Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. Best Android and PHP Projects for the final year college students The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In addition to the structural advantage of Elimination of certificate management, our ID-DPDP protocol is also efficient and flexible. Based on the client’s authorization, the proposed ID-DPDP protocol can realize private verification, delegated verification and public verification.
The foundations of cloud computing lie in the outsourcing of computing tasks to the third party. Remote data integrity checking is a primitive to address this issue. For the general case, when the client stores his data on multi-cloud servers, the distributed storage and integrity checking are risk. On the other hand, the integrity checking protocol must be efficient in order to make it suitable for capacity-limited end devices. Thus, based on distributed computation, we will study distributed remote data integrity checking model and present the corresponding concrete protocol in multi-cloud storage. And also integrity of user Is not possible in existing system.
- The integrity of data is not possible in existing system
- An existing system public verifier does not check the data in multi cloud
- First, we analyze the performance of our proposed ID-DPDP protocol from the computation and communication overhead. We compare our ID-DPDP protocol with the other up-to date PDP protocols.. Second, we analyze our proposed ID-DPDP protocol’s properties of flexibility and verification. Third, we give the prototypal implementation of the proposed ID-DPDP protocol.
- The signature relates the client’s identity with his private key. Distributed computing is used to store the client’s data on multi-cloud servers. Try this At the same time, distributed computing is also used to combine the multi-cloud servers’ responses to respond the verifier’s challenge.
- In our proposed system each client has a private correspond to his identity (i.e.) name, id or any…
- The public verifier allow the user to correspond to his identity (i.e.) private Key
HARDWARE & SOFTWARE REQUIREMENTS:
v Processor – Pentium –IV
- Speed – 1 GHz
- RAM – 256 MB (min)
- Hard Disk – 20 GB
- Floppy Drive – 44 MB
- Key Board – Standard Windows Keyboard
- Mouse – Two or Three Button Mouse
- Monitor – SVGA
- Operating System : Windows XP or Win 7
- Front End : JAVA JDK 1.7
- Back End : MYSQL Server
- Server : Apache Tomact Server
- Script : JSP Script
- Script : JSP Script
- Document : MS-Office 2007