Department Of Computer Science Engineering

Slides:



Advertisements
Similar presentations
CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
Advertisements

Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
MEASUROUTING: A FRAMEWORK FOR ROUTING ASSISTED TRAFFIC MONITORING PRESENTED BY.
COMPUTER SYSTEM CAN BE DIVIDED INTO : 1- General Computer 2- Special Computer.
1.1 Installing Windows Server 2008 Windows Server 2008 Editions Windows Server 2008 Installation Requirements X64 Installation Considerations Preparing.
Under the Guidance of: Mr S.Karthikeyan.MCA..  The project is entitled as “ SMS Based Student Information System” created by using Visual Basic.  Flexible.
On the Node Clone Detection inWireless Sensor Networks.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
A Survey of Mobile Cloud Computing Application Models
Layered Approach using Conditional Random Fields For Intrusion Detection.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Data Leakage Detection by Akshay Vishwanathan ( ) Joseph George ( ) S. Prasanth ( ) Guided by: Ms. Krishnapriya.
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform.
Improving Network I/O Virtualization for Cloud Computing.
Privacy Preserving Data Sharing With Anonymous ID Assignment
m-Privacy for Collaborative Data Publishing
EAACK—A Secure Intrusion-Detection System for MANETs
Enterprise Resource Planning(ERP)
Identity-Based Secure Distributed Data Storage Schemes.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Group I Renjith Deepesh Praveesh P Varun V Subramanian Halesh P K.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Human Resource Management Team ID: Guided By:- Rushabh Doshi Prepared By:- Nilesh Mangroliya ( ) Bhavin Mungara ( )
Privacy Preserving Delegated Access Control in Public Clouds.
Member 1Member 2Member 3Member 4. Agenda Introduction Current Scenario Proposed Solution Block Diagram Technical Implementation Hardware & Software Requirements.
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
Keyword Query Routing.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Energy-Efficient Protocol for Cooperative Networks.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Personal Computers: in the 1990’s Presenter: Michael Verhaart Use [PageDown] to proceed or in Full screen mode (right click for menu) use Left click mouse.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
BLOOD BANK MANAGEMENT SYSTEM I.MOHAMMED IRFAHN ( ) A.ARUN CHARLES ( ) S.JAYA PRAKASH ( ) S.KARTHIK( ) M. ARAVINDA DE SILVA.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
UNIVERSITY MANAGEMENT SYSTEM
Presentation on Online Shopping
Geethanjali College Of Engineering and Technology Cheeryal( V), Keesara ( M), Ranga Reddy District. I I Internal Guide Mrs.CH.V.Anupama Assistant Professor.
Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
BY S.S.SUDHEER VARMA (13NT1D5816)
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Towards Scalable Traffic Management in Cloud Data Centers
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
STEGANOGRAPHY.
A Presentation on online voting system
المحور 3 : العمليات الأساسية والمفاهيم
Energy-Efficient Storage Systems
Client/Server And Peer-to-Peer
Presentation transcript:

Department Of Computer Science Engineering Project Report On Project Title Presented By Under The Guidence Of Department Of Computer Science Engineering College Name

Abstract We propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational DiffieHellman) problem

Existing System In cloud computing, remote data integrity checking is an important security problem. The clients’ massive data is outside his control. The malicious cloud server may corrupt the clients’ data in order to gain more benefits. The formal system model and security model are existing models. In the PDP model, the verifier can check remote data integrity with a high probability. Based on the RSA, they designed two provably secure PDP schemes.

Disadvantages Of Existing System Does not provide efficiency in remote data integrity checking. More expensive. The existing system provides less flexibility.

Proposed system Remote data integrity checking is of crucial importance in cloud storage. In multi-cloud environment, distributed provable data possession is an important element to secure the remote data. we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage.

Advantages Of Proposed System The distributed cloud storage is indispensable. Efficient and Flexible. elimination of the certificate management.

Hardware Requirements System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb.

Software Requirements Operating system : Windows XP/7. Coding Language : ASP.net, C#.net Tool : Visual Studio 2010 Database : SQL SERVER 2008

UML Diagrams Use case Diagram

Sequence Diagram

Class Diagram