You are on page 1of 11

BANSAL INSTITUTE OF ENGINEERING & TECHNOLOGY, MEERUT

ENSURING DATA SECURITY IN CLOUD COMPUTING


SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE & ENGINEERING

SESSION: - 2012-13 SUBMITTED BY:Avni Bindal (0937610001) Saurav Kumar (0937610003) Vikash Diswa (0937610004) UNDER THE GUIDANCE OF Mr. Ishu Mittal PROJECT GUIDE - Ms. Preksha Sindhi

SUBMITTED TO

GAUTAM BUDDHA TECHNICAL UNIVERSITY, LUCKNOW

TABLE OF CONTENTS

1. Declaration 2. Certificate 3. Acknowledgments 4. Abstract 5. List of Figures 6. List of Abbreviations Chapters 1 Introduction 1.1 Existing System 1.2Proposed System 2 Modules 2.1Client Module 2.2 System Module User Cloud Server Provider Third Party Auditor 2.3 Cloud Data Storage Module 2.4 Cloud Authentication Server 2.5 Unauthorized Data Modification and Corruption Module 2.6 Adversary Weak Adversary
ii

v vi vii viii ix x

1 2 3 4 4 4

6 6 6 6

Strong Adversary 8 8 8 9 9 9 11 12 13 14 15 16

3 Requirement Analysis 3.1 Hardware Requirement 3.2 Software Requirement 4. Software Environment 4.1 Java Technology 4.2 The Java Programing Language 4.3 The java Platform 4.4 What Can Java Technology Do 4.5 How Will Change My Life 4.6 ODBC 4.7 JDBC 4.8 JDBC Goals SQL Level APL SQL Conformance 4.9 Network TCP/IP Stack IP Diagram UDP TCP Port Address

18

5 System Design 5.1 Data Flow Diagram (DFD) 5.2 DFD Client 5.3 Activity
iii

27 27 29 30

5.4 UML Sequence Diagram 5.5 Class Diagram 5.6 Use Case Diagram 5.7 Input Design 6 System Study 6.1 Feasibility Study 6.2 Economical Feasibility 6.3 Technical Feasibility 6.4 Social Feasibility 7 System Testing 7.1 Introduction 7.2 Unit Testing 7.3 Integration Testing 7.4 Acceptance Testing 8. Coding 9. Sample Screens 10. Implementation 10Conclusion 11. Future Scope of the Project 12. Bibliography

31 32 33 34 36 36 37 37 37 38 38 40 41 41 42 66` 70 73 74 75

iv

DECLARATION
We hereby declare that this submission is our own work and that, to the best of our knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgment has been made in the text.

Vikash Diswa

Saurav Kumar

Avni Bindal

Signature: Name : Vikash Diswa Roll No.: 0937610004

Signature: Name : Saurav Kumar Roll No.: 0937610003

Signature: Name: Avni Bindal Roll No.: 0937610001

Date

CERTIFICATE

This is to certify that this Project Report entitled Ensuring Data Security in Cloud Computing, submitted by Avni Bindal (0937610001), Saurav Kumar (0937610003), Vikash Diswa (0937610004), in the partial fulfillment, for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering, of Bansal Institute of Engineering &Technology, Meerut, affiliated to GAUTAM BUDDHA TECHNICAL UNIVERSITY, Lucknow; is carried out by him under my supervision. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief.

Project Guide Ms. Preksha Sindhi

Head of the Department (CSE) Mr. Ishu Mittal

External Examiner

Director

Date: __/__/____

College Seal

vi

ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the Project Work, undertaken during B. Tech. Final Year. We owe special debt of gratitude to Ms. Preksha Sindhi, Project Guide, Mr. Farman Khan, Lecturer, Mr. Ankit Singhal, Lecturer, Department of Computer Science & Engineering, Bansal Institute of Engineering & Technology, Meerut for their constant support and guidance throughout the course of our work. Their sincerity, thoroughness and perseverance have been a constant source of inspiration for us. It is only their cognizant efforts that our endeavors have seen light of the day. We also take the opportunity to acknowledge the contribution of Mr. Ishu Mittal, Head of Department, Computer Science & Engineering, Bansal Institute of Engineering & Technology, Meerut for his full support and assistance during the development of the project. We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of the department for their kind assistance and cooperation during the development of our project. Last but not the least, we acknowledge our friends for their contribution in the completion of the project.

Vikash Diswa Signature: Name : Vikash Diswa Roll No.: 0937610004 Date :

Saurav Kumar Signature: Name : Saurav Kumar Roll No.: 0937610003

Avni Bindal Signature: Name: Avni Bindal Roll No.: 0937610001

vii

ABSTRACT
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

viii

ix

LIST OF FIGURES

1. System Architecture 2. Process Flow Diagram 3. Compilation and Interpretation 4. Write Once Run Anywhere 5. Java Platform 6. Java Versions 7. TCP/IP Stack 8. J2ME Architecture 9. Cloud Server Data Security Architecture 10. DFD Client 11. Activity Diagram 12. UML Sequence Diagram 13. Class Diagram 14. Use Case Diagram 15. Screenshots

4 5 9 10 11 13 19 23 28 29 30 31 32 33 66

ABBREVIATIONS

OOPS TCP/IP JDBC EIS BIOS RMI JNDI

Object Oriented Programming Concepts Transmission Control Protocol/Internet Protocol Java Data Base Connectivity Enterprise Information Systems Basic Input/output System Remote Method Invocation Java Naming and Directory Interface

ORDBMS Object Relational Database Management System CSP J2ME Cloud Service Provider (CSP) Java 2 Micro Edition

xi

You might also like