Main Reference PaperEnhanced Public Auditability & Secure Data Storage in Cloud Computing, IEEE International Advance Computing Conference (IACC), 2013.
  • The proposed scheme utilizes a flexible data segmentation strategy and a ranked merkle hash tree, which supports variable-sized data blocks, authorized third-party auditing and fine-grained dynamic data updates. The client will generate keying materials then upload the data to Cloud Storage Service(CSS). The files segmented are of equal size and large as possible. Different from previous schemes, the client will store a RMHT instead of a MHT as metadata. The client will authorize the Third-party auditor (TPA). The CSS performs the client’s fine-grained update requests and then the client checks whether CSS has performed the updates on both the data blocks and their corresponding authenticators honestly. The data integrity of the data stored on CSS is verified by TPA.

+ Description
  • The proposed scheme utilizes a flexible data segmentation strategy and a ranked merkle hash tree, which supports variable-sized data blocks, authorized third-party auditing and fine-grained dynamic data updates. The client will generate keying materials then upload the data to Cloud Storage Service(CSS). The files segmented are of equal size and large as possible. Different from previous schemes, the client will store a RMHT instead of a MHT as metadata. The client will authorize the Third-party auditor (TPA). The CSS performs the client’s fine-grained update requests and then the client checks whether CSS has performed the updates on both the data blocks and their corresponding authenticators honestly. The data integrity of the data stored on CSS is verified by TPA.

  • To support small and frequent data updates on the cloud

  • To significantly lower the communication overheads

  • To support fine-grained data updates.

+ Aim & Objectives
  • To support small and frequent data updates on the cloud

  • To significantly lower the communication overheads

  • To support fine-grained data updates.

  • Check Point Recovery System – If the system crash, all the requested data blocks are fetched from working machines in the cloud setup.If all the requested data blocks are not returned by the cloud storage provider, then it means data blocks were lost due to system crash. They need to be recovered using recently taken checkpoint. When the TPA communicate with the cloud server for integrity verification, the cloud server will inform the system crash and ask the user to upload the data to the server again.

+ Contribution
  • Check Point Recovery System – If the system crash, all the requested data blocks are fetched from working machines in the cloud setup.If all the requested data blocks are not returned by the cloud storage provider, then it means data blocks were lost due to system crash. They need to be recovered using recently taken checkpoint. When the TPA communicate with the cloud server for integrity verification, the cloud server will inform the system crash and ask the user to upload the data to the server again.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim 3.0.3)

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim 3.0.3)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.