Data Integrity Protection In Cloud Computing: Presented By,

  • Uploaded by: sindhuja stephenraj
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Data Integrity Protection In Cloud Computing: Presented By, as PDF for free.

More details

  • Words: 450
  • Pages: 14
Data Integrity Protection In Cloud Computing PROJECT GUIDE

PROJECT INCHARGE & HEAD

Mr. S. Muthu Perumal Pillai, MCA., Ph.D., Associate Professor, Dept. of Computer Application, PET Engineering College, Vallioor

Dr. A. Kalai Selvi, MCA, M.Phil., Ph.D., Professor and Head, Dept. of Computer Application, PET Engineering College, Vallioor.

Presented by, S. Sinduja (Reg. no. 963216621334), III MCA, PET Engineering College.

ABSTRACT • In cloud computing integrity of data and access control are

challenging issues. • Protection of outsourced data in cloud storage becomes critical. • Codes which are regenerating of data provide fault tolerance.

• Therefore, remotely checking the integrity of data against corruptions and other issues under a real time cloud storage setting is our problem of study.

• We practically design and implement Data Integrity Protection (DIP) environment.

Introduction • Cloud computing is the recent emergent technology of IT industry. • Cloud computing relies on sharing computing resources “a type of Internet-based computing”. • It provide services such as server, storage and application are delivered through the internet.

• It advantage to mention include scalability, flexibility and efficiency.

Introduction • It is necessary to verify the integrity of their deploy data in the cloud. • If we detect corruptions or loss in our deployed data (e.g., when a server crashes), then we should repair or recover the corrupted or loss data and restore the original data.

• However, storing all data in a single server is not a very good idea.

Introduction • Hence using Data load balancing algorithm in DIP to verify the integrity of data. • It will load the data into the cloud server using AES encryption and when if any of the server crashes it help retrieval of data without data loss. • It will generate MAC(Message Authentication Code) for each of the server and make use of TPA(Third Party Authority).

Hardware Requirements • • • •

System(Desktop,Keyboard,Mouse) Processor(Intel pentium dual) RAM(2GB) System Type(32bit operating system)

Software Requirements • Windows 7 • IDE : Netbeans • MySQL

Existing System • Storage Based on Erasure Coding: Simplify the content placement and recovery problem at the cost of longer data retrieval. • LT Code: Rateless property enables its redundancy. • Data Retrieval issue in Cloud Storage: Data

security requirement of cloud computing and setup a mathematical data model for cloud computing.

Proposed System • In the proposed system DIP use Data load balancing algorithm which help to maintain the integrity in cloud server. • The algorithm will load the data into the server and balance i.e split the data into the server in such a way that it would be retrieved easily if server crashes.

ARCHITECTURE DIAGRAM

USECASE DIAGRAM

SEQUENCE DIAGRAM

CLASS DIAGRAM

ACTIVITY DIAGRAM

THANK YOU

Related Documents


More Documents from "mohammad reza ardian abdillah"