oruta: privacy-preserving public auditing for shared data in the cloud

13
Department Of Computer Science Engineering Under The Guidence Of Project Report On Project Title Presented By College Name

Upload: cegon-technologies

Post on 15-Jul-2015

258 views

Category:

Engineering


4 download

TRANSCRIPT

Page 1: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Department Of Computer Science Engineering

Under The Guidence Of

Project Report On

Project Title

Presented By

College Name

Page 2: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Abstract

public auditing on the integrity of shared data with these

existing mechanisms will inevitably reveal confidential

information—identity privacy—to public verifiers

we propose a novel privacy-preserving mechanism that

supports public auditing on shared data stored in the

cloud.

Page 3: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Exiting System

Many mechanisms have been proposed to allow not

only a data owner itself but also a public verifier to

efficiently perform integrity checking without

downloading the entire data from the cloud, which is

referred to as public auditing .

A public verifier could be a data user (e.g.,

researcher) who would like to utilize the owner’s

data via the cloud or a third-party auditor (TPA) who

can provide expert integrity checking services.

Page 4: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Disadvantages Of Existing System

Failing to preserve identity privacy on shared data

during public auditing will reveal significant

confidential information to public verifiers.

Protect these confidential information is essential and

critical to preserve identity privacy from public

verifiers during public auditing.

Page 5: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Proposed System

In this paper, to solve the above privacy issue on

shared data, we propose oruta, a novel privacy-

preserving public auditing mechanism.

We utilize ring signatures to construct holomorphic

authenticators in oruta, so that a public verifier is able

to verify the integrity of shared data without retrieving

the entire data while the identity of the signer on each

block in shared data is kept private from the public

verifier.

Page 6: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Advantages Of Proposed System

A public verifier is able to correctly verify shared data

integrity.

A public verifier cannot distinguish the identity of the

signer on each block in shared data during the process of

auditing.

Page 7: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Operating system : Windows XP/7.

Coding Language : JAVA/J2EE

IDE : Netbeans 7.4

Database : MYSQL

Software Requirements

Page 8: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Hardware Requirements

System : Pentium IV 2.4 GHz.

Hard Disk : 40 GB.

Monitor : 15 VGA Colour.

Ram : 512 Mb.

Page 9: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

System Architecture

.

Page 10: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Data Flow Diagram

Page 11: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Uml Diagrams

Use Case Diagram

Attribute Authority

User

Registration

File Encryptand Upload

Decryptand Download

send secretkey

Generate Keyand Select Role

Secret Keyfrom Mail

Cloud Server Provider

Page 12: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Class Diagram

ADMIN

Send KeyGet keySend file

File Sending()

Attribute Authority

Get KeySend Key

Key sending()

S-Csp

Get KeySend Key

Key sending()

Receiver

Get FileDownload File

File receiving()

Page 13: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Activity Diagram