1
INTRODUCTION 1.1 OBJECTIVE OF THE PROJECT People can easily work together in a group by Sharing and storing the services in the cloud. To protect the integrity of data in the cloud, number of mechanisms have been proposed. In these mechanisms, a signature is attached to each block in data, and the integrity of data relies on the correctness of all the signatures. One of the most significant and common features of these mechanisms is to allow a Public Auditor to efficiently check data integrity in the cloud without downloading the entire data, referred to as public auditing. This Public Auditor could be a client who would like to utilize cloud data for particular purposes (e.g., search, computation, data mining, etc.) or Third Party Auditor(TPA) who is able to provide verification services on data integrity to users. With shared data, once a user modifies a block, that user also needs to compute a new signature for the modified block. Due to the modifications from different users, different blocks are signed by different users.
The proposed mechanism allows a public Auditor to efficiently check the data integrity in the cloud without downloading the entire data. This mechanism preserves the confidentiality of the shared data by using the proxy re-signature mechanism. In this mechanism the blocks which were previously assign to revoked user will be re-signed by the existing user. For the security purpose secret key will be provided while login. Public verification techniques allow the users to outsource their data into the cloud and consistency of the data is checked by a trusted third party called auditor. Objective of the public verification scheme is to avoid external adversary attacks on the data outsourced by the owner.
SYSTEM ANALYSIS
2 2.1
EXISTING SYSTEM
Regenerating codes are implemented to minimize repair traffic in the network.
It does not reading and reconstructing the whole file during the repair time.
It reads a set of chunks smaller than the original file from the other servers and reconstructs only the lost contents.
Functional minimum-storage regenerating (FMSR) codes allow the clients to remotely verify the integrity of the data in server.
The servers are only need to support standard read or write functionalities.
It enables the integrity protection, fault tolerance, and efficient recovery for cloud storage.
MAC algorithm is used for check the data integrity.
2.1.1 DISADVANTAGES OF EXISTING SYSTEM
2.2
The server cannot communicate with each other in case of status failure
The system will result in high delay for selecting active server communication
PROPOSED SYSTEM
3
The system uses Centralized TPA to analyze the status of each server in regular interval
The system provides selection of server in case of meta data download request
The auditing system will index the files stored in the servers.
2.2.1 ADVANTAGES OF PROPOSED SYSTEM
The delay will be very lower that the existing system.
The proposed system will result higher accuracy of data selection.
Also, the selection of server will be easily analyzed before download request will improve the efficiency of the system.
SYSTEM SPECIFICATION
4
3.1 HARDWARE REQUIREMENTS COMPONENT
SPECIFICATION
CPU
Intel Dual Core 2.4 GHz or Later
RAM
2GB DDR2
Hard Disk
160 GB
Display
Wide VGA (Video Graphics Array)
Input
Keyboard and Mouse
3.2 SOFTWARE REQUIREMENTS COMPONENT
SPECIFICATION
Front End
JAVA
Back End
MySQL (XAMPP)
IDE
NETBEANS
Platform
Windows 7 or later