You are on page 1of 8

SECURED PUBLIC AUDITING IN CLOUD DATA STORAGE

By

B.AMUDHAVALLI
Reg. No. 8051010003 Under the Guidance of

Mr. A.M.J. MUTHUKUMARAN


Asst. Professor (Sr.G), Dept. of CSE

A PROJECT REPORT Submitted to the Department of Computer Science and Engineering in the FACULTY OF ENGINEERING & TECHNOLOGY In partial fulfillment of the requirements for the award of the degree of MASTER OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING

SRM UNIVERSITY
Kattankulathur Chennai Tamilnadu-603 203

May - 2013

BONAFIDE CERTIFICATE

Certified that this project report titled Secured Public Auditing in Cloud Data Storage is the bonafide work of B.Amudhavalli (Reg. No:8051010003) , who

carried out the research under my supervision. Certified further, that to the best of my knowledge the work reported herein does not form part of any other project report or dissertation on the basis of which a degree or award was conferred on an earlier occasion on this or any other candidate.

Signature of the Guide Mr. A.M.J. Muthukumaran Asst. Professor (Sr.G) Dept. of CSE, S.R.M University

Signature of the Project Coordinator Mr. B. Muruganantham Asst. Professor (Sr. G) Dept of CSE, S.R.M University

Internal Examiner

External Examiner

ii

ABSTRACT

Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, contribution in this work can be summarized as the following three aspects: The public auditing system of data storage security in Cloud Computing and provide a privacy-preserving auditing protocol, i.e., this scheme supports an external auditor to audit users outsourced data in the cloud without learning knowledge on the data content. To the best of my knowledge, this scheme is the first to support scalable and efficient public auditing in the Cloud Computing. In particular, this scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed simultaneously by the TPA. It proves the security and justifies the performance of our proposed schemes through concrete experiments and comparisons with the state-of-the-art.

iii

ACKNOWLEDGEMENT

It is with great satisfaction and achievement that I have completed my project. I take this opportunity to acknowledge each and every one who contributed towards my work. I express my sincere thanks to Dr. C. Muthamizhchelvan, Director, Faculty of Engineering and Technology, SRM University. I express my sincere gratitude towards Dr.E.Poovamal, Head of the Department, Dept. of CSE, for her guidance and support. I take this opportunity to thank our Project-coordinator Mr. B. Muruganantham, Asst. Professor (Sr.G) - Dept of CSE for his suggestions, valuable support, encouragement and guidance throughout the project. I would also like to express my sincere gratitude to my Project Guide Mr. A.M.J. Muthukumaran, Asst. Professor (senior Grade) Dept. of CSE for his able assistance, timely suggestions and guidance throughout the duration of this first phase of the project. I also convey my gratitude to all other members in the Project panel and those who have contributed to this project directly or indirectly.

iv

TABLE OF CONTENTS
CHAPTER NO TITLE PAGE NO.

ABSTRACT LIST OF FIGURES LIST OF TABLES LIST OF ABBERVATION 1 INTRODUCTION 1.1 Literature Survey 1.2 Problem Statement 2 SYSTEM ANALYSIS 2.1 Existing System 2.2 Proposed System 3 ARCHITECTURAL DETAILS 3.1 The modularization of the project 3.2 Module Description 4 SYSTEM SPECIFICATION 4.1 Hardware Specification 4.2 Software Specification 5 SYSTEM DESIGN 5.1 Data Flow Diagram 5.2 Use case Diagram 5.3 Table Diagram

iii vii viii viii 1 2 4 5 5 6 7 9 9 14 14 14 15 15 20 24

SYSTEM IMPLEMENTATION 6.1 Programming Language Details 6.2 Source Code

26 27 32 40 40 48 42 43 43 43 44 45 45 45 46 47 48 56 57

TESTING 7.1 Introduction 7.2 Type of Testing 7.3 Test Case Report

PREFORMANCE AND LIMITATIONS 8.1 Merits of the System 8.2 Limitation of System 8.3 Future Enhancements

SCREEN SHOTS 9.1 Sample Screen Shots 9.1.1 Login Page 9.1.2 File Upload 9.1.3 key Request 9.1.4 Client Details

10

CONCLUSION REFERENCES

vi

LIST OF FIGURES

2.1 Basic Scheme-File block.......................................................................................5 3.1 Architecture of the system ....................................................................................7 3.2 Homomorphic Authentication ............................................................................10 3.3 Setup and Audit Phase ........................................................................................12 5.1 Level 0 DFD ......................................................................................................15 5.2 Level 1 DFD login ..........................................................................................16 5.3 Level 1 DFD Client .........................................................................................17 5.4 Level 1 DFD TPA ...........................................................................................18 5.5 Level 1 DFD CSP ...........................................................................................19 5.6 Usecase Diagram ..............................................................................................20 5.7 Sequence Diagram .............................................................................................21 5.8 Class Diagram ....................................................................................................23 6.1 3 tier architecture ...............................................................................................31 9.1 Screen Shot -Login Page ....................................................................................45 9.2 Screen Shot- File Upload ...................................................................................46 9.3 Screen Shot- Key Request .................................................................................47 9.4 Screen Shot- Client Details ................................................................................48

vii

LIST OF TABLES

5.3.1 Table Admin Details .........................................................................................24 5.3.2 Table Jar details.25

LIST OF ABBREVATION

ABBREVATION TPA CSP MAC SQL SK HTML PHP

DESCRIPTION Third Party Auditor Cloud Service Provider Message Authentication Code Structured Query Language Secret key Hypertext Markup Language Hypertext Pre-processor

viii

You might also like