Protecting cloud data via dynamic security using network coding
Protecting cloud data via dynamic security using network coding
BATCH: 2021-2025
MINI PROJECT-TITLE:
BATCH-06
TEAM MEMBERS:
21841A05A4:K.SIDDHARDHA
21841A0563:A.SAIRAM
21841A0588:B.VENU
UNDER THE GUIDANCE OF:
Mr. NARESH (ASSISTANT PROFESSOR)
CONTENTS:
ABSTRACT
INTRODUCTION
EXISTING SYSTEM
DISADVANTAGES
PROPOSED SYSTEM
ADVANTAGES
SYSTEM REQUIREMENT
LITERATURE SURVEY
ABSTRACT:
Propose to use secure network coding techniques
to construct efficient and secure cloud storage protocols for
dynamic data, which can be updated, deleted, or
appended by the user
In this two protocols, DSCS I and DSCS II,
which are based on different secure network coding schemes
and have different properties and applications
To provide formal security proofs and prototype
implementations for their protocols, and show that they have
better performance than existing solutions.
INTRODUCTION:
Cloud computing allows clients to delegate computation and data storage to cloud
servers.
Secure cloud storage protocols provide a mechanism to detect if the server stores the
client's data untampered.
Secure network coding (SNC) protocols use cryptographic techniques to prevent these
attacks.
This work investigates the problem of constructing a secure cloud storage protocol for
dynamic data (DSCS) from a different perspective.
.
EXISTING SYSTEM:
To explore the possibility of using secure network coding (SNC) techniques to construct a
secure cloud storage protocol for dynamic data (DSCS), which can handle updates, deletions,
and modifications of outsourced data.
To build on the previous work of Chen et al. , who showed a connection between secure
cloud storage and secure network coding for static data, but did not address the dynamic case.
To focus on the scenario where the client’s data are stored on a single server, rather than
distributed across multiple servers, which is a different goal from most network coding based
storage systems.
Disadvantages :
A client having a smart phone with a low-performance processor or limited storage cannot
accomplish heavy computation or store large volume of data. Under such circumstances, she
can delegate her computation/storage to the cloud server.
For static data, the client cannot change her data after the initial outsourcing (e.g.,
backup/archival data)
PROPOSED SYSTEM:
Explore the possibility of providing a generic construction of a DSCS protocol from any
SNC protocol and discuss the challenges for a generic construction in details
We present two protocols, DSCS I and DSCS II, which are based on different SNC schemes
and have different properties and applications. DSCS I is a generic protocol that supports
arbitrary dynamic data, while DSCS II is a specialized protocol for append-only data.
To provide formal security definitions and proofs for both protocols, and show that they are
secure in the standard model, without relying on the random oracle model.
Advantages :
Secure network coding (SNC) protocols use cryptographic techniques to prevent these
attacks: the sender authenticates each packet by attaching a small tag to it.
We look at the problem of constructing a secure cloud storage protocol for dynamic data
(DSCS) from a different perspective. We investigate whether we can construct an efficient
DSCS protocol using an SNC protocol.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
Processor : 1GHz or faster CPU or System on a Chip (SoC) with two or
more cores
RAM : 4GB
Hard drive : 64GB or larger.
System firmware : UEFI, Secure Boot capable.
TPM : Trusted Platform Module (TPM) version 2.0.
SOFTWARE REQUIREMENTS:
3.Cloud Server
1.Data Owner :
The data owner is the module that uploads and views the files securely on the cloud server, after
registering and getting authorized by the cloud server.
The TPA is the module that generates the auditing task for the users who request to access the files
securely on the cloud server, after logging in directly with the application.
3.Cloud Server :
The cloud server is the module that operates the project and performs various operations, such as
user activation, owner activation, search permission, top-k keyword and similarity analysis, after
logging in.
CONCLUSION :
This work proposes a secure cloud storage protocol for dynamic data (DSCS I)
based on a secure network coding (SNC) protocol, the first SNC-based DSCS
protocol with public verifiability.