final review presentation
TRANSCRIPT
PLATFORM : JAVADOMAIN : CLOUD COMPUTING
Guided By : Mr.P.N.Renjith
TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING
PRESENTED BY
Rahid.A.K Naabih.C.S Manoj.K.S
ABSTRACT Enjoy the cloud applications without the burden of local
hardware and software management. Possess many security risks towards the correctness and
dependability of data in cloud. We propose in this paper a flexible distributed storage with very
lightweight communication and computation cost. It not only ensures strong cloud storage, but also achieves fast
data error localization. The proposed design further supports secure and efficient
dynamic operations on outsourced data. Analysis shows the proposed scheme is highly efficient and
resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
1Existing System and Limitations
Byzantine Error Occurrence.
Allocating a Third-party for Supervision.
No Integration of Database in Servers.
Pre-Requisition for Client manipulation
2Proposed System
The servers should be updated frequently.
An algorithm to find out the misbehaving servers.
Prior request should be made to the CSP for manipulation.
Allocating the an agent for Supervising.
Providing a unique token for each client within the cloud.
Handling the unknown user under supervision.
Algorithm’s used
3 Byzantine Fault Tolerance Algorithm
Token Pre-computation
Correctness Verification and Error Localization
Error recovery
Reed –Solomon Algorithm
INTRODUCTION
Here we introduce this cloud services through an online banking application
Compared to many of its predecessors which only provide binary results about the storage status across the distributed servers ,we propose this new system.
This new scheme further supports secure and efficient dynamic operation on Data block
Hence our system is highly efficient as we have provided the technology of token generation for secure login to avoid intruders
4
Module Description
1.User Login at Home
2.Client
3.Client Manipulation
4.Administrator Login as TPA
5.Admin Manipulation
5
Threats for the Database
As a Client
As a malicious Script
As an Intruder
All others via TPA
6
Technologies Used
Appointing a TPA for Supervision
Homomorphic Token Generation
Virtual Keyboard for avoiding an unauthorized user
Captcha Technology
7
Diagrams…………..
8
VALIDATION
REQUEST
RESPONSE
LOGIN
Use-case diagram for user login
MONITORING
Admin Client
Use-case diagram for client manipulation
9
LOGIN
MONEY TRANSFER
EDUCATION LOAN
VIEW STATUS
VEHICLE LOAN
Client <<Cloud database System>>
Dataflow diagram for user
Authentication of
user Account
Education Loan
Vehicle Loan Money Transfer
User information affect to database in the cloud. This section is keenly
monitoring by Auditor
Logout
User
10
Dataflow diagram for Admin
Authentication
Reference number
Generation
Choose user to retrieve monitored Data.
Result
Logout
Admin login
No
yes
yes
No
11
Activity diagram:
12
Start
Home
Client loginAdmin login
Client pageMoney TransferEducation Loan
Vehicle Loan
Admin page Monitoring Client data
End
CloudDatabase System
Yes Yes
No
13
Class diagram:
Sequence Diagram
14
ARCHITECTURE DIAGRAM
Third Party Auditor
AdminUser
Cloud Server
Data Auditing
Delegation
Issue File Access Credential
File Access
Public data auditing
15
Screenshots…………….
Application
16Microsoft APP’s
Google Docs
OFFICE 365
FINANCE
AMAZON web services
Conclusion
17In this Project, to achieve the assurance of cloud data integrity and availability and enforce the quality of Dependable cloud storage for the user’s.
We rely on the automated Homomorphic token generation for the cloud data security.
Also we have avoided the memory usage for each TPA allocated for each client by considering the admin himself as the TPA.
100%
18Project Status
System Requirements
Hardware Specification:Processor Type : Pentium IVSpeed : 2.4 GHZRam : 256 MB RAMHard disk : 20 GB HD
Software Specification:Operating System : XP, Windows 7Tool : Eclipse IDE Platform : JavaDatabase : MY SQL
THANK YOU
Queries????????