SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Oruta: Privacy-Preserving Public 
Auditing 
for Shared Data in the Cloud 
Abstract: 
With cloud storage services, it is commonplace for data to 
be not only stored in the cloud, but also shared across multiple users. 
However, public auditing for such shared data— while preserving 
identity privacy — remains to be an open challenge. In this paper, we 
propose the first privacy-preserving mechanism that allows public 
auditing on shared data stored in the cloud. In particular, we exploit 
ring signatures to compute the verification information needed to audit 
the integrity of shared data. With our mechanism, the identity of the 
signer on each block in shared data is kept private from a third party 
auditor (TPA), who is still able to verify the integrity of shared data 
without retrieving the entire file. Our experimental results demonstrate 
the effectiveness and efficiency of our proposed mechanism when 
auditing shared data. 
Existing System: 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
The first provable data possession (PDP) mechanism 
[2] to perform public auditing is designed to check the correctness of 
data stored in an un trusted server, without retrieving the entire data. 
Moving a step forward, Wang et al. [3] (referred to as WWRL in this 
paper) is designed to construct a public auditing mechanism for cloud 
data, so that during public auditing, the content of private data 
belonging to a personal user is not disclosed to the third party auditor. 
Disadvantage: 
Data is not in an encrypted format. 
Proposed System: 
In this paper, we only consider how to audit the 
integrity of shared data in the cloud with static groups. It means the 
group is pre-defined before shared data is created in the cloud and the 
membership of users in the group is not changed during data sharing. 
The original user is responsible for deciding who is able to share her 
data before outsourcing data to the cloud. Another interesting problem 
is how to audit the integrity of shared data in the cloud with dynamic 
groups — a new user can be added into the group and an existing 
group member can be revoked during data sharing — while still 
preserving identity privacy. 
Advantage: 
Here we proposed the secured system and data owner can 
decide whether the user can access the system or not. 
PROBLEM STATEMENT:
In our model, privacy is accomplished by 
allowing the parties to upload their data in multi clouds and data is split 
into multiple parts so it gives more protection 
Scope: 
We are going to raise the privacy level of the data owner and 
the confidentiality of the data in a better way through the multiple 
cloud environment. 
Architecture: 
Modules : 
1. Owner 
2. Third Party Auditor
3. User 
4. Data Sharing 
Modules Description 
OwnerRegistration: 
In this module an owner has to upload its files in a 
cloud server, he/she should register first. Then only he/she can be able 
to do it. For that he needs to fill the details in the registration form. 
These details are maintained in a database. 
Owner Login: 
In this module,any of the above mentioned 
person have to login,they should login by giving their emailid and 
password . 
User Registration: 
In this module if a user wants to access the data 
which is stored in a cloud,he/she should register their details first. 
These details are maintained in a Database.
User Login: 
If the user is an authorized user,he/she can download the 
file by using file id which has been stored by data owner when it was 
uploading. 
ThirdPartyAuditor Registration: 
In this module , if a third party auditor 
TPA(maintainer of clouds) wants to do some cloud offer , they should 
register first. Here we are doing like, this system allows only three cloud 
service providers. 
ThirdPartyAuditor Login: 
After third party auditor gets logged in, He/ 
She can see how many data owners have uploaded their files into the 
cloud. Here we are providing three tpa for maintaining three different 
clouds. 
Data Sharing: 
we only consider how to audit the integrity of shared 
data in the cloud with static groups. It means the group is pre-defined 
before shared data is created in the cloud and the membership of users 
in the group is not changed during data sharing. The original user is 
responsible for deciding who is able to share her data before 
outsourcing data to the cloud. Another interesting problem is how to 
audit the integrity of shared data in the cloud with dynamic groups — a 
new user can be added into the group and an existing group member
can be revoked during data sharing — while still preserving identity 
privacy. 
Proposed System: 
To enable the TPA efficiently and securely verify 
shared data for a group of users, Oruta should be designed to achieve 
following properties: (1) Public Auditing: The third party auditor is able 
to verify the integrity of shared data for a group of users without 
retrieving the entire data. (2) Correctness:The third party auditor is 
able to correctly detect whether there is any corrupted block in shared 
data. (3) Unforgeability: Only a user in the group can generate valid 
verification information on shared data. (4) Identity Privacy: During 
auditing, the TPA cannot distinguish the identity of the signer on each 
block in shared data. 
System Configuration:- 
H/W System Configuration:- 
Processor - Pentium –III 
Speed - 1.1 GHz 
RAM - 256 MB (min) 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : My sql 
 Database Connectivity : JDBC. 
Literature survey: 
Literature survey is the most important step in 
software development process. Before developing the tool it is 
necessary to determine the time factor, economy n company strength. 
Once these things r satisfied, ten next steps are to determine which
operating system and language can be used for developing the tool. 
Once the programmers start building the tool the programmers need 
lot of external support. This support can be obtained from senior 
programmers, from book or from websites. Before building the system 
the above consideration are taken into account for developing the 
proposed system. 
Conclusion: 
In this paper, we propose Oruta, the first privacy-preserving 
public auditing mechanism for shared data in the cloud. 
With Oruta, the TPA is able to efficiently audit the integrity of shared 
data, yet cannot distinguish who is the signer on each block, which can 
preserve identity privacy for users. An interesting problem in our future 
work is how to efficiently audit the integrity of shared data with 
dynamic groups while still preserving the identity of the signer on each 
block from the third party auditor.

