,L.Anusha,C.Sai Kumari”, who carried out the project under
my guidance during the year 2020-24, towards partial fulfillment of the requirements of
the Degree of Bachelor of Technology in Computer Science & Engineering from
Jawaharlal Nehru Technological University, Anantapur. The results embodied in this
report have not been submitted to any other University for the award of any degree.

Mrs.J.Kalyani (MCA) HEAD OF THE DEPARTMENT


Assistant Professor,Dept of cse
ACKNOWLEDGMENT
At every outset I express my gratitude to almighty lord for
showering his grace and blessings upon me to complete this project.
Although our name appears on the cover of this book, many people
had contributed in some form or the other form to this project
Development. We could not done this project without the assistance or
support of each of the following we thank you all.
We wish to place on my record my deep sense of gratitude to my
project guide,Mrs.J.Kalyani MCA, Assistant Professor,DEPT of CSE
for her constant motivation and valuable help through the project work.
Express our gratitude to Dr.S.Jaffar Hussain, Ph.D of Sri
Venkateswara Institute of Science and Technology .
Express our gratitude to Dr.G.Venkata Suresh Babu, M.Tech
,Ph.D., Principal of Sri Venkateswara Institute of Science and
Technology for his valuable suggestions and advices throughout the
B.Tech course. We also extend m our thanks to other faculties for their
cooperation during our course.
Express our gratitude to Er.R. Sai Sharan Reddy, Chairman of
Sri Venkateswara Institute of Science and Technology.
Express our gratitude to all the faculties and Dept of CSE for their
co operation to complete this project.

PLACE : KADAPA 20BG1A0514-C.Indira(TL)


20BG1A0513-C.Sai Kumari
DATE: 20BG1A0553-S.Nikitha
20BG1A0504-B.Naga Jyothi
20BG1A0535-L.Anusha
17BG1A0523-M.Supriya
ABSTRACT

ABSTRACT
As an important security property of cloud storage, data integrity has not been
sufficiently studied under the multi writer model, where a group of users work on
shared files collaboratively and any group member can update the data by
modification, insertion, and deletion operations. Existing works under such multi-
writer model would bring large storage cost to the third-party verifiers. Furthermore,
to the best of our knowledge, none of the existing works for shared files supports fully
dynamic operations, which implies that users cannot freely perform the update
operations.In this paper, we propose the first public auditing scheme for shared data
that supports fully dynamic operations and achieves constant storage cost for the
verifiers. Our scheme, named Prays, is boosted by a new paradigm for remote data
integrity checking. To implement the new paradigm, we proposed a specially
designed authenticated structure, called blockless Merkle tree, and a novel
cryptographic primitive, called permission-based signature. Extensive evaluation
demonstrates that prays is as efficient as the existing less-functional solutions. We
believe that prays is an important step towards designing practical multi writer cloud
storage systems.
TABLE OF CONTENTS
S.NO CHAPTER NAME PAGE NO

1 INTRODUCTION 1

2 LITERATURE 5
SURVEY

3 SYSTEM ANALYSIS 8

3.1 EXISTING SYSTEM 8

3.2 PROPOSED SYSTEM 8

3.3 FEASABILITY 9
STUDY
3.4 MODULES 10

4 H/W AND S/W 11


REQUIRMENT
SPECIFICATIONS

4.1 HARDWARE 11
REQUIRMENTS

4,2 SOFTWARE 11
REQUIREMENTS
5 SYSTEM DESIGN 12

5.1 INTRODUCTION 12

5.2 SYSTEM DESIGN 12


ASPECTS
5.3 UML DIAGRAMS 15

5.3.1 USECASE DIAGRAM 23

5.3.2 CLASS DIAGRAMS 24

5.3.3 SEQUENCE 25
DIAGRAMS

5.3.4 ACTIVITY 26
DIAGRAM

6 IMPLEMENTATION 27
6.1 TECHNOLOGY 27
USED

7 SOURCE CODE 37

8 TESTING 51

8.1 INTRODUCTION 51

8.2 TYPES OF TESTS 51

9 SCREENS 56

10 CONCLUSION 70

11 FUTURE 71
ENHANCEMENT
12 BIBLIOGRAPHY 72
INTRODUCTION
LITERATURE SURVEY
SYSTEM ANALYSIS
HARDWARE AND SOFTWARE
REQUIRMENT SPECIFICATIONS
SYSTEM DESIGN
IMPLEMENTATION
SOURCE CODE
TESTING
SCREENS
CONCLUSION
FUTURE ENHANCEMENTS
BIBLIOGRAPHY

You might also like