Abstract - Cloud Data Production :- :-
Offering strong data
protection to cloud users while enabling rich applications is a challenging
task. We explore a new cloud platform architecture called Data Protection as a
Service, which dramatically reduces the per-application development effort
required to offer data protection, while still allowing rapid development and
maintenance.
Existing System
Cloud computing
promises lower costs, rapid scaling, easier maintenance, and service availability
anywhere, anytime, a key challenge is how to ensure and build confidence that
the cloud can handle user data securely. A recent Microsoft survey found that
“58 percent of the public and 86 percent of business leaders are excited about
the possibilities of cloud computing. But more than 90 percent of them are
worried about security, availability, and privacy of their data as it rests in
the cloud.”
Proposed System
We propose a new cloud computing
paradigm, data protection as a service (DPaaS) is a suite of security
primitives offered by a cloud platform, which enforces data security and
privacy and offers evidence of privacy to data owners, even in the presence of
potentially compromised or malicious applications. Such as secure data using
encryption, logging, key management.
Module Description
1. Cloud Computing
2. Trusted Platform Module
3. Third Party Auditor
4. User Module
1. Cloud Computing
Cloud computing is the provision of
dynamically scalable and often virtualized resources as a services over the
internet Users need not have knowledge of, expertise in, or control over the
technology infrastructure in the "cloud" that supports them. Cloud
computing represents a major change in how we store information and run
applications. Instead of hosting apps and data on an individual desktop
computer, everything is hosted in the "cloud"—an assemblage of
computers and servers accessed via the Internet.
Cloud computing exhibits the following key characteristics:
1. Agility improves with
users' ability to re-provision technological infrastructure resources.
2. Multi tenancy
enables sharing of resources and costs across a large pool of users thus
allowing for:
3. Utilization and
efficiency improvements for systems that are often only 10–20% utilized.
4. Reliability is
improved if multiple redundant sites are used, which makes well-designed cloud
computing suitable for business continuity and disaster recovery.
5. Performance is
monitored and consistent and loosely coupled architectures are constructed
using web services as the system interface.
6. Security could
improve due to centralization of data, increased security-focused resources,
etc., but concerns can persist about loss of control over certain sensitive
data, and the lack of security for stored kernels. Security is often as good as
or better than other traditional systems, in part because providers are able to
devote resources to solving security issues that many customers cannot afford.
However, the complexity of security is greatly increased when data is
distributed over a wider area or greater number of devices and in multi-tenant
systems that are being shared by unrelated users. In addition, user access to
security audit logs may be difficult or impossible. Private cloud installations
are in part motivated by users' desire to retain control over the
infrastructure and avoid losing control of information security.
7. Maintenance of cloud computing applications is easier, because they
do not need to be installed on each user's computer and can be accessed from
different places.
2 .Trusted Platform Module
Trusted
Platform Module (TPM) is both the name of a published specification detailing a
secure crypto processor that can store cryptographic keys that protect information,
as well as the general name of implementations of that specification, often
called the "TPM chip" or "TPM Security Device". The TPM
specification is the work of the Trusted Computing Group.
Disk encryption is a
technology which protects information by converting it into unreadable code
that cannot be deciphered easily by unauthorized people. Disk encryption uses
disk encryption software or hardware to encrypt every bit of data that goes on
a disk or disk volume. Disk encryption prevents unauthorized access to data
storage. The term "full disk encryption" (or whole disk encryption)
is often used to signify that everything on a disk is encrypted, including the
programs that can encrypt bootable operating system partitions. But they must
still leave the master boot record (MBR), and thus part of the disk,
unencrypted. There are, however, hardware-based full disk encryption systems
that can truly encrypt the entire boot disk, including the MBR.
3. Third Party Auditor
In this module, Auditor views the all user data and verifying data and
also changed data. Auditor directly views all user data without key. Admin
provided the permission to Auditor. After auditing data, store to the cloud.
4. User Module
User store large amount of data to clouds and access data using secure
key. Secure key provided admin after encrypting data. Encrypt the data using
TPM. User store data after auditor, view and verifying data and also changed
data. User again views data at that time admin provided the message to user
only changes data.
For More Details About
this Project Please Contact
Logic
Systems
1st
Floor, Reddy Complex,
Opp.
Spencers, Near
Satyam
Theatre, Ameerpet,
Hyderabad
- 500038
Email
id: logicsystems24x7@gmail.com
Website
:- www.logicsystems.org.in
SYSTEM CONFIGURATION
H/W System Configuration
Processor -
Pentium –III
Speed - 1.1 GHz
RAM - 256 MB (min)
Hard Disk - 20
GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two
or Three Button Mouse
Monitor - SVGA
S/W System Configuration
Operating System :
Windows95/98/2000/XP
Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp
Scripts :
JavaScript.
Server side Script :
Java Server Pages.
Database :
Mysql
Database
Connectivity : JDBC.
0 comments :
Post a Comment