Professional Documents
Culture Documents
Enterprise. In contract to traditional solutions, where the IT services are under proper physical,
logical and personnel controls, Cloud Computing moves the application software and database to
the large data centers, where the management of the data and services may not be fully
trustworthy. This unique attribute, however, poses many new security challenges which have not
been well understood. In this article, we focus on cloud data storage security, which has always
been an important aspect of quality services. To ensure the correctness of users’ data in the
cloud, we propose effective and flexible distributed schemes with two salient features, opposing
erasure-coded data, our scheme achieves the integration of storage correctness insurance and
data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works,
the new scheme further supports secure and efficient dynamic operations on data blocks,
including: data update, delete and append. Extensive security and performance analysis shows
that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious
Existing system
Representative network architecture for cloud data storage is illustrated in figure.
Three different network entities can be identified as follows:
User: users, who have data to stored in the cloud and rely on the cloud for data computation,
consist of both individual consumers and organizations.
Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building
and managing distributed cloud storage servers, owns and operates live Cloud Computing
systems.
Third Party Auditor (TPA): an optimal TPA, who has expertise and capabilities that users may
not have, is trusted to assess and expose risk of cloud storage services on behalf of the users
upon request.
* In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are
running in a simultaneous, cooperated and distributed manner.
* Data redundancy can be employed with technique of erasure-correcting code to further tolerate
faults or server crash as user’s data grows in size and importance.
* Thereafter, for application purposes, the user interacts with the cloud servers via CSP to access
or retrieve his data.
* In some cases, the user may need to perform block level operations on his data. The most
general forms of these operations we are considering are block update, delete, insert and append.
* As users no longer possess their data locally, it is of critical importance to assure users that
their data are being correctly stored and maintained.
That is, users should be equipped with security means so that they can make continuous
correctness assurance of their stored data even without the existence of local copies.
In case that users do not necessarily have the time, feasibility or resources to monitor their data,
they can delegate the tasks to an optional trusted TPA of their respective choices. In our model,
we assume that the point-to-point communication channels between each cloud server and the
user is authenticated and reliable, which can be achieved in practice with little overhead.
Note: That we don’t address the issue of data privacy in this paper, as in Cloud Computing, data
privacy is orthogonal to the problem we study here.
Security threats faced by cloud data storage can come from two different sources. On the one
hand, a CSP can be self-interested, untrusted and possibly malicious.
Not only does it desire to move data that has not been or is rarely accessed to a lower tier of
storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due
to management errors, Byzantine failures and so on. On the other hand, there may also exist an
economically motivated adversary, who has the capability to compromise a number of cloud data
storage servers in different time intervals and subsequently is able to modify or delete users’ data
while remaining undetected by CSP for a certain period. Specifically, we consider two types of
adversary with different levels of capability in this paper:
SYSTEM ENVIRONMENT
MODULES
In the intro page of this web application it contains the list of branches available
for the bank in different countries and a tree view which shows the country names under each
country created, it will have a list of branches available in each state of that country.
Cloud Formation
Create customer
Money integrity
Money transfer
Cloud Formation
Create customer:
While creating the customer we need to specify various information’s
such as name, address, id proof, pan card number, passport number, branch code, If the customer
has any existing account or not, if they have an existing account details of those account. And the
referral account holder information has to be specified. After providing all those information
when we click create customer, in the back round process we are creating the customer account
number, Customer ID, Card number, and the crv num.
Money integrity
In the Money integrity form we need to pass the account number, name
of the account holder, branch code, account mode such as credit or debit of the person we are
going to deposit. When those information’s are passed successfully and we click the deposit
amount button the amount will be deposited to that account number, a message will appear for
the conformation of the deposited amount. Particular account holder bank details will be
displayed in the form.
Money Transfer:
In the money transfer form we need to specify the both customers
information such as account number, name of the account holder, branch code, account mode
credit or debit, and the sender has to specify the amount of transfer. When user click transfer in
the back round process the customer account balance will be checked with the transfer amount. If
the customer balance is lower than the amount specified for transfer means a error message is
specified for the user and the transaction will be incomplete. When the user has the sufficient
balance the transaction will take place successfully the transfer amount will be reduced from the
sender amount and that amount will be added to the receiver amount. After those process
completed successfully a message will be displayed to the user about the transaction.
In the personal banking the saving account holders can check there
account balance, list of transaction done by the customer, account personal information can be
edited efficiently, Each account holder will be provided by a unique user id and password, By
using there userid and password they can view there account details as well as personal
information’s . Change password rights are provided to the customer to make there own security
password.
In the Corporate bank the current account holder has the rights to check
there account information, list of transaction done in there account, Account balance, Account
holders personal information’s. The account holder can view that information only with the
unique user id and password provided by the bank. The account holder has the rights to change
their password according to there wise t maintain their security. If the account holder provides
the wrong user ID or Password it will provide an error.