SlideShare a Scribd company logo
2
Most read
3
Most read
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Secure cloud storage with data dynamic using secure network
coding technique
Abstract:
In the age of cloud computing, cloud users with limited storage can outsource their data to
remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’
data at any point of time. Secure cloud storage protocols enable a client to check integrity of
outsourced data. In this work, we explore the possibility of constructing a secure cloud storage
for dynamic data by leveraging the algorithms involved in secure network coding. We show that
some of the secure network coding schemes can be used to construct efficient secure cloud
storage protocols for dynamic data, and we construct such a protocol (DSCS I) based on a secure
network coding protocol. To the best of our knowledge, DSCS I is the first secure cloud storage
protocol for dynamic data constructed using secure network coding techniques which is secure in
the standard model. Although generic dynamic data support arbitrary insertions, deletions and
modifications, append-only data find numerous applications in the real world. We construct
another secure cloud storage protocol (DSCS II) specific to append-only data — that overcomes
some limitations of DSCS I. Finally, we provide prototype implementations for DSCS I and
DSCS II in order to evaluate their performance.
Index Terms—Secure cloud storage, network coding, dynamic data, append-only data, public
verifiability.
Existing System:
we look at the problem of constructing a secure cloud storage protocol for dynamic data (DSCS)
from a different perspective. We investigate whether we can construct an efficient DSCS
protocol using an SNC protocol. In a previous work, Chen et al. [16] reveal a relationship
between secure cloud storage and secure network coding. In particular, they show that one can
exploit some of the algorithms involved in an SNC protocol in order to construct a secure cloud
storage protocol for static data. However, their construction does not handle dynamic data — that
makes it insufficient in many applications where a client needs to update (insert, delete or
modify) the remote data efficiently. Further investigations are needed towards an efficient DSCS
construction using a secure network coding (SNC) protocol.
Network coding techniques have been used to construct distributed storage systems [17], [18]
where the client’s data are disseminated across multiple servers. However, they primarily aim to
reduce the repair bandwidth when some of the servers fail. On the other hand, we explore
whether we can exploit the algorithms involved in an SNC protocol to construct an efficient and
secure cloud storage protocol for dynamic data (for a single storage server).
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Proposed System:
Our major contributions in this work are summarized as follows.
We explore the possibility of providing a generic construction of a DSCS protocol from any
SNC protocol. We discuss the challenges for a generic construction in details and identify some
SNC protocols suitable for constructing efficient DSCS protocols.
We construct a publicly verifiable DSCS protocol (DSCS I) from an SNC protocol . DSCS I
handles dynamic data, i.e., a client can efficiently perform updates (insertion, deletion and
modification) on the outsourced data. We discuss the (asymptotic) performance and certain
limitations of DSCS I.
We provide the formal security definition of a DSCS protocol and prove the security of DSCS I.
As append-only data are a special case of generic dynamic data, we can use DSCS I (which is
based on ) for append-only data. However, we identify some SNC protocols that are not suitable
for building a secure cloud storage for generic dynamic data, but efficient secure cloud storage
protocols for appendonly data can be constructed from them. We construct such a publicly
verifiable secure cloud storage protocol (DSCS II) for append-only data by using an SNC
protocol proposed by Boneh et al..
We discuss the (asymptotic) performance of DSCS II which overcomes some limitations of
DSCS I.
We implement DSCS I and DSCS II and evaluate their performance based on storage overhead,
computational cost and communication cost.
System Architecture:
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1

More Related Content

What's hot (20)

PDF
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
PPT
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 
PPTX
Peer to peer system
Jahanzaib Niazi
 
PPTX
27 iframe
SatyakiDas12
 
PPT
Distributed computing
Alokeparna Choudhury
 
PPT
Computer network
samiksha padgilwar
 
PPTX
What is Cloud computing?
Richard Harvey
 
PPTX
Big data Hadoop presentation
Shivanee garg
 
PPT
1 xml fundamentals
Dr.Saranya K.G
 
PPTX
1 introduction to windows server 2016
Hameda Hurmat
 
PPTX
VTU 6th Sem Elective CSE - Module 4 cloud computing
Sachin Gowda
 
PPT
Operating system support in distributed system
ishapadhy
 
PPTX
Master page and Theme ASP.NET with VB.NET
Shyam Sir
 
PDF
The Basics of Visual Studio Code.pdf
calfonzodaly
 
PPTX
Extensible Markup Language (XML)
AakankshaR
 
PPTX
Hadoop HDFS Concepts
tutorialvillage
 
PPTX
Big Data & Hadoop Tutorial
Edureka!
 
