Security and Privacy Preserving in Cloud Computing
Security and Privacy Preserving in Cloud Computing
Security and Privacy Preserving in Cloud Computing
COMPUTING
ABSTRACT
TPA eliminates the involvement of the client through the auditing of whether his data
stored in the cloud is indeed intact, which can be important in achieving economies
of scale for Cloud Computing.
The trust based cloud depends on both cloud users as well as TPA. If any changes
appear in the content of the remote file the intimation will be immediately posted to
the file owner without any delay.
1) TPA should be able to efficiently audit the cloud data storage without demanding
the local copy of data, and introduce no additional on-line burden to the cloud user;
2) The third party auditing process should bring in no new vulnerabilities towards
user data privacy.
DISADVANTAGES
No user data privacy
To ensure the correctness of users’ data in the cloud, we propose an effective and
flexible distributed scheme with two salient features, opposing to its predecessors.
Unlike most prior works, the new scheme further supports secure and efficient
dynamic operations on data blocks, including: data update, delete and append.
ADVANTAGES
We utilize the public key based homomorphic authenticator and
uniquely integrate it with random mask technique to achieve a
privacy-preserving public auditing system for cloud data storage
security while keeping all above requirements in mind.
Yes No
User Exists
No
Yes
K ey Generation
Up load Files
Download Files
This problem tries to obtain and verify a proof that the data that
is stored by a user at remote data storage in the cloud (called
cloud storage archives or simply archives) is not modified by the
archive and thereby the integrity of the data is assured. Cloud
archive is not cheating the owner, if cheating, in this context,
means that the storage archive might delete some of the data or
may modify some of the data. While developing proofs for data
possession at untrusted cloud storage servers we are often limited
by the resources at the cloud server as well as at the client.
SENTINELS
Hardware Requirements
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 Mb
Monitor : 15 VGA Colour
Mouse : Logitech
Ram : 512 Mb
Software Requirements
Operating system : Windows XP
Technology Used : Microsoft Visual Studio Coding
Language : ASP.NET
Data Base : Microsoft SQL Server
CONCLUSION
Seeing the popularity of outsourcing archival storage to the
cloud, it is desirable to enable clients to verify the integrity of
their data in the cloud.