Abstract of cloud data security:

In the era of cloud computing, outsourcing data storage to third-party cloud service providers has become commonplace, introducing new challenges in ensuring data integrity and security. This postgraduate student project presents a comprehensive Attribute-Based Cloud Data Integrity Auditing system aimed at fortifying the security of outsourced data. The project focuses on leveraging attribute-based access control and cryptographic techniques to provide a robust and efficient solution for cloud data integrity auditing.

Existing System: The current landscape lacks a specialized mechanism for attribute-based cloud data integrity auditing, leaving sensitive data vulnerable to unauthorized access and tampering. Traditional approaches often fall short in providing a scalable and flexible solution that aligns with modern cloud computing paradigms.

Proposed System: The proposed system introduces an attribute-based approach to cloud data integrity auditing, allowing data owners to define access policies based on attributes and ensuring that only authorized entities can perform integrity audits. Cryptographic primitives, such as homomorphic hashing, are employed to verify the integrity of outsourced data without exposing the actual content to the auditor.

System Requirements for cloud data security :

  1. Server: High-performance server with multi-core processors
  2. Storage: Adequate storage space for the audit logs and metadata
  3. Network: High-speed internet connection for seamless communication with the cloud service provider

Hardware and Software Requirements:

  1. Hardware:
    • Server: Multi-core processor, minimum 8 GB RAM
    • Storage: 1 TB or more for data and logs
    • Network: Gigabit Ethernet
  2. Software:
    • Operating System: Linux-based server OS
    • Database: MySQL or PostgreSQL
    • Programming Language: Java
    • Cryptographic Libraries: Bouncy Castle
    • Web Server: Apache Tomcat

Architecture:

The system employs a three-tier architecture comprising the client interface, application server, and the cloud storage service. The attribute-based access control module manages user permissions, while the auditing module uses cryptographic techniques to verify data integrity. A secure communication channel ensures the confidentiality of data during transmission.

Technologies Used:

  1. Java for application development
  2. Bouncy Castle for cryptographic operations
  3. MySQL or PostgreSQL for database management
  4. Apache Tomcat as the web server
  5. Attribute-Based Access Control (ABAC) for fine-grained access control

Web User Interface: The web-based user interface provides an intuitive dashboard for data owners to define access policies, monitor audit logs, and configure system settings. It includes interactive visualizations for real-time insights into the integrity status of outsourced data.

This project aims to enhance the security of outsourced data storage by introducing a novel attribute-based approach to cloud data integrity auditing, offering a robust and scalable solution for postgraduate students interested in cloud security and data management.

cloud data security, attribute-based-cloud data integrity-auditing-for-secure-outsourced-storage project, final year projects.
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *