Index
Index
Project Report
On
Dynamic Group-Oriented Provable Data Possession in the Cloud
Submitted In partial fulfillment of the Requirements
for the award of the degree of
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
Submitted by
C.Indira(TL) (20BG1A0514)
C.Sai Kumari(20BG1A0513)
S.Nikitha(20BG1A0553)
B.Naga Jyothi (20BG1A0504)
L.Anusha (20BG1A0535)
M.Supriya(17BG1A0523)
2020-24
BONAFIDECERTIFICATE
ABSTRACT
As an important security property of cloud storage, data integrity has not been
sufficiently studied under the multi writer model, where a group of users work on
shared files collaboratively and any group member can update the data by
modification, insertion, and deletion operations. Existing works under such multi-
writer model would bring large storage cost to the third-party verifiers. Furthermore,
to the best of our knowledge, none of the existing works for shared files supports fully
dynamic operations, which implies that users cannot freely perform the update
operations.In this paper, we propose the first public auditing scheme for shared data
that supports fully dynamic operations and achieves constant storage cost for the
verifiers. Our scheme, named Prays, is boosted by a new paradigm for remote data
integrity checking. To implement the new paradigm, we proposed a specially
designed authenticated structure, called blockless Merkle tree, and a novel
cryptographic primitive, called permission-based signature. Extensive evaluation
demonstrates that prays is as efficient as the existing less-functional solutions. We
believe that prays is an important step towards designing practical multi writer cloud
storage systems.
TABLE OF CONTENTS
S.NO CHAPTER NAME PAGE NO
1 INTRODUCTION 1
2 LITERATURE 5
SURVEY
3 SYSTEM ANALYSIS 8
3.3 FEASABILITY 9
STUDY
3.4 MODULES 10
4.1 HARDWARE 11
REQUIRMENTS
4,2 SOFTWARE 11
REQUIREMENTS
5 SYSTEM DESIGN 12
5.1 INTRODUCTION 12
5.3.3 SEQUENCE 25
DIAGRAMS
5.3.4 ACTIVITY 26
DIAGRAM
6 IMPLEMENTATION 27
6.1 TECHNOLOGY 27
USED
7 SOURCE CODE 37
8 TESTING 51
8.1 INTRODUCTION 51
9 SCREENS 56
10 CONCLUSION 70
11 FUTURE 71
ENHANCEMENT
12 BIBLIOGRAPHY 72
INTRODUCTION
LITERATURE SURVEY
SYSTEM ANALYSIS
HARDWARE AND SOFTWARE
REQUIRMENT SPECIFICATIONS
SYSTEM DESIGN
IMPLEMENTATION
SOURCE CODE
TESTING
SCREENS
CONCLUSION
FUTURE ENHANCEMENTS
BIBLIOGRAPHY