PPT
Introduction to CSS
Amit Tyagi
 
PPT
Basic fundamentals of web application development
sofyjohnson18
 
PPT
Active Directory Training
Nishad Sukumaran
 
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 
Peer to peer system
Jahanzaib Niazi
 
27 iframe
SatyakiDas12
 
Distributed computing
Alokeparna Choudhury
 
Computer network
samiksha padgilwar
 
What is Cloud computing?
Richard Harvey
 
Big data Hadoop presentation
Shivanee garg
 
1 xml fundamentals
Dr.Saranya K.G
 
1 introduction to windows server 2016
Hameda Hurmat
 
VTU 6th Sem Elective CSE - Module 4 cloud computing
Sachin Gowda
 
Operating system support in distributed system
ishapadhy
 
Master page and Theme ASP.NET with VB.NET
Shyam Sir
 
The Basics of Visual Studio Code.pdf
calfonzodaly
 
Extensible Markup Language (XML)
AakankshaR
 
Hadoop HDFS Concepts
tutorialvillage
 
Big Data & Hadoop Tutorial
Edureka!
 
Introduction to CSS
Amit Tyagi
 
Basic fundamentals of web application development
sofyjohnson18
 
Active Directory Training
Nishad Sukumaran
 

Similar to Secure cloud storage with data dynamic using secure network coding technique (20)

DOCX
Secure cloud storage with data dynamic using secure network coding technique
Venkat Projects
 
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
PDF
50620130101004
IAEME Publication
 
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
 
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
PDF
M.E Computer Science Cloud Computing Projects
Vijay Karan
 
PDF
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
PDF
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
PDF
S.A.kalaiselvan toward secure and dependable storage services
kalaiselvanresearch
 
PDF
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
PPT
Towards secure and dependable storage service in cloud
sibidlegend
 
PPT
Towards secure and dependable storage service in cloud
sibidlegend
 
PDF
L01246974
IOSR Journals
 
DOCX
Provable multicopy dynamic data possession
nexgentechnology
 
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
Secure cloud storage with data dynamic using secure network coding technique
Venkat Projects
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
50620130101004
IAEME Publication
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
M.E Computer Science Cloud Computing Projects
Vijay Karan
 
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
S.A.kalaiselvan toward secure and dependable storage services
kalaiselvanresearch
 
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
Towards secure and dependable storage service in cloud
sibidlegend
 
Towards secure and dependable storage service in cloud
sibidlegend
 
L01246974
IOSR Journals
 
Provable multicopy dynamic data possession
nexgentechnology
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
Ad

More from Venkat Projects (20)

DOCX
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
DOCX
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
Venkat Projects
 
DOCX
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
Venkat Projects
 
DOCX
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
Venkat Projects
 
DOCX
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
Venkat Projects
 
DOCX
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Venkat Projects
 
DOCX
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
Venkat Projects
 
DOCX
WATERMARKING IMAGES
Venkat Projects
 
DOCX
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
Venkat Projects
 
DOCX
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Venkat Projects
 
DOCX
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Venkat Projects
 
DOCX
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
DOCX
2022 PYTHON MAJOR PROJECTS LIST.docx
Venkat Projects
 
DOCX
2022 PYTHON PROJECTS LIST.docx
Venkat Projects
 
DOCX
2021 PYTHON PROJECTS LIST.docx
Venkat Projects
 
DOCX
2021 python projects list
Venkat Projects
 
DOCX
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
DOCX
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Venkat Projects
 
