You are on page 1of 8

Abstract

Cloud Computing has been envisioned as the next generation architecture of IT

Enterprise. In contract to traditional solutions, where the IT services are under proper physical,

logical and personnel controls, Cloud Computing moves the application software and database to

the large data centers, where the management of the data and services may not be fully

trustworthy. This unique attribute, however, poses many new security challenges which have not

been well understood. In this article, we focus on cloud data storage security, which has always

been an important aspect of quality services. To ensure the correctness of users’ data in the

cloud, we propose effective and flexible distributed schemes with two salient features, opposing

to its predecessors. By utilizing the homomorphism token with distributed verification of

erasure-coded data, our scheme achieves the integration of storage correctness insurance and

data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works,

the new scheme further supports secure and efficient dynamic operations on data blocks,

including: data update, delete and append. Extensive security and performance analysis shows

that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious

data modification attacks, and even server colluding attacks.

Existing system
Representative network architecture for cloud data storage is illustrated in figure.
Three different network entities can be identified as follows:

User: users, who have data to stored in the cloud and rely on the cloud for data computation,
consist of both individual consumers and organizations.

Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building
and managing distributed cloud storage servers, owns and operates live Cloud Computing
systems.

Third Party Auditor (TPA): an optimal TPA, who has expertise and capabilities that users may
not have, is trusted to assess and expose risk of cloud storage services on behalf of the users
upon request.

* In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are
running in a simultaneous, cooperated and distributed manner.
* Data redundancy can be employed with technique of erasure-correcting code to further tolerate
faults or server crash as user’s data grows in size and importance.
* Thereafter, for application purposes, the user interacts with the cloud servers via CSP to access
or retrieve his data.
* In some cases, the user may need to perform block level operations on his data. The most
general forms of these operations we are considering are block update, delete, insert and append.
* As users no longer possess their data locally, it is of critical importance to assure users that
their data are being correctly stored and maintained.
That is, users should be equipped with security means so that they can make continuous
correctness assurance of their stored data even without the existence of local copies.

In case that users do not necessarily have the time, feasibility or resources to monitor their data,
they can delegate the tasks to an optional trusted TPA of their respective choices. In our model,
we assume that the point-to-point communication channels between each cloud server and the
user is authenticated and reliable, which can be achieved in practice with little overhead.

Note: That we don’t address the issue of data privacy in this paper, as in Cloud Computing, data
privacy is orthogonal to the problem we study here.

3.2 Proposed system

Security threats faced by cloud data storage can come from two different sources. On the one
hand, a CSP can be self-interested, untrusted and possibly malicious.
Not only does it desire to move data that has not been or is rarely accessed to a lower tier of
storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due
to management errors, Byzantine failures and so on. On the other hand, there may also exist an
economically motivated adversary, who has the capability to compromise a number of cloud data
storage servers in different time intervals and subsequently is able to modify or delete users’ data
while remaining undetected by CSP for a certain period. Specifically, we consider two types of
adversary with different levels of capability in this paper:

SYSTEM ENVIRONMENT

2.1 HARDWARE SPECIFICATION

PROCESSOR : Intel Pentium IV 1.8 GHz

MOTHERBOARD : Intel 915GVSR chipset board

RAM : 1 GB DDR2 RAM

HARD DISK DRIVE : 160 GB

FLOPPY DRIVE : 1.44 MB

DVD/CD DRIVE : Sony 52 x Dual layer drive

MONITOR : 17” Color TFT Monitor

KEYBOARD : Multimedia Keyboard 108 Keys

MOUSE : Logitech Optical Mouse

CABINET : ATX iball.

HUB : Compex 16 lines.

BANDWIDTH : 100 mbps.


2.2 SOFTWARE CONFIGURATION

FRONTEND : ASP.NET 2005

OPERATING SYSTEMS : Microsoft windows xp

DOCUMENTATION : Microsoft word 2003.

SCRIPTING LANGUAGE : Java Script

MODULES

In the intro page of this web application it contains the list of branches available

for the bank in different countries and a tree view which shows the country names under each

country created, it will have a list of branches available in each state of that country.

It also is having various Modules such as.

Cloud Formation

Create customer

Money integrity
Money transfer

Personal Banking through cloud

Corporate Banking through cloud

1.4 Module Description

Cloud Formation

In Cloud Formation Module it will take us to create country zone. While


creating the country we need to specify the unique country code and code number for each and
every state. According to this project we put some limits such as country can have only 10
branches. If we try to insert more than 10 branches it will provide a message about the limits. If
the same country code was used create a new country it will provide a message as country code
already exists error message. When proper data was entered for the branch, bank will be creates
in that particular country successfully and a acknowledgement will be received.

Create customer:
While creating the customer we need to specify various information’s
such as name, address, id proof, pan card number, passport number, branch code, If the customer
has any existing account or not, if they have an existing account details of those account. And the
referral account holder information has to be specified. After providing all those information
when we click create customer, in the back round process we are creating the customer account
number, Customer ID, Card number, and the crv num.

Money integrity
In the Money integrity form we need to pass the account number, name
of the account holder, branch code, account mode such as credit or debit of the person we are
going to deposit. When those information’s are passed successfully and we click the deposit
amount button the amount will be deposited to that account number, a message will appear for
the conformation of the deposited amount. Particular account holder bank details will be
displayed in the form.

Money Transfer:
In the money transfer form we need to specify the both customers
information such as account number, name of the account holder, branch code, account mode
credit or debit, and the sender has to specify the amount of transfer. When user click transfer in
the back round process the customer account balance will be checked with the transfer amount. If
the customer balance is lower than the amount specified for transfer means a error message is
specified for the user and the transaction will be incomplete. When the user has the sufficient
balance the transaction will take place successfully the transfer amount will be reduced from the
sender amount and that amount will be added to the receiver amount. After those process
completed successfully a message will be displayed to the user about the transaction.

Personal Banking through cloud:

In the personal banking the saving account holders can check there
account balance, list of transaction done by the customer, account personal information can be
edited efficiently, Each account holder will be provided by a unique user id and password, By
using there userid and password they can view there account details as well as personal
information’s . Change password rights are provided to the customer to make there own security
password.

Corporate Banking through cloud:

In the Corporate bank the current account holder has the rights to check
there account information, list of transaction done in there account, Account balance, Account
holders personal information’s. The account holder can view that information only with the
unique user id and password provided by the bank. The account holder has the rights to change
their password according to there wise t maintain their security. If the account holder provides
the wrong user ID or Password it will provide an error.

You might also like