SlideShare a Scribd company logo
Privacy Preserving Public Auditing for Data
Storage Security in Cloud

Under the guidance of
M.Mohana Deepthi
Presented by :
R.V.Girish Chandra
Y.Tejaswi
G.Rama Devi
Ch.Alekhya
Contents


Abstract



Existing System
Proposed System
Required Software
Required Hardware
Modules
Conclusion






ABSTRACT
Cloud computing is a Internet based computing which enables
sharing of services. Using Cloud Storage, users can remotely store
their data and enjoy the on-demand high quality applications and
services from a shared pool of configurable computing resources.
Security in cloud is achieved by signing the data block before sending
to the cloud. Moreover, users should be able to just use the cloud
storage as if it is local, without worrying about the need to verify its
integrity. Thus, enabling public auditability for cloud storage is of
critical importance so that users can resort to a Third Party Auditor
(TPA) to check the integrity of outsourced data.
Existing System
In the Existing System, Cloud Computing brings new and challenging
security threats towards user’s outsourced data. First of all, although the
infrastructures under the cloud are much more powerful and reliable than
personal computing devices, they are still facing the broad range of both
internal and external threats for data integrity. Secondly, for the benefits of
their own, there do exist various motivations for Cloud Service Providers to
behave unfaithfully towards the cloud users regarding the status of their
outsourced data.
Proposed System


In the proposed system, we use the technique of providing more security by
using the Third Party Auditor (TPA) .



The TPA allows the user to know the information about the data stored in
the cloud.



When anyone tries to modify or steal the data TPA informs the user by
verifying the data.



The TPA doesn’t even allows the CSP to read the data of the user.
Required Software


Server side Technology

:

AWT and Swings



Client Side Technology

:

HTML, Javascript



Database

:

MySQL
Required Hardware


Pentium 4 processor



1 GB RAM



80 GB Hard Disk Space
MODULES


Client



TPA (Third Party Auditor)



Cloud Storage Server (CSS)
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Conclusion


To ensure cloud data storage security, it is critical to enable a
TPA to evaluate the service quality from an objective and
independent perspective. Public auditability also allows clients to
delegate the integrity verification tasks to TPA while they
themselves can be unreliable or not be able tocommit necessary
computation resources performing continuous verifications.
Another major concern is how to construct verification protocols
that can accommodate dynamic data files. In this paper, we
explored the problem of providing simultaneous public
auditability and datadynamics for remote data integrity check in
Cloud Computing
Queries
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt

More Related Content

PPTX
Unsupervised learning (clustering)
PPT
K mean-clustering algorithm
PPTX
Timestamp protocols
PPT
Hidden markov model ppt
PPTX
Distributed database management system
PPTX
Information retrieval 7 boolean model
PPTX
Eco friendly products
PPTX
Chapter 4 Classification
Unsupervised learning (clustering)
K mean-clustering algorithm
Timestamp protocols
Hidden markov model ppt
Distributed database management system
Information retrieval 7 boolean model
Eco friendly products
Chapter 4 Classification

What's hot (20)

PPTX
Transaction states PPT
PPT
3.2 partitioning methods
PPT
Multimedia Database
PPT
4.file service architecture
PPTX
Data mining tasks
PDF
Multimedia Information Retrieval
PPSX
Frequent itemset mining methods
PPTX
Waste management From trash to treasures.
PPTX
Data Wrangling
ODP
Music Recommendation Tutorial
PPTX
Term weighting
PPTX
Design Issues of Distributed System (1).pptx
PPTX
How e mail works
PDF
Fault tolerance
ODP
Machine Learning with Decision trees
PPTX
Movie recommendation Engine using Artificial Intelligence
PPTX
File Transfer Protocol
PPTX
Classification and Regression
PDF
Linear Regression
PPT
Distributed document based system
Transaction states PPT
3.2 partitioning methods
Multimedia Database
4.file service architecture
Data mining tasks
Multimedia Information Retrieval
Frequent itemset mining methods
Waste management From trash to treasures.
Data Wrangling
Music Recommendation Tutorial
Term weighting
Design Issues of Distributed System (1).pptx
How e mail works
Fault tolerance
Machine Learning with Decision trees
Movie recommendation Engine using Artificial Intelligence
File Transfer Protocol
Classification and Regression
Linear Regression
Distributed document based system
Ad

