SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2019 > NON IEEE > APPLICATION

    Public for Auditing End Devices In Cloud


    Abstract

    Cloud storage provides tremendous storage resources for both individual and enterprise users. In a cloud storage system, the data owned by a user is no longer possessed locally. Hence, it is not competent to ensure the integrity of the outsourced data using traditional data integrity checking methods. A privacy-preserving public auditing protocol allows a third party auditor to check the integrity of the outsourced data on behalf of the users without violating the privacy of the data. However, existing privacy-preserving public auditing protocols assume the end devices of users are powerful enough to compute all costly operations in real time when the data to be outsourced is given. In fact, the end devices may also be those with low computation capabilities. In this project, we propose two lightweight privacy-preserving public auditing protocols. Proposed protocols are based on online/offline signatures, by which an end device only needs to perform lightweight computations when a file to be outsourced is available. Besides, our proposals support batch auditing and data dynamics. Experiments show that our protocols are hundreds of times more efficient than a recent proposal regarding to the computational overhead on user side.


    Existing System

    In existing technology, a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Two provably-secure PDP schemes that are more efficient than previous solutions, even when compared with schemes that achieve weaker guarantees. It verifies the practicality of PDP and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic computation. Verifying the authenticity of data has emerged as a critical issue in storing data on untrusted servers. Archival storage requires guarantees about the authenticity of data on storage, namely that storage servers possess data.


    Proposed System

    In the proposed system, the owner registers the details and login into the system. Trusted authority authenticate the owner by sending the key to the owner mail id. By using the signature key, the owner encrypts the files and upload the file in the cloud as online and offline signature. It was performed by using offline/online signature scheme. Online signature contains the small size of data and offline signature contains the large size of data. Users register their details and authenticate by the owner then download the files from the cloud. Cloud can modify or verify the files that are stored. Third Party Auditor(TPA) Check the files, if any files are corrupted then forward the corrupted file details to the cloud


    Architecture


    ARCHITECTURE DIAGRAM


    FOR MORE INFORMATION CLICK HERE