Вы находитесь на странице: 1из 9

A Project Report

On
IMPLEMENTATION OF DATA INTEGRITY WITH REGENERATING DATA USING
ERASURE CODE AND TPA SYSTEM
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR, ANANTHAPURAMU

In Partial Fulfillment of the Requirements for the Award of the Degree of

BACHELOR OF TECHNOLOGY
In

COMPUTER SCIENCE & ENGINEERING


Submitted By

K.Arunsimha Reddy

(11691A0506)

R.Pushkar Kumar

(11691A0568)

D.Balaji

(11691A0509)

D.Chaithanya

(11691A0513)

Under the Guidance of


Mr.B.Krishna Sagar, M. Tech.(Ph.D)
Assistant Professor
Department of Computer Science & Engineering

MADANAPALLE INSTITUTE OF TECHNOLGY & SCIENCE


(UGC AUTONOMOUS)
(Affiliated to JNTUA, Ananthapuramu, Approved by AICTE, New Delhi)
AN ISO 9001:2008 Certified Institution
P. B. No: 14, Angallu, Madanapalle 517325.
2011-2015
i

2009-2013

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


BONAFIDE CERTIFICATE
This is to certify that the project work entitled IMPLEMENTATION OF DATA
INTEGRITY WITH REGENERATING DATA USING ERASURE CODE AND TPA
SYSTEM is a bonafide work carried out by

K.Arunsimha Reddy

(11691A0506)

R.Pushkar Kumar

(11691A0568)

D.Balaji

(11691A0509)

D.Chaithanya

(11691A0513)

Submitted in partial fulfillment of the requirements for the award of degree Bachelor
of Technology in the stream of Computer Science & Engineering in Madanapalle
Institute of Technology and Science, Madanapalle, affiliated to Jawaharlal Nehru
Technological University Anantapur, Ananthapuramu during the academic year
2013-2014.
Guide
Mr.B.Krishna Sagar, M.Tech.(Ph.D)
Assistant Professor,
Department of CSE

Head of the Department


Dr.M. Sreedevi,M.Tech., Ph.D,
Assoc. Prof. and Head,
Departments of CSE & IT

Submitted for the University examination held on:

Internal Examiner
Date:

External Examiner
Date:
ii

ACKNOWLEDGEMENT

We sincerely thank the MANAGEMENT of Madanapalle Institute of


Technology and Science for providing excellent infrastructure and lab facilities that
helped me to complete this project.

We sincerely thank Dr. C. Yuvaraj,

M.E., Ph.D.,

Principal for guiding and providing

facilities for the successful completion of our project at Madanapalle Institute of


Technology and Science, Madanapalle.

We express our deep sense of gratitude to Dr. M. Sreedevi, M. Tech., Ph.D., Associate
Professor and Head of the Department of CSE & IT for his valuable guidance and
constant encouragement given to us during this work.

We express our deep gratitude to my guide Mr.B.Krishna Sagar,M.Tech.(Ph.D), Assistant


