SlideShare a Scribd company logo
Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud
Abstract:
With cloud storage services, it is commonplace for data to
be not only stored in the cloud, but also shared across multiple users.
However, public auditing for such shared data— while preserving
identity privacy — remains to be an open challenge. In this paper, we
propose the first privacy-preserving mechanism that allows public
auditing on shared data stored in the cloud. In particular, we exploit
ring signatures to compute the verification information needed to audit
the integrity of shared data. With our mechanism, the identity of the
signer on each block in shared data is kept private from a third party
auditor (TPA), who is still able to verify the integrity of shared data
without retrieving the entire file. Our experimental results demonstrate
the effectiveness and efficiency of our proposed mechanism when
auditing shared data.
Existing System:
The first provable data possession (PDP) mechanism
[2] to perform public auditing is designed to check the correctness of
data stored in an un trusted server, without retrieving the entire data.
Moving a step forward, Wang et al. [3] (referred to as WWRL in this
paper) is designed to construct a public auditing mechanism for cloud
data, so that during public auditing, the content of private data
belonging to a personal user is not disclosed to the third party auditor.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Disadvantage:
Data is not in an encrypted format.
Proposed System:
In this paper, we only consider how to audit the
integrity of shared data in the cloud with static groups. It means the
group is pre-defined before shared data is created in the cloud and the
membership of users in the group is not changed during data sharing.
The original user is responsible for deciding who is able to share her
data before outsourcing data to the cloud. Another interesting problem
is how to audit the integrity of shared data in the cloud with dynamic
groups — a new user can be added into the group and an existing
group member can be revoked during data sharing — while still
preserving identity privacy.
Advantage:
Here we proposed the secured system and data owner can
decide whether the user can access the system or not.
PROBLEM STATEMENT:
In our model, privacy is accomplished by
allowing the parties to upload their data in multi clouds and data is split
into multiple parts so it gives more protection
Scope:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
We are going to raise the privacy level of the data owner and
the confidentiality of the data in a better way through the multiple
cloud environment.
Architecture:
Modules :
1. Owner
2. Third Party Auditor
3. User
4. Data Sharing
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Modules Description
OwnerRegistration:
In this module an owner has to upload its files in a
cloud server, he/she should register first. Then only he/she can be able
to do it. For that he needs to fill the details in the registration form.
These details are maintained in a database.
Owner Login:
In this module,any of the above mentioned
person have to login,they should login by giving their emailid and
password .
User Registration:
In this module if a user wants to access the data
which is stored in a cloud,he/she should register their details first.
These details are maintained in a Database.
User Login:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
If the user is an authorized user,he/she can download the
file by using file id which has been stored by data owner when it was
uploading.
ThirdPartyAuditor Registration:
In this module , if a third party auditor
TPA(maintainer of clouds) wants to do some cloud offer , they should
register first. Here we are doing like, this system allows only three cloud
service providers.
ThirdPartyAuditor Login:
After third party auditor gets logged in, He/
She can see how many data owners have uploaded their files into the
cloud. Here we are providing three tpa for maintaining three different
clouds.
Data Sharing:
we only consider how to audit the integrity of shared
data in the cloud with static groups. It means the group is pre-defined
before shared data is created in the cloud and the membership of users
in the group is not changed during data sharing. The original user is
responsible for deciding who is able to share her data before
outsourcing data to the cloud. Another interesting problem is how to
audit the integrity of shared data in the cloud with dynamic groups — a
new user can be added into the group and an existing group member
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
can be revoked during data sharing — while still preserving identity
privacy.
Proposed System:
To enable the TPA efficiently and securely verify
shared data for a group of users, Oruta should be designed to achieve
following properties: (1) Public Auditing: The third party auditor is able
to verify the integrity of shared data for a group of users without
retrieving the entire data. (2) Correctness:The third party auditor is
able to correctly detect whether there is any corrupted block in shared
data. (3) Unforgeability: Only a user in the group can generate valid
verification information on shared data. (4) Identity Privacy: During
auditing, the TPA cannot distinguish the identity of the signer on each
block in shared data.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 GHz
RAM - 256 MB (min)
Hard Disk - 20 GB
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : My sql
 Database Connectivity : JDBC.
Literature survey:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Literature survey is the most important step in
software development process. Before developing the tool it is
necessary to determine the time factor, economy n company strength.
Once these things r satisfied, ten next steps are to determine which
operating system and language can be used for developing the tool.
Once the programmers start building the tool the programmers need
lot of external support. This support can be obtained from senior
programmers, from book or from websites. Before building the system
the above consideration are taken into account for developing the
proposed system.
Conclusion:
In this paper, we propose Oruta, the first privacy-
preserving public auditing mechanism for shared data in the cloud.
With Oruta, the TPA is able to efficiently audit the integrity of shared
data, yet cannot distinguish who is the signer on each block, which can
preserve identity privacy for users. An interesting problem in our future
work is how to efficiently audit the integrity of shared data with
dynamic groups while still preserving the identity of the signer on each
block from the third party auditor.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)

