You are on page 1of 16

CLOUD BASED DATA

DIVISION FOR DATA


SECURITY
ABSTRACT

• Cloud computing is the most demanded advanced technology


throughout the world.
• Data stored over cloud and flow through network in the plain text
format is security thread.
• The data classification is used to provided the effective level of
security and secured the sensitive data.
MODULES
• Admin
• User
MODULES
 ADMIN
 Login
 View user details
MODULES
 USER
 Register
 Login
 Send data
MODULE DESCRIPTION
• Admin login
Admin will login to this system with his
own username and password. He will
login to this system monitoring user
send data. He will maintain all user data
which are sent by users. y permits to
view the users register details.
MODULE DESCRIPRION
• View user details
• Admin will view user details whose are
register in this system.
• He can view details which is entered by
the user while registration.
MODULE DESCRIPTION
• View Data
• Admin will view user’s send data
through this system.
• The data will created by user while
make mail for his friend.
MODULE DESCRIPTION
• User Register & Login
• User will register in this system before
he sends data through this system. User
will give details in registration like
personal details and create username
and password which will used to login
this system as his wish.
MODULE DESCRIPTION
• Send Data
• In this module, one will send data after
login system to another user as his
friend may be. It will pass through
online. His message was sent to his
friend with encryption format.
MODULE DESCRIPTION
• Data Division
• In this section, User’s send data will
divides into fragments for storing in
multiple servers. The data are sent by
user privately.
MODULE DESCRIPTION
• Store encrypt Data
• By our motive, all fragments which
contain data like unrelated format also it
will store in multiple servers as
unrelated information. The servers are
the folders created in our system.
MODULE DESCRIPTION
• Receive Data
• The other user who is waiting for data
will get data from multiple servers with
appropriate authentication process.
DISADVANTAGES OF EXISTING SYSTEM

• Old Data is not security


• The data thief easily picks up the data
• Data secured level is to low.
ADVANTAGES OF PROPOSED
• Efficient and trending method for data
security
• Splitting data and storing data is easy
• Its reduces cost vise and time
consuming process.
O U
K Y
AN
TH

You might also like