You are on page 1of 9

PRIVACY PRESERVING AUDITING OF UNTRUSTED STORAGE

A PROJECT REPORT Submitted by ANITHA LAKSHMI.S (72008132003) GAYATHRI.K (72008132016) GHAYATHRI.M.P (72008132017)

in partial fulfillment for the award of the degree of

BACHELOR OF ENGINEERING
in

COMPUTER SCIENCE AND ENGINEERING

SRI SUBRAMANYA COLLEGE OF ENGINEERING AND TECHNOLOGY, PALANI

ANNA UNIVERSITY : CHENNAI 600 025


APRIL 2012

ANNA UNIVERSITY : CHENNAI 600 025


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

BONAFIDE CERTIFICATE
Certified that this project report PRIVACY PRESERVING AUDITING OF UNTRUSTED STORAGE is the bonafide work of S.ANITHA LAKSHMI (72008132003), K.GAYATHRI (72008132016) and M.P.GHAYATHRI (72008132017) of Computer Science & Engineering department who carried out the project work under my supervision.

SIGNATURE Mrs. M. SHANTHI, M.E HEAD OF THE DEPARTMENT COMPUTER SCIENCE & ENGINEERING SRI SUBRAMANYA COLLEGE OF ENGINEERING & TECHNOLOGY

SIGNATURE Mr. R.YASIR ABDULLAH M.E., SUPERVISOR ASSISTANT PROFESSOR SRI SUBRAMANYA COLLEGE OF ENGINEERING & TECHNOLOGY

Submitted for Project Viva-Voce held on .

INTERNAL EXAMINER

EXTERNAL EXAMINER

DECLARATION

We affirm that the thesis title PRIVACY PRESERVING AUDITING OF UNTRUSTED STORAGE being submitted in partial fulfillment for the award of B.E in Computer Science & Engineering, is the original work carried out by S.ANITHA LAKSHMI (72008132003), K.GAYATHRI

(72008132016), and M.P.GHAYATHRI (72008132017). It has not formed the part of any other thesis submitted for award of any degree or diploma, either in this or any other University. S.ANITHA LAKSHMI Reg.No 72008132003 K.GAYATHRI Reg.No 72008132016 M.P.GHAYATHRI Reg.No 72008132017

I certify that the declaration made above by the candidate is true.

Project Guide
Mr. M.BALASUBRAMANI M.Tech., ASSISTANT PROFESSOR, DEPARTMENT OF CSE.

ii

ACKNOWLEDGMENT

We express our deepest gratitude to our Sri Subramanya College of Engineering & Technology Management, for their valuable guidance and blessings.

We are very grateful to our Principal Dr. K. RAJAPPAN, M.TECH, Ph.D., for providing us with an environment to complete our project successfully.

We deeply indebted to Mrs. M. SHANTHI M.E., Head of the Department, Department of Computer Science and Engineering who modeled us both technically and morally for achieving greater success in life.

We express our sincere thanks to Mr. R. YASIR ABDULLAH M.E., Project Co-ordinator, Department of Computer Science and Engineering, for his constant encouragement and support throughout our course, especially for the useful suggestions given during the course of the project period.

We extend my sincere thanks to my project guide, Mr.M.BALASUBRAMANI M.Tech., Assistant Professor, Computer Science and Engineering Department.

We also thank all the staff members of our college and technicians for their help in making this project a successful one.

Finally, we take this opportunity to extend our deep appreciation to our family and friends, for all that they meant to us during the crucial times of the completion of the project.

iii

ABSTRACT Cloud computing is a vision for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Here comes the problem of ensuring the Integrity of the data stored in the cloud computing. In order to provide trustworthy environment, third Party Auditor (TPA) has been securely introduced, on behalf of the cloud client to maintain and verify the Integrity of the data in cloud. TPA should be able to efficiently audit the cloud data storage and should not provide any vulnerability towards user data integrity. TPA stores the log file information of the data stored in the cloud by the users. TPA audits the data stored in the cloud by block tag authentication. The user also can verify whether the TPA has indeed performed the specified audit task. TPA performs the auditing by sending queries to the cloud server and retrieves the file information of the user and check the information with its log information.

iv

TABLE OF CONTENTS

CHAPTER NO

TITLE ABSTRACT LIST OF FIGURES LIST OF SYMBOLS

PAGE NO iv v vi 01 01 03 06 06 07 08 08 08 09 09 10 11 12 12 17 29 30 33 35 36 21 64

1.

INTRODUCTION 1.1 PROJECT DESCRIPTION 1.2 LANGUAGE SPECIFICATION

2.

LITERATURE REVIEW 2.1 EXIXTING SYSTEM 2.2 PROPOSED SYSTEM

3.

SYSTEM SPECIFICATION 3.1 MINIMUM HARDWARE SPECIFICATION 3.2 MINIMUM SOFTWARE SPECIFICATION

4.

SYSTEM ANALYSIS AND DESIGN 4.1 DATE FLOW DIAGRAM 4.2 ARCHITECTURE DIAGRAM 4.3 USE CASE DIAGRAM

5.

SYSTEM IMPLEMENTATION 5.1 MODULE DESCRIPTION 5.2 SOURCE CODE

6.

SYSTEM TESTING 6.1 SYSTEM TESTING 6.2 TEST CASES

7. 8. 9. 10.

CONCLUSION FUTURE ENHANCEMENT SCREEN SHOTS REFERENCES

LIST OF FIGURES

FIG NO

TITLE

PAGE NO

1.1 4.1 4.2 4.3 5.1 5.2 5.3 5.4 9.1.1 9.1.2 9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9 9.1.10 9.1.11 9.1.12 9.1.13

CLOUD ARCHITECTURE DATA FLOW DIAGRAM ARCHITECTURE DIAGRAM USECASE DIAGRAM SOCKET CONNECTION ESTEBLISHMENT DATA UPLOADING IN CLOUD SERVER DATA DOWNLOADING FROM SERVER AUDITING OF TPA IN CLOUD TPA CONNECTION CLOUD CONNECTION SOCKET CONNECTION LOGIN PAGE SELECTING A FILE INSERTING DATA ENCRIPTED DATA AUDITING THE DATA INSERTING DATA ENTER THE FILE NAME ENCRYPTED DATA STORED IN CLIENT DOWNLOADING DATA DOWNLOADED DATA

02 09 10 11 12 14 15 16 21 22 22 23 23 24 25 25 26 26 27 27 28

LIST OF ABBREVIATION

AES RSA BLS

: ADVANCED ENCRYPTION : RIVEST, SHAMIR AND ADELMAN : BONEY-LYNN-SHACHAM

vi

LIST OF SYMBOLS

Operation/Function

Data Flow

Use case

Actor

vii

You might also like