ensuring distributed accountability in the cloud
DESCRIPTION
PPTTRANSCRIPT
![Page 1: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/1.jpg)
Ensuring Distributed Accountability
Project Guide:-Prof.
Group Members:-● Suraj Mehta
![Page 2: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/2.jpg)
Table of Content
● Introduction● Previous System● Current Work● Future Scope● Overviews● Screenshots● Testing● Conclusion● References
![Page 3: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/3.jpg)
Introduction
The Aim of our system is, in addition to the Ensuring Distributed Accountability for Data Sharing in
the Cloud. We use cloud for uploading data owner's data. Data Owner who has uploaded his data on
cloud he is not ensure about his data, so we have to store his data on the cloud by encrypting his data
and then that data is wrapped into jar along with the access policies and then that jar is stored at the
cloud.Then user can access the data.
![Page 4: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/4.jpg)
Existing System
• Centralized
• Single Accountability
• No network connection
• Absences of security policies
• No automatic logging technique
![Page 5: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/5.jpg)
• Decentralized
• Distributed Accountability
• Network Connection Possible
• Security Policies
• Automatic logging technique
Proposed System
![Page 6: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/6.jpg)
Future Scope
• Authentication on JAR’s file
• Indexing on Data
• Storage for Audio Video files
• Data owner notification
![Page 7: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/7.jpg)
1. Upload and Download facilities
2. JAR creation
3. System graph
4. Deletion of data
5. Apply data policy
6. Send merge lock to user
7. Search collection
Product Features
![Page 8: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/8.jpg)
Overview
![Page 9: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/9.jpg)
JAR Structure
![Page 10: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/10.jpg)
Data Policies
![Page 11: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/11.jpg)
System Graph
![Page 12: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/12.jpg)
• Copying Attack
• Disassembling Attack
• Man-in-Middle Attack
Security
![Page 13: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/13.jpg)
Copying Attack
![Page 14: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/14.jpg)
Disassembling Attack
![Page 15: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/15.jpg)
Man-in-Middle Attack
![Page 16: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/16.jpg)
Software Requirements
1. Operating System2. Tomcat 6 or 73. Browser4. MySQL
Hardware Requirements
5. Processor:- P4 6. RAM:- 1GB7. WiFi Connectivity & LAN Connectivity
Technical Specification
![Page 17: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/17.jpg)
Conclusion
● We have achieved Distributed accountability as per the priviledge level of users, which is absent in existing system.
● We have succesfully implemented “https “ protocol .
![Page 18: Ensuring Distributed Accountability in the Cloud](https://reader035.vdocument.in/reader035/viewer/2022062705/55635f88d8b42a2f508b4d1e/html5/thumbnails/18.jpg)
Thank You !