Professional Documents
Culture Documents
1. INTRODUCTION:
1.1
BACKGROUND:
NIST [1] describes cloud computing as a model for enabling
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
1
1.2
PROPOSED WORK:
This paper focuses on the issues related to the data security aspect
of cloud computing. As data and information will be shared with a
third party, cloud computing users want to avoid an untrusted
cloud provider. Protecting private and important information, such
as credit card details or a patients medical records from attackers
or malicious insiders is of critical importance. In addition, the
potential for migration from a single cloud to a multi-cloud
environment is examined and research related to security issues in
single and multi-clouds in cloud Computing are surveyed.
2. PROPOSED SYSTEM:
3.1 PROPOSED APPROACH:
In this system we are uploading the file onto the different
public cloud which maintains the integrity confidentiality
and security of uploaded files on cloud. We use MD5
algorithm for computing the hash value (digital signature)
of files before upload. After that we apply our main
algorithm which divides files into different shares and
each share contains unreadable text format and that will
be uploaded to each cloud.
At download time we can choose any of the 3 clouds and
that file will be reconstructed.
4.2
4.3
4.4
5 Algorithms Used:
5.1 Visual Cryptography Scheme
5.1.1 Share Creation Algorithm
5.1.2 Share Re-Construction Algorithm
5.2
5.3
MD5
5.4
User Registration:
User Login:
File Download:
6.5
User log:
7 REFERENCES:
[1] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk
paxos: optimal resilience with Byzantine shared memory",
Distributed Computing, 18(5), 2006, pp. 387-408.
[2] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a
case for cloud storage diversity", SoCC'10:Proc. 1st ACM
symposium on Cloud computing, 2010, pp. 229-240.
[3] D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, "Database
Management as a Service: Challenges and Opportunities",
ICDE'09:Proc.25thIntl. Conf. on Data Engineering, 2009, pp. 17091716.
[4] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring
Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on
System Sciences (HICSS), 2011, pp. 1-9.
[5] Amazon, Amazon Web Services. Web services licensing
agreement, October3,2006.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.
Peterson and D. Song, "Provable possession at untrusted stores",
Proc. 14th ACM Conf. on Computer and communications security,
2007, pp. 598-609.
7