More Related Content

DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
DOC
Oruta privacy preserving public auditing
PPTX
secure multi-owner data sharing for dynamic groups
DOCX
A secure anti collusion data sharing scheme for dynamic groups in the cloud
DOCX
panda public auditing for shared data with efficient user revocation in the c...
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Oruta privacy preserving public auditing for shared data in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Oruta privacy preserving public auditing
secure multi-owner data sharing for dynamic groups
A secure anti collusion data sharing scheme for dynamic groups in the cloud
panda public auditing for shared data with efficient user revocation in the c...

What's hot (18)

PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Oruta privacy preserving public auditing for shared data in the cloud1
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PPTX
Mona final review
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PPTX
Shared aythority ppt design [autosaved]
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
A cloud storage system for sharing data securely with privacy preservation an...
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Panda public auditing for shared data with efficient user revocation in the c...
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud1
Mona secure multi owner data sharing for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Mona final review
Mona secure multi owner data sharing for dynamic groups in the cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
Shared authority based privacy preserving authentication protocol in cloud co...
Shared aythority ppt design [autosaved]
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
A cloud storage system for sharing data securely with privacy preservation an...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Ad

Viewers also liked (9)

DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Fair scheduling in cellular systems in the...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Qos aware geographic opportunistic routing...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
IEEE 2014 JAVA NETWORKING PROJECTS Fair scheduling in cellular systems in the...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA NETWORKING PROJECTS Qos aware geographic opportunistic routing...
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
Ad

Similar to IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public auditing for shared data in the cloud (20)

PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
ORUTA BASE PAPER
PDF
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Maintaining Data Integrity for Shared Data in Cloud
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
IJSRED-V2I5P16
PDF
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
PDF
IRJET - Virtual Data Auditing at Overcast Environment
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
ORUTA BASE PAPER
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Maintaining Data Integrity for Shared Data in Cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Panda public auditing for shared data with efficient user revocation in the c...
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Secure Authorised De-duplication using Convergent Encryption Technique
Mona secure multi owner data sharing for dynamic groups in the cloud
IJSRED-V2I5P16
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
IRJET - Virtual Data Auditing at Overcast Environment
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM

More from IEEEGLOBALSOFTSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
Well-logging-methods_new................
PDF
Digital Logic Computer Design lecture notes
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
web development for engineering and engineering
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PPT on Performance Review to get promotions
PDF
composite construction of structures.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx
Well-logging-methods_new................
Digital Logic Computer Design lecture notes
OOP with Java - Java Introduction (Basics)
web development for engineering and engineering
Structs to JSON How Go Powers REST APIs.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
UNIT 4 Total Quality Management .pptx
PPT on Performance Review to get promotions
composite construction of structures.pdf

IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public auditing for shared data in the cloud

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Abstract: With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data. Existing System: IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. The first provable data possession (PDP) mechanism [2] to perform public auditing is designed to check the correctness of data stored in an un trusted server, without retrieving the entire data. Moving a step forward, Wang et al. [3] (referred to as WWRL in this paper) is designed to construct a public auditing mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user is not disclosed to the third party auditor. Disadvantage: Data is not in an encrypted format. Proposed System: In this paper, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Advantage: Here we proposed the secured system and data owner can decide whether the user can access the system or not. PROBLEM STATEMENT:
  • 3. In our model, privacy is accomplished by allowing the parties to upload their data in multi clouds and data is split into multiple parts so it gives more protection Scope: We are going to raise the privacy level of the data owner and the confidentiality of the data in a better way through the multiple cloud environment. Architecture: Modules : 1. Owner 2. Third Party Auditor
  • 4. 3. User 4. Data Sharing Modules Description OwnerRegistration: In this module an owner has to upload its files in a cloud server, he/she should register first. Then only he/she can be able to do it. For that he needs to fill the details in the registration form. These details are maintained in a database. Owner Login: In this module,any of the above mentioned person have to login,they should login by giving their emailid and password . User Registration: In this module if a user wants to access the data which is stored in a cloud,he/she should register their details first. These details are maintained in a Database.
  • 5. User Login: If the user is an authorized user,he/she can download the file by using file id which has been stored by data owner when it was uploading. ThirdPartyAuditor Registration: In this module , if a third party auditor TPA(maintainer of clouds) wants to do some cloud offer , they should register first. Here we are doing like, this system allows only three cloud service providers. ThirdPartyAuditor Login: After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. Here we are providing three tpa for maintaining three different clouds. Data Sharing: we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member
  • 6. can be revoked during data sharing — while still preserving identity privacy. Proposed System: To enable the TPA efficiently and securely verify shared data for a group of users, Oruta should be designed to achieve following properties: (1) Public Auditing: The third party auditor is able to verify the integrity of shared data for a group of users without retrieving the entire data. (2) Correctness:The third party auditor is able to correctly detect whether there is any corrupted block in shared data. (3) Unforgeability: Only a user in the group can generate valid verification information on shared data. (4) Identity Privacy: During auditing, the TPA cannot distinguish the identity of the signer on each block in shared data. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 GHz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB
  • 7. Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : My sql  Database Connectivity : JDBC. Literature survey: Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which
  • 8. operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Conclusion: In this paper, we propose Oruta, the first privacy-preserving public auditing mechanism for shared data in the cloud. With Oruta, the TPA is able to efficiently audit the integrity of shared data, yet cannot distinguish who is the signer on each block, which can preserve identity privacy for users. An interesting problem in our future work is how to efficiently audit the integrity of shared data with dynamic groups while still preserving the identity of the signer on each block from the third party auditor.