More Related Content

DOCX
Oruta privacy preserving public auditing for shared data in the cloud
DOC
Oruta privacy preserving public auditing
DOCX
Privacy preserving public auditing for secure cloud storage
PPTX
Privacy preserving public auditing
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Oruta ppt
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt

What's hot (20)

PPT
Privacy preserving public auditing for secure cloud storage
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PDF
Oruta project report
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
cloud computing preservity
PDF
Privacy preserving public auditing for regenerating code based cloud storage
DOC
Ensuring distributed accountability for data sharing in the cloud
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PPT
Privacy preserving public auditing for regenerating-code-based
PPTX
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PPT
DOCX
panda public auditing for shared data with efficient user revocation in the c...
PPTX
Ensuring Distributed Accountability in the Cloud
Privacy preserving public auditing for secure cloud storage
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Oruta project report
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
cloud computing preservity
Privacy preserving public auditing for regenerating code based cloud storage
Ensuring distributed accountability for data sharing in the cloud
Privacy preserving public auditing for regenerating-code-based cloud storage
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Ensuring Distributed Accountability for Data Sharing in the Cloud
Public integrity auditing for shared dynamic cloud data with group user revoc...
Privacy preserving public auditing for regenerating-code-based
Panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...
Ensuring Distributed Accountability in the Cloud
Ad

Viewers also liked (14)

DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
PPTX
Cloud security ppt
PPTX
Cloud computing security issues and challenges
PPTX
Cloud Computing Security
PDF
50120140503003 2
PPTX
Google's Driverless Car
DOCX
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
PPT
Image re ranking system
PPT
PPT FOR IDBSDDS SCHEMES
PPTX
Introduction to Elliptic Curve Cryptography
PDF
Elliptic Curve Cryptography for those who are afraid of maths
PPTX
The Evolution of Google's Rankings
PDF
Elliptic Curve Cryptography
PDF
Elliptic Curve Cryptography and Zero Knowledge Proof
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
Cloud security ppt
Cloud computing security issues and challenges
Cloud Computing Security
50120140503003 2
Google's Driverless Car
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
Image re ranking system
PPT FOR IDBSDDS SCHEMES
Introduction to Elliptic Curve Cryptography
Elliptic Curve Cryptography for those who are afraid of maths
The Evolution of Google's Rankings
Elliptic Curve Cryptography
Elliptic Curve Cryptography and Zero Knowledge Proof
Ad

Similar to Oruta privacy preserving public auditing for shared data in the cloud (20)

PDF
Oruta privacy preserving public auditing for shared data in the cloud1
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PPTX
Oruta phase1 ppt
PDF
ORUTA BASE PAPER
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
A Survey on Batch Auditing Systems for Cloud Storage
DOCX
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
PPTX
CS cybersecurity project requires pptx
PPTX
CSE-CYBERSECURITY project requires .pptx
DOCX
oruta privacy-preserving public auditing for shared data in the cloud
DOCX
Privacy preserving public auditing for secure cloud storage
Oruta privacy preserving public auditing for shared data in the cloud1
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Shared authority based privacy preserving authentication protocol in cloud co...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta phase1 ppt
ORUTA BASE PAPER
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
A Survey on Batch Auditing Systems for Cloud Storage
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
CS cybersecurity project requires pptx
CSE-CYBERSECURITY project requires .pptx
oruta privacy-preserving public auditing for shared data in the cloud
Privacy preserving public auditing for secure cloud storage

More from Adz91 Digital Ads Pvt Ltd (20)