Viewers also liked (20)

PPT
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPT
Privacy preserving public auditing for secure cloud storage
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Oruta ppt
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PPTX
Data security in cloud computing
PDF
Oruta project report
PDF
Privacy preserving public auditing for regenerating code based cloud storage
PPTX
Cloud security ppt
PPT
Privacy preserving public auditing for regenerating-code-based
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Cloud Computing Security
PDF
Privacy preserving public auditing for secure cloud storage
PPTX
Privacy preserving public auditing
PPTX
Cloud computing security issues and challenges
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
PPT
Cloud computing simple ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta ppt
Oruta privacy preserving public auditing for shared data in the cloud
Data security in cloud computing
Oruta project report
Privacy preserving public auditing for regenerating code based cloud storage
Cloud security ppt
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based cloud storage
Cloud Computing Security
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing
Cloud computing security issues and challenges
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Cloud computing simple ppt
Ad

Similar to Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt (20)

PDF
Privacy preserving external auditing for data storage security in cloud
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PDF
50120140507005 2
PDF
50120140507005
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PPTX
211880_Litterature Review.pptx
PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
PDF
To Improve Data Storage Security Levels in the Cloud
PDF
Iaetsd storage privacy protection against data
PDF
Privacy preserving public auditing for data storage security in cloud comp
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
L04302088092
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
DOCX
Privacy preserving public auditing for secure cloud storage
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for
Privacy preserving external auditing for data storage security in cloud
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
50120140507005 2
50120140507005
Third Party Public Auditing Scheme for Security in Cloud Storage
211880_Litterature Review.pptx
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
To Improve Data Storage Security Levels in the Cloud
Iaetsd storage privacy protection against data
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for secure cloud storage
L04302088092
Preserving Privacy Policy- Preserving public auditing for data in the cloud
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars

Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt

  • 1. Privacy Preserving Public Auditing for Data Storage Security in Cloud Under the guidance of M.Mohana Deepthi Presented by : R.V.Girish Chandra Y.Tejaswi G.Rama Devi Ch.Alekhya
  • 2. Contents  Abstract  Existing System Proposed System Required Software Required Hardware Modules Conclusion     
  • 3. ABSTRACT Cloud computing is a Internet based computing which enables sharing of services. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. Security in cloud is achieved by signing the data block before sending to the cloud. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a Third Party Auditor (TPA) to check the integrity of outsourced data.
  • 4. Existing System In the Existing System, Cloud Computing brings new and challenging security threats towards user’s outsourced data. First of all, although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity. Secondly, for the benefits of their own, there do exist various motivations for Cloud Service Providers to behave unfaithfully towards the cloud users regarding the status of their outsourced data.
  • 5. Proposed System  In the proposed system, we use the technique of providing more security by using the Third Party Auditor (TPA) .  The TPA allows the user to know the information about the data stored in the cloud.  When anyone tries to modify or steal the data TPA informs the user by verifying the data.  The TPA doesn’t even allows the CSP to read the data of the user.
  • 6. Required Software  Server side Technology : AWT and Swings  Client Side Technology : HTML, Javascript  Database : MySQL
  • 7. Required Hardware  Pentium 4 processor  1 GB RAM  80 GB Hard Disk Space
  • 8. MODULES  Client  TPA (Third Party Auditor)  Cloud Storage Server (CSS)
  • 36. Conclusion  To ensure cloud data storage security, it is critical to enable a TPA to evaluate the service quality from an objective and independent perspective. Public auditability also allows clients to delegate the integrity verification tasks to TPA while they themselves can be unreliable or not be able tocommit necessary computation resources performing continuous verifications. Another major concern is how to construct verification protocols that can accommodate dynamic data files. In this paper, we explored the problem of providing simultaneous public auditability and datadynamics for remote data integrity check in Cloud Computing