PROJECT TITLE
AUTHORISED DATA REGISTER IN CLOUD
STORAGE
ABSTRACT
In recent years, cloud computing has been very popular in the
research community for its many benfits, but it also raises
issues related to security and privacy. One of the main
problems in the area was the storage and access to
confidential documents. Several researches have especially
looked at ways o scan encrypted documents that have been
placed on remote cloud servers. Although many schemes for
conjunctive Keyword searches have been suggested, less
attention has been given to specialized search methods.
In this post, we introduce a search phrase focused on Bloom
filters with similar or better storage and connectivity rates,
which are significantly quicker than current solutions. A set
of N-G filters are used to support the functionality of our
technology. The system demonstrates a balance between
storage and false positive levels, So that it can be modified to
protect against attacks of inclusion. Also described is a
design approach based on a false positive rate of the
application.
INTRODUCTION
When Organizations and individuals embrace cloud computing, many
have become conscious that exposing sensitive and private information
on the internet raises serious concerns regarding security and privacy.
Recent and ongoing data violations particularly underline the need for
safe cloud storage systems. While encryption is generally agreed, cloud
providers frequently encrypt and keep private key rather than data
owners. The cloud can access whatever data it needs and does not
provide the customers with anonymity. The cloud service even problem
saving backup of private keys and authenticated data if data is abused.
Therfore, researchers have actively explored safe storage solution in
public and private clouds, with private keys still in data Owners hands.
Data encryption has been widely used in the defense of
communication security in circumstances of knowledge sharing,
related to the mathematical calculation and algorithmic pattern,
which may be updated by unauthorized parties as plaintext in
cipher text. There is planned the proliferation of information
secret writing models and the square measurement of the habit
of writing data in code before cloud servers were outsourced.
However, these encryption approaches typically lead to
enormous prices in terms of the knowledge utility that now does
not spillage encrypted knowledge with conventional processing
strategies that have been developed for plaintext knowledge .
SYSTEM REQUIREMENTS
• Hardware System Configuration :-
Processor : Pentium-IV
Ram : 4 GB (min)
Hard Disk : 20 GB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
SOFTWARE REQUIREMENTS :-
• Software Requirements :-
Operating System : Windows XP
Coding Language : Java/J2EE(JSP, Servlet)
Front End : J2EE
Back End : MY SQL
MODULE DESCRIPTION
• Data Owner :
The data Owner uploads the data to the cloud server in this
section. The data Owner encrypts the file and index name for
security purposes and then transfers it to the cloud. You can remove
a certain file from the data Encrypter. He may also view transactions
using the data that he has uploaded to cloud, and will conduct such
operations as Register and Login Info, Req Cloud for permission to
access and display the res Key. Search file, enclosure, Apply ABE and
Download, Digital signed file view and update material.
• Data User :
Users are signed in with their user name and password in this
module. Upon signing in, the user needs a cloud search and will scan
for files with the score of the client and access the file based on the
index Keyword. User can access the file search and also do some
operations such as server Req dec and cloud view, res, search file,
data owner and display, Download the file, Req sec Key permission.
cloud Server :
The cloud server maintains a cloud for storing data. Data owner
encrypt and their data files in the cloud for remote user sharing.
Data users import encrypted data files from their cloud connection
and then decrypt them to access the shared data files.
The cloud server allows the data owner and the data user to
search by the database. This module also displays a custom
search model and the search model of interest.
May view all the attackers and the operations following view
and authorized data owners, view and authorize end users, view
encodings key, view and authorized, view upload files and file
owners. Send the log to the correct owner, display all owners
and users, view file attackers, view all file content attackers,
view file rank results in table, view all file content attackers,
view all file content attackers, and authorize.
FLOW CHART
Flow chart Ow
ner
Data Reg
Owner iste Registe
r r
Browse
r Files Login
Cloud
server
Data user
Attacker
Sec
key
Download files
cloud server
CONCLUSION
In this paper we introduced a bloom filter search phrase which
is considerably faster than current methods and which only
needs one round of correspondence and bloom filter testing.
Instead of location search or sequential chain verification the
solution address high computers costs noted in with the
reformulated of sentence search in n gram verification. In
contast to our schemes only take into account the existence of
a single sentence, which omits any localization information.
•
Thank you