Public Auditing
Public Auditing
Public Auditing
02. Objective
05. Scope
10. Conclusion
11/11/2023
01 ABSTRACT
Cloud computing customers do not own a physical infrastructure rather they rent the usage
from a third party provider .
They consume resources as a service and pay only for resources that they use .
Cloud computing comes in three forms :public cloud , private cloud , hybrid cloud.
User access the application and enjoy the on-demand high quality information and services
from a shared pool of configurable computing resources with out the burden of local data
storage maintenance.
01 ABSTRACT
There is need to develop an effective public aditing protocol which overcomes the limitation of the
existing auditing scheme.
Cloud storage is widely used by both individual users and organizational user due to its efficient
and scalable data storage services.
Because of vulnerabilities of hardware/software , human error and malicious attacks , the audit of
data integrity in cloud has become the focus of research.
It provide security to the users data by encrypting the data and splitting up the file into small
block for storage.
Auditing the cloud storage without demanding a local copy of data enables more efficiency.
03 EXISTING SYSTEM
The existing mechanism a new significant privacy
issue introduced in case of shared memory with the
use of the leakage of identity privacy to public
verifiers . The traditional approach for checking
data correctness is to retrieve the entire data from
the cloud and then verify data integrity by checking
the correctness of signatures.
DISADVANTAGES OF EXISTING SYSTEM
They do not perform the multiple auditing task in simultaneously.
Loss of datas.
Does not provide any privacy for private datas.
Autentication time takes too long.
04 PROPOSED SYSTEM
o The proposed system , a privacy preserving public auditing mechanism for shared data in the
cloud.
o In proposed system we have auditor and secret keys which protects and preserve our data from
the attackers .
ADVANTAGES OF PROPOSED SYSTEM
The proposed system can perform multiple auditing tasks simultaneously.
• 04
07 SOFTWARE AND HARDWARE
REQUIREMENTS
The number of times a particular data file can be audited is limited by the
number of secret key.
09 FUTURE WORK
In our future work will be how to avoid this type of re-computation
introduced by dynamic groups while still preserving identity privacy from the
public verifier during the process of public auditing on shared data.
10 CONCLUSION
o In conclusion , cloud storage is a great way to store data and files
o It is convenient , reliable , and secure.
o You can access your files from anywhere , and you dont have to worry about losing them if
something happens to your computer.
o More and more users have started to use the cloud for their day-to-day personal or professional
activities.
o Cloud storage is essential for anyone who wants to keep their data safe and accessible,especially if
your business heavily relies on it.
THANK YOU