Professional Documents
Culture Documents
Presentation on Topic
“Encrypted Cloud Service”
“BBDNITM(054)”
Presented To: Presented By:
BBDNITM 1. Abhinav Chowdhury (1605410006)
(CSE) 2. Kailash Chandra (1605410067)
3. Abhijeet Kumar Mishra (1605410005)
Department
4. Amar Nath Chaudhary (1605410019)
5. Abhishek Anand (1605410007)
Content
Introduction
Objective
Existing System
Proposed system
System Modules
Encryption Algorithms
Literature survey
Conclusion
References
Introduction
As organizations and individuals adopt cloud technologies, many have become aware of the serious
concerns regarding security and privacy of accessing personal and confidential information over the
Internet .Database outsourcing to clouds provides users and companies with powerful capabilities to
store and process their data in third-party machines managed by a cloud service provider. However, the
privacy of the outsourced data is not guaranteed as users typically loose physical access control to their
data. In particular, the recent and continuing data breaches highlight the need for more secure cloud
storage systems.
While it is generally agreed that encryption is necessary, cloud providers often perform the encryption
and maintain the private keys instead of the data owners. That is, the cloud can read any data it desired,
providing no privacy to its users. The storage of private keys and encrypted data by the cloud provider is
also problematic in case of data breach. Hence, researchers have actively been exploring solutions for
secure storage on private and public clouds where private keys remain in the hands of data owners.
The most popular solution to protect outsourced data is to encrypt the data before outsourcing to the
cloud. This solution introduces the problem of how to evaluate user queries over the encrypted
Objective
The main objective in this process is a widely used technique for data privacy
protection is to encrypt data before outsourcing to the cloud servers.
The cloud server randomly traverses index and returns different results for the
keyword, and in the meantime, it maintains the accuracy for higher security.
We present both efficient and secure searchable encryption scheme, which can
support top-K similarity search over encrypted data.
We present both efficient and secure searchable encryption scheme, which can
support top-K similarity search over encrypted data. In this scheme, the data
owner
can control the level of query unlink ability without sacrificing accuracy
Existing System
Since security is a major concern in the cloud, it is of great importance for
our Smart-Frame to provide a solution to address that.
Under traditional public key cryptography, each participating entity must
locate and verify the public keys of the receivers.
This is especially burdensome for end user devices in our Smart-Frame,
USER
System Modules-3
Download a File
View details of all the uploaded file
User has to select the file to download and initiate the
download process
Retrieve the Key.
Get the block storage details in cloud
Download all the blocks
Integrity Check
Generate the Hash key for all the files.
Compare the Hash key of the file with Hash Tags in Table.
If Hash Keys Comparison pass for all the file then merge the blocks and
download the file to the user system Else show Integrity Check file
message
to the user.
Transaction
Sign out
Flow Chart
Context Analysis Diagram
Technique and Algorithms
The key generation algorithm.