Thursday, December 27, 2012
1
2
.Trusted Platform Module
IEEE Java Project - CLOUD DATA PRODUCTION FOR MASSES
ABSTRACT
Offering strong data
protection to cloud users while enabling rich applications is a challenging task.
We explore a new cloud platform architecture called Data Protection as a
Service, which dramatically reduces the per-application development effort
required to offer data protection, while still allowing rapid development and
maintenance.
EXISTING SYSTEM
Cloud computing promises lower costs, rapid
scaling, easier maintenance, and service availability anywhere, anytime, a key
challenge is how to ensure and build confidence that the cloud can handle user
data securely. A recent Microsoft survey found that “58 percent of the public
and 86 percent of business leaders are excited about the possibilities of cloud
computing. But more than 90 percent of them are worried about security,
availability, and privacy of their data as it rests in the cloud.”
PROPOSED SYSTEM
We propose a new cloud computing paradigm, data protection
as a service (DPaaS) is a suite of security primitives offered by a
cloud platform, which enforces data security and privacy and offers
evidence of privacy to data owners, even in the presence of potentially
compromised or malicious applications. Such
as secure data using encryption, logging, key management.
MODULE DESCRIPTION:
1. Cloud Computing
2. Trusted Platform Module
3. Third Party Auditor
4.
User Module
1. Cloud
Computing
Cloud computing is the provision of dynamically
scalable and often virtualized resources as a services over the
internet Users need not have knowledge of, expertise in, or control
over the technology infrastructure in the "cloud" that supports them.
Cloud computing represents a major change in how we store information and run
applications. Instead of hosting apps and data on an individual desktop
computer, everything is hosted in the "cloud"—an assemblage
of computers and servers accessed via the Internet.
Cloud computing exhibits the following key characteristics:
1. Agility improves with users' ability to re-provision technological
infrastructure resources.
2. Multi tenancy enables sharing of resources and costs across a large pool of
users thus allowing for:
3. Utilization and efficiency improvements
for systems that are often only 10–20% utilized.
4. Reliability is improved if multiple redundant sites are used, which makes
well-designed cloud computing suitable for business continuity and disaster
recovery.
5. Performance is
monitored and consistent and loosely coupled architectures are constructed
using web services as the system interface.
6. Security could improve due to centralization of data, increased
security-focused resources, etc., but concerns can persist about loss of
control over certain sensitive data, and the lack of security for stored
kernels. Security is often as good as or better than other traditional systems,
in part because providers are able to devote resources to solving security
issues that many customers cannot afford. However, the complexity of security
is greatly increased when data is distributed over a wider area or greater
number of devices and in multi-tenant systems that are being shared by
unrelated users. In addition, user access to security audit logs may
be difficult or impossible. Private cloud installations are in part motivated
by users' desire to retain control over the infrastructure and avoid losing
control of information security.
7. Maintenance of
cloud computing applications is easier, because they do not need to be
installed on each user's computer and can be accessed from different places.
2
.Trusted Platform Module
Trusted
Platform Module (TPM) is both
the name of a published specification
detailing a secure crypto
processor that can store cryptographic keys that
protect information, as well as the general name of implementations of that
specification, often called the "TPM chip" or "TPM Security
Device". The TPM specification is the work of the Trusted Computing
Group.
Disk
encryption is a technology which protects information by converting it into
unreadable code that cannot be deciphered easily by unauthorized people. Disk
encryption uses disk encryption
software or hardware
to encrypt every bit
of data that goes on a disk or disk volume. Disk
encryption prevents unauthorized access to data storage. The term "full
disk encryption" (or whole disk encryption) is often used to
signify that everything on a disk is encrypted, including the programs that can
encrypt bootable operating system partitions. But they must still leave the master boot record
(MBR), and thus part of the disk, unencrypted. There are, however, hardware-based
full disk encryption systems that can truly encrypt the entire boot
disk, including the MBR.
3. Third Party
Auditor
In this module, Auditor views the all user data and
verifying data and also changed data. Auditor directly views all user data
without key. Admin provided the permission to Auditor. After auditing data,
store to the cloud.
4. User Module
User
store large amount of data to clouds and access data using secure key. Secure
key provided admin after encrypting data. Encrypt the data using TPM. User
store data after auditor, view and verifying data and also changed data. User again
views data at that time admin provided the message to user only changes data.
System
Configuration:-
H/W System
Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256
MB(min)
Hard
Disk - 20 GB
Floppy
Drive - 1.44 MB
Key
Board -
Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System
Configuration:-
Operating
System :Windows95/98/2000/XP
Application
Server : Tomcat5.0/6.X
Front
End : HTML, Java, Jsp
Scripts : JavaScript.
Server
side Script : Java Server Pages.
Database :
Mysql
Database
Connectivity : JDBC.
CONCLUSION
As private data moves online, the need to
secure it properly becomes increasingly urgent. The good news is that the same
forces concentrating data in enormous datacenters will also aid in using
collective security expertise more effectively. Adding protections to a single
cloud platform can immediately benefit hundreds of thousands of applications
and, by extension, hundreds of millions of users. While we have focused here on
a particular, albeit popular and privacy-sensitive, class of applications, many
other applications also needs solutions.
Other Recommended Posts on Computer Science Projects, CSE Major Projects, Java Major Projects, Java Projects, Project Ideas, Projects
Subscribe to:
Post Comments (Atom)
1 Responses to “ IEEE Java Project - CLOUD DATA PRODUCTION FOR MASSES”
March 11, 2020 at 8:55 AM
Event information for UFC 249, fight card, tickets, Date, location,press conference time, TV broadcast, live stream online, schedule. How to Watch Live Stream From Anywhere in the World?
Post a Comment