SlideShare a Scribd company logo
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD Abstract: With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data. Existing System: The first provable data possession (PDP) mechanism [2] to perform public auditing is designed to check the correctness of data stored in an un trusted server, without retrieving the entire data. Moving a step forward, Wang et al. [3] (referred to as WWRL in this paper) is designed to construct a public auditing mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user is not disclosed to the third party auditor. Disadvantage: Data is not in an encrypted format. Proposed System: In this paper, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Advantage: Here we proposed the secured system and data owner can decide whether the user can access the system or not. PROBLEM STATEMENT: In our model, privacy is accomplished by allowing the parties to upload their data in multi clouds and data is split into multiple parts so it gives more protection Scope: We are going to raise the privacy level of the data owner and the confidentiality of the data in a better way through the multiple cloud environment. Architecture:
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
Modules : 
1. Owner 
2. Third Party Auditor 
3. User 
4. Data Sharing 
Modules Description OwnerRegistration: In this module an owner has to upload its files in a cloud server, he/she should register first. Then only he/she can be able to do it. For that he needs to fill the details in the registration form. These details are maintained in a database. Owner Login: In this module,any of the above mentioned person have to login,they should login by giving their emailid and password . User Registration: In this module if a user wants to access the data which is stored in a cloud,he/she should register their details first. These details are maintained in a Database. User Login: If the user is an authorized user,he/she can download the file by using file id which has been stored by data owner when it was uploading. ThirdPartyAuditor Registration: In this module , if a third party auditor TPA(maintainer of clouds) wants to do some cloud offer , they should register first. Here we are doing like, this system allows only three cloud service providers. ThirdPartyAuditor Login:
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. Here we are providing three tpa for maintaining three different clouds. Data Sharing: we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Proposed System: To enable the TPA efficiently and securely verify shared data for a group of users, Oruta should be designed to achieve following properties: (1) Public Auditing: The third party auditor is able to verify the integrity of shared data for a group of users without retrieving the entire data. (2) Correctness:The third party auditor is able to correctly detect whether there is any corrupted block in shared data. (3) Unforgeability: Only a user in the group can generate valid verification information on shared data. (4) Identity Privacy: During auditing, the TPA cannot distinguish the identity of the signer on each block in shared data. 
System Configuration:- 
H/W System Configuration:- 
Processor - Pentium –III 
Speed - 1.1 GHz RAM - 256 MB (min) Hard Disk - 20 GB
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : My sql 
 Database Connectivity : JDBC. 
Literature survey: 
Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
Conclusion: In this paper, we propose Oruta, the first privacy-preserving public auditing mechanism for shared data in the cloud. With Oruta, the TPA is able to efficiently audit the integrity of shared data, yet cannot distinguish who is the signer on each block, which can preserve identity privacy for users. An interesting problem in our future work is how to efficiently audit the integrity of shared data with dynamic groups while still preserving the identity of the signer on each block from the third party auditor.

More Related Content

DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
PDF
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PPTX
secure multi-owner data sharing for dynamic groups
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
A Survey on Privacy in Social Networking Websites
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
Shared authority based privacy preserving authentication protocol in cloud co...
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
secure multi-owner data sharing for dynamic groups
A cloud storage system for sharing data securely with privacy preservation an...
A Survey on Privacy in Social Networking Websites

What's hot (18)

DOCX
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PPTX
Shared aythority ppt design [autosaved]
PPTX
Mona final review
PDF
Privacy preserving and obscure delicate data with collaborative tagging
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PDF
IRJET - Improving Password System using Blockchain
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Cloud assisted mobile-access of health data with privacy and auditability
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Shared authority based privacy preserving authentication protocol in cloud co...
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shared aythority ppt design [autosaved]
Mona final review
Privacy preserving and obscure delicate data with collaborative tagging
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Mona secure multi owner data sharing for dynamic groups in the cloud
Shared authority based privacy preserving authentication protocol in cloud co...
Mona secure multi owner data sharing for dynamic groups in the cloud
Shared authority based privacy preserving authentication protocol in cloud co...
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IRJET - Improving Password System using Blockchain
Shared authority based privacy preserving authentication protocol in cloud co...
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Ad

Viewers also liked (8)

DOC
Press - WWRL Drivetime Dialog Weekly Guest Press Release
PPTX
Oruta ppt
PDF
Oruta project report
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPT
PPTX
Cloud security and security architecture
PPTX
Data security in cloud computing
Press - WWRL Drivetime Dialog Weekly Guest Press Release
Oruta ppt
Oruta project report
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Cloud security and security architecture
Data security in cloud computing
Ad

Similar to Oruta privacy preserving public auditing for shared data in the cloud1 (20)

DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOC
Oruta privacy preserving public auditing for shared data in the cloud
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Maintaining Data Integrity for Shared Data in Cloud
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
DOCX
A hybrid cloud approach for secure authorized deduplication
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
ORUTA BASE PAPER
DOCX
panda public auditing for shared data with efficient user revocation in the c...
PDF
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
Oruta privacy preserving public auditing for shared data in the cloud
Shared authority based privacy preserving authentication protocol in cloud co...
Oruta privacy preserving public auditing for shared data in the cloud
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Maintaining Data Integrity for Shared Data in Cloud
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
A hybrid cloud approach for secure authorized deduplication
Public integrity auditing for shared dynamic cloud data with group user revoc...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
ORUTA BASE PAPER
panda public auditing for shared data with efficient user revocation in the c...
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Pre independence Education in Inndia.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pre independence Education in Inndia.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
01-Introduction-to-Information-Management.pdf
PPH.pptx obstetrics and gynecology in nursing
Cell Types and Its function , kingdom of life

Oruta privacy preserving public auditing for shared data in the cloud1

  • 1. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD Abstract: With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data. Existing System: The first provable data possession (PDP) mechanism [2] to perform public auditing is designed to check the correctness of data stored in an un trusted server, without retrieving the entire data. Moving a step forward, Wang et al. [3] (referred to as WWRL in this paper) is designed to construct a public auditing mechanism for cloud data, so that during public auditing, the content of private data belonging to a personal user is not disclosed to the third party auditor. Disadvantage: Data is not in an encrypted format. Proposed System: In this paper, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the
  • 2. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Advantage: Here we proposed the secured system and data owner can decide whether the user can access the system or not. PROBLEM STATEMENT: In our model, privacy is accomplished by allowing the parties to upload their data in multi clouds and data is split into multiple parts so it gives more protection Scope: We are going to raise the privacy level of the data owner and the confidentiality of the data in a better way through the multiple cloud environment. Architecture:
  • 3. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 Modules : 1. Owner 2. Third Party Auditor 3. User 4. Data Sharing Modules Description OwnerRegistration: In this module an owner has to upload its files in a cloud server, he/she should register first. Then only he/she can be able to do it. For that he needs to fill the details in the registration form. These details are maintained in a database. Owner Login: In this module,any of the above mentioned person have to login,they should login by giving their emailid and password . User Registration: In this module if a user wants to access the data which is stored in a cloud,he/she should register their details first. These details are maintained in a Database. User Login: If the user is an authorized user,he/she can download the file by using file id which has been stored by data owner when it was uploading. ThirdPartyAuditor Registration: In this module , if a third party auditor TPA(maintainer of clouds) wants to do some cloud offer , they should register first. Here we are doing like, this system allows only three cloud service providers. ThirdPartyAuditor Login:
  • 4. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. Here we are providing three tpa for maintaining three different clouds. Data Sharing: we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. Proposed System: To enable the TPA efficiently and securely verify shared data for a group of users, Oruta should be designed to achieve following properties: (1) Public Auditing: The third party auditor is able to verify the integrity of shared data for a group of users without retrieving the entire data. (2) Correctness:The third party auditor is able to correctly detect whether there is any corrupted block in shared data. (3) Unforgeability: Only a user in the group can generate valid verification information on shared data. (4) Identity Privacy: During auditing, the TPA cannot distinguish the identity of the signer on each block in shared data. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 GHz RAM - 256 MB (min) Hard Disk - 20 GB
  • 5. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : My sql  Database Connectivity : JDBC. Literature survey: Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system.
  • 6. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 Conclusion: In this paper, we propose Oruta, the first privacy-preserving public auditing mechanism for shared data in the cloud. With Oruta, the TPA is able to efficiently audit the integrity of shared data, yet cannot distinguish who is the signer on each block, which can preserve identity privacy for users. An interesting problem in our future work is how to efficiently audit the integrity of shared data with dynamic groups while still preserving the identity of the signer on each block from the third party auditor.