towards secure & dependable storage services in cloud computing
DESCRIPTION
TRANSCRIPT
![Page 1: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/1.jpg)
PLATFORM : JAVADOMAIN : CLOUD COMPUTING
Guided By : Mr.P.N.Renjith
TOWARDS SECURE & DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING
PRESENTED BY
Rahid.A.K Naabih.C.S Manoj.K.S
![Page 2: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/2.jpg)
Zeroth Review Details
1 Algorithm used :
Byzantine Fault Tolerance Algorithm
Token Pre-computation
Correctness Verification and Error Localization
Error recovery
Reed –Solomon Algorithm
Homomorphic Linear Algorithm
![Page 3: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/3.jpg)
2Existing System and Limitations
Byzantine Error Occurrence.
Physical possession of outsourced data.
Pre-Requisition for Client manipulation.
![Page 4: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/4.jpg)
Design Module Description
1.Login
2.New User
3.Client Manipulation
4.Administrator Login
5.Admin Manipulation
3
![Page 5: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/5.jpg)
Operational Module Description
• Adversary Module• Cloud Data Storage Module• Third Party auditing Module• Dynamic Data operation Module
4
![Page 6: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/6.jpg)
Login Module
• Client LoginProvided a user name and password correctness checked by Correctness Verification and
Error Localization
• New User LoginRegistration form for each userValidation done by providing Captcha and verifying email
Id and Telephone number.
5
![Page 7: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/7.jpg)
• Provided with operations such as Download UploadView Delete
Client Manipulation Module
6
![Page 8: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/8.jpg)
![Page 9: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/9.jpg)
![Page 10: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/10.jpg)
9
VALIDATION
REQUEST
RESPONSE
LOGIN
Use-case diagram for user login:
Server Client
![Page 11: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/11.jpg)
UPLOAD
DOWNLOAD
VIEW
DELETE
Use-case diagram for client manipulation :
DATABASE
10
CLIENT
![Page 12: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/12.jpg)
11
Class diagram:
Login
user login
user namePassword
login()
Server login
usernamePassword
login()
client home
uploaddownload
fileupload()filedownload()
server home
client detailslogin detailsfiles details
view overall details()
registration
new user signup
register()
![Page 13: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/13.jpg)
Flowchart : Start
Home
Client loginServer login
Client pageServer page
End
Cloud System
Yes Yes
12
![Page 14: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/14.jpg)
Dataflow Diagram :
Request to CSP
Validate User
Manipulation
Client Home
Client Database
Deny
Access
Monitoring
Acknowledgement
13
![Page 15: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/15.jpg)
Applications :
![Page 16: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/16.jpg)
Project Status :
25%
![Page 17: Towards secure & dependable storage services in cloud computing](https://reader033.vdocuments.mx/reader033/viewer/2022061201/5478b1a7b4af9fb4158b45f4/html5/thumbnails/17.jpg)
THANK YOU