Professional Documents
Culture Documents
A PROJECT REPORT Submitted by ANITHA LAKSHMI.S (72008132003) GAYATHRI.K (72008132016) GHAYATHRI.M.P (72008132017)
BACHELOR OF ENGINEERING
in
BONAFIDE CERTIFICATE
Certified that this project report PRIVACY PRESERVING AUDITING OF UNTRUSTED STORAGE is the bonafide work of S.ANITHA LAKSHMI (72008132003), K.GAYATHRI (72008132016) and M.P.GHAYATHRI (72008132017) of Computer Science & Engineering department who carried out the project work under my supervision.
SIGNATURE Mrs. M. SHANTHI, M.E HEAD OF THE DEPARTMENT COMPUTER SCIENCE & ENGINEERING SRI SUBRAMANYA COLLEGE OF ENGINEERING & TECHNOLOGY
SIGNATURE Mr. R.YASIR ABDULLAH M.E., SUPERVISOR ASSISTANT PROFESSOR SRI SUBRAMANYA COLLEGE OF ENGINEERING & TECHNOLOGY
INTERNAL EXAMINER
EXTERNAL EXAMINER
DECLARATION
We affirm that the thesis title PRIVACY PRESERVING AUDITING OF UNTRUSTED STORAGE being submitted in partial fulfillment for the award of B.E in Computer Science & Engineering, is the original work carried out by S.ANITHA LAKSHMI (72008132003), K.GAYATHRI
(72008132016), and M.P.GHAYATHRI (72008132017). It has not formed the part of any other thesis submitted for award of any degree or diploma, either in this or any other University. S.ANITHA LAKSHMI Reg.No 72008132003 K.GAYATHRI Reg.No 72008132016 M.P.GHAYATHRI Reg.No 72008132017
Project Guide
Mr. M.BALASUBRAMANI M.Tech., ASSISTANT PROFESSOR, DEPARTMENT OF CSE.
ii
ACKNOWLEDGMENT
We express our deepest gratitude to our Sri Subramanya College of Engineering & Technology Management, for their valuable guidance and blessings.
We are very grateful to our Principal Dr. K. RAJAPPAN, M.TECH, Ph.D., for providing us with an environment to complete our project successfully.
We deeply indebted to Mrs. M. SHANTHI M.E., Head of the Department, Department of Computer Science and Engineering who modeled us both technically and morally for achieving greater success in life.
We express our sincere thanks to Mr. R. YASIR ABDULLAH M.E., Project Co-ordinator, Department of Computer Science and Engineering, for his constant encouragement and support throughout our course, especially for the useful suggestions given during the course of the project period.
We extend my sincere thanks to my project guide, Mr.M.BALASUBRAMANI M.Tech., Assistant Professor, Computer Science and Engineering Department.
We also thank all the staff members of our college and technicians for their help in making this project a successful one.
Finally, we take this opportunity to extend our deep appreciation to our family and friends, for all that they meant to us during the crucial times of the completion of the project.
iii
ABSTRACT Cloud computing is a vision for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Here comes the problem of ensuring the Integrity of the data stored in the cloud computing. In order to provide trustworthy environment, third Party Auditor (TPA) has been securely introduced, on behalf of the cloud client to maintain and verify the Integrity of the data in cloud. TPA should be able to efficiently audit the cloud data storage and should not provide any vulnerability towards user data integrity. TPA stores the log file information of the data stored in the cloud by the users. TPA audits the data stored in the cloud by block tag authentication. The user also can verify whether the TPA has indeed performed the specified audit task. TPA performs the auditing by sending queries to the cloud server and retrieves the file information of the user and check the information with its log information.
iv
TABLE OF CONTENTS
CHAPTER NO
PAGE NO iv v vi 01 01 03 06 06 07 08 08 08 09 09 10 11 12 12 17 29 30 33 35 36 21 64
1.
2.
3.
SYSTEM SPECIFICATION 3.1 MINIMUM HARDWARE SPECIFICATION 3.2 MINIMUM SOFTWARE SPECIFICATION
4.
SYSTEM ANALYSIS AND DESIGN 4.1 DATE FLOW DIAGRAM 4.2 ARCHITECTURE DIAGRAM 4.3 USE CASE DIAGRAM
5.
6.
7. 8. 9. 10.
LIST OF FIGURES
FIG NO
TITLE
PAGE NO
1.1 4.1 4.2 4.3 5.1 5.2 5.3 5.4 9.1.1 9.1.2 9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9 9.1.10 9.1.11 9.1.12 9.1.13
CLOUD ARCHITECTURE DATA FLOW DIAGRAM ARCHITECTURE DIAGRAM USECASE DIAGRAM SOCKET CONNECTION ESTEBLISHMENT DATA UPLOADING IN CLOUD SERVER DATA DOWNLOADING FROM SERVER AUDITING OF TPA IN CLOUD TPA CONNECTION CLOUD CONNECTION SOCKET CONNECTION LOGIN PAGE SELECTING A FILE INSERTING DATA ENCRIPTED DATA AUDITING THE DATA INSERTING DATA ENTER THE FILE NAME ENCRYPTED DATA STORED IN CLIENT DOWNLOADING DATA DOWNLOADED DATA
02 09 10 11 12 14 15 16 21 22 22 23 23 24 25 25 26 26 27 27 28
LIST OF ABBREVIATION
vi
LIST OF SYMBOLS
Operation/Function
Data Flow
Use case
Actor
vii