Towards secure & dependable storage services in cloud computing

17
PLATFORM : JAVA DOMAIN : CLOUD COMPUTING Guided By : Mr.P.N.Renjith TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING PRESENTED BY Rahid.A.K Naabih.C.S Manoj.K.S

description

 

Transcript of Towards secure & dependable storage services in cloud computing

Page 1: Towards secure & dependable storage services in cloud computing

PLATFORM : JAVADOMAIN : CLOUD COMPUTING

Guided By : Mr.P.N.Renjith

TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING

PRESENTED BY

Rahid.A.K Naabih.C.S Manoj.K.S

Page 2: Towards secure & dependable storage services in cloud computing

Zeroth Review Details

1 Algorithm used :

Byzantine Fault Tolerance Algorithm

Token Pre-computation

Correctness Verification and Error Localization

Error recovery

Reed –Solomon Algorithm

Homomorphic Linear Algorithm

Page 3: Towards secure & dependable storage services in cloud computing

2Existing System and Limitations

Byzantine Error Occurrence.

Physical possession of outsourced data.

Pre-Requisition for Client manipulation.

Page 4: Towards secure & dependable storage services in cloud computing

Design Module Description

1.Login

2.New User

3.Client Manipulation

4.Administrator Login

5.Admin Manipulation

3

Page 5: Towards secure & dependable storage services in cloud computing

Operational Module Description

• Adversary Module• Cloud Data Storage Module• Third Party auditing Module• Dynamic Data operation Module

4

Page 6: Towards secure & dependable storage services in cloud computing

Login Module

• Client LoginProvided a user name and password correctness checked by Correctness Verification and

Error Localization

• New User LoginRegistration form for each userValidation done by providing Captcha and verifying email

Id and Telephone number.

5

Page 7: Towards secure & dependable storage services in cloud computing

• Provided with operations such as Download UploadView Delete

Client Manipulation Module

6

Page 8: Towards secure & dependable storage services in cloud computing
Page 9: Towards secure & dependable storage services in cloud computing
Page 10: Towards secure & dependable storage services in cloud computing

9

VALIDATION

REQUEST

RESPONSE

LOGIN

Use-case diagram for user login:

Server Client

Page 11: Towards secure & dependable storage services in cloud computing

UPLOAD

DOWNLOAD

VIEW

DELETE

Use-case diagram for client manipulation :

DATABASE

10

CLIENT

Page 12: Towards secure & dependable storage services in cloud computing

11

Class diagram:

Login

user login

user namePassword

login()

Server login

usernamePassword

login()

client home

uploaddownload

fileupload()filedownload()

server home

client detailslogin detailsfiles details

view overall details()

registration

new user signup

register()

Page 13: Towards secure & dependable storage services in cloud computing

Flowchart : Start

Home

Client loginServer login

Client pageServer page

End

Cloud System

Yes Yes

12

Page 14: Towards secure & dependable storage services in cloud computing

Dataflow Diagram :

Request to CSP

Validate User

Manipulation

Client Home

Client Database

Deny

Access

Monitoring

Acknowledgement

13

Page 15: Towards secure & dependable storage services in cloud computing

Applications :

Page 16: Towards secure & dependable storage services in cloud computing

Project Status :

25%

Page 17: Towards secure & dependable storage services in cloud computing

THANK YOU