DOCX
6.iris recognition using machine learning technique
Venkat Projects
 
DOCX
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
Venkat Projects
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
Venkat Projects
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
Venkat Projects
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
Venkat Projects
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Venkat Projects
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
Venkat Projects
 
WATERMARKING IMAGES
Venkat Projects
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
Venkat Projects
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
Venkat Projects
 
2022 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 python projects list
Venkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Venkat Projects
 
6.iris recognition using machine learning technique
Venkat Projects
 
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
Ad

Recently uploaded (20)

PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPTX
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPT on the Development of Education in the Victorian England
Beena E S
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
Dimensions of Societal Planning in Commonism
StefanMz
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
community health nursing question paper 2.pdf
Prince kumar
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 

Secure cloud storage with data dynamic using secure network coding technique

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:[email protected] Secure cloud storage with data dynamic using secure network coding technique Abstract: In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data. In this work, we explore the possibility of constructing a secure cloud storage for dynamic data by leveraging the algorithms involved in secure network coding. We show that some of the secure network coding schemes can be used to construct efficient secure cloud storage protocols for dynamic data, and we construct such a protocol (DSCS I) based on a secure network coding protocol. To the best of our knowledge, DSCS I is the first secure cloud storage protocol for dynamic data constructed using secure network coding techniques which is secure in the standard model. Although generic dynamic data support arbitrary insertions, deletions and modifications, append-only data find numerous applications in the real world. We construct another secure cloud storage protocol (DSCS II) specific to append-only data — that overcomes some limitations of DSCS I. Finally, we provide prototype implementations for DSCS I and DSCS II in order to evaluate their performance. Index Terms—Secure cloud storage, network coding, dynamic data, append-only data, public verifiability. Existing System: we look at the problem of constructing a secure cloud storage protocol for dynamic data (DSCS) from a different perspective. We investigate whether we can construct an efficient DSCS protocol using an SNC protocol. In a previous work, Chen et al. [16] reveal a relationship between secure cloud storage and secure network coding. In particular, they show that one can exploit some of the algorithms involved in an SNC protocol in order to construct a secure cloud storage protocol for static data. However, their construction does not handle dynamic data — that makes it insufficient in many applications where a client needs to update (insert, delete or modify) the remote data efficiently. Further investigations are needed towards an efficient DSCS construction using a secure network coding (SNC) protocol. Network coding techniques have been used to construct distributed storage systems [17], [18] where the client’s data are disseminated across multiple servers. However, they primarily aim to reduce the repair bandwidth when some of the servers fail. On the other hand, we explore whether we can exploit the algorithms involved in an SNC protocol to construct an efficient and secure cloud storage protocol for dynamic data (for a single storage server).
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:[email protected] Proposed System: Our major contributions in this work are summarized as follows. We explore the possibility of providing a generic construction of a DSCS protocol from any SNC protocol. We discuss the challenges for a generic construction in details and identify some SNC protocols suitable for constructing efficient DSCS protocols. We construct a publicly verifiable DSCS protocol (DSCS I) from an SNC protocol . DSCS I handles dynamic data, i.e., a client can efficiently perform updates (insertion, deletion and modification) on the outsourced data. We discuss the (asymptotic) performance and certain limitations of DSCS I. We provide the formal security definition of a DSCS protocol and prove the security of DSCS I. As append-only data are a special case of generic dynamic data, we can use DSCS I (which is based on ) for append-only data. However, we identify some SNC protocols that are not suitable for building a secure cloud storage for generic dynamic data, but efficient secure cloud storage protocols for appendonly data can be constructed from them. We construct such a publicly verifiable secure cloud storage protocol (DSCS II) for append-only data by using an SNC protocol proposed by Boneh et al.. We discuss the (asymptotic) performance of DSCS II which overcomes some limitations of DSCS I. We implement DSCS I and DSCS II and evaluate their performance based on storage overhead, computational cost and communication cost. System Architecture:
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:[email protected] SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • PROCESSOR : I3. • Hard Disk : 40 GB. • Ram : 2 GB. SOFTWARE REQUIREMENTS: • Operating system : Windows. • Coding Language : JAVA/J2EE • Data Base : MYSQL • IDE :Netbeans8.1