DOCX
2016 ieee java .net project titles
PDF
Java project ideas topics for computer engineering students
DOCX
Dotnet 2015 2016 2017 ieee project list-with abstract
PDF
Adz91 business opportunity presentation
PPTX
Efficient instant fuzzy search with proximity ranking
PDF
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
DOC
Xs path navigation on xml schemas made easy
DOC
Supporting privacy protection in personalized web search
DOCX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
Secure outsourced attribute based signatures
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOCX
Preserving location privacy in geo social applications
DOC
Mining weakly labeled web facial images for search based face annotation
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
Efficient authentication for mobile and pervasive computing
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Decentralized access control of data stored in cloud using key policy attribu...
DOCX
Dealing with concept drifts in process mining
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
2016 ieee java .net project titles
Java project ideas topics for computer engineering students
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 business opportunity presentation
Efficient instant fuzzy search with proximity ranking
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Xs path navigation on xml schemas made easy
Supporting privacy protection in personalized web search
Securing broker less publish subscribe systems using identity-based encryption
Secure outsourced attribute based signatures
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Preserving location privacy in geo social applications
Mining weakly labeled web facial images for search based face annotation
Key aggregate cryptosystem for scalable data sharing in cloud storage
Efficient authentication for mobile and pervasive computing
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control of data stored in cloud using key policy attribu...
Dealing with concept drifts in process mining
Cloud assisted mobile-access of health data with privacy and auditability

Recently uploaded (20)

PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Trump Administration's workforce development strategy
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
IGGE1 Understanding the Self1234567891011
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Trump Administration's workforce development strategy
A powerpoint presentation on the Revised K-10 Science Shaping Paper
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
What if we spent less time fighting change, and more time building what’s rig...
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
History, Philosophy and sociology of education (1).pptx
Complications of Minimal Access Surgery at WLH
Digestion and Absorption of Carbohydrates, Proteina and Fats
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
IGGE1 Understanding the Self1234567891011
Practical Manual AGRO-233 Principles and Practices of Natural Farming
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Paper A Mock Exam 9_ Attempt review.pdf.

Oruta privacy preserving public auditing for shared data in the cloud

  • 1. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Abstract: With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data. Existing System: The first provable data possession (PDP) mechanism [2] to perform public auditing is designed to check the correctness of data stored in an un trusted server, without retrieving the entire data. Moving a step forward, Wang et al. [3] (referred to as WWRL in this paper) is designed to construct a public auditing mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user is not disclosed to the third party auditor. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 2. Disadvantage: Data is not in an encrypted format. Proposed System: In this paper, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Advantage: Here we proposed the secured system and data owner can decide whether the user can access the system or not. PROBLEM STATEMENT: In our model, privacy is accomplished by allowing the parties to upload their data in multi clouds and data is split into multiple parts so it gives more protection Scope: We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 3. We are going to raise the privacy level of the data owner and the confidentiality of the data in a better way through the multiple cloud environment. Architecture: Modules : 1. Owner 2. Third Party Auditor 3. User 4. Data Sharing We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 4. Modules Description OwnerRegistration: In this module an owner has to upload its files in a cloud server, he/she should register first. Then only he/she can be able to do it. For that he needs to fill the details in the registration form. These details are maintained in a database. Owner Login: In this module,any of the above mentioned person have to login,they should login by giving their emailid and password . User Registration: In this module if a user wants to access the data which is stored in a cloud,he/she should register their details first. These details are maintained in a Database. User Login: We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 5. If the user is an authorized user,he/she can download the file by using file id which has been stored by data owner when it was uploading. ThirdPartyAuditor Registration: In this module , if a third party auditor TPA(maintainer of clouds) wants to do some cloud offer , they should register first. Here we are doing like, this system allows only three cloud service providers. ThirdPartyAuditor Login: After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. Here we are providing three tpa for maintaining three different clouds. Data Sharing: we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 6. can be revoked during data sharing — while still preserving identity privacy. Proposed System: To enable the TPA efficiently and securely verify shared data for a group of users, Oruta should be designed to achieve following properties: (1) Public Auditing: The third party auditor is able to verify the integrity of shared data for a group of users without retrieving the entire data. (2) Correctness:The third party auditor is able to correctly detect whether there is any corrupted block in shared data. (3) Unforgeability: Only a user in the group can generate valid verification information on shared data. (4) Identity Privacy: During auditing, the TPA cannot distinguish the identity of the signer on each block in shared data. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 GHz RAM - 256 MB (min) Hard Disk - 20 GB We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 7. Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : My sql  Database Connectivity : JDBC. Literature survey: We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 8. Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Conclusion: In this paper, we propose Oruta, the first privacy- preserving public auditing mechanism for shared data in the cloud. With Oruta, the TPA is able to efficiently audit the integrity of shared data, yet cannot distinguish who is the signer on each block, which can preserve identity privacy for users. An interesting problem in our future work is how to efficiently audit the integrity of shared data with dynamic groups while still preserving the identity of the signer on each block from the third party auditor. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 9. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 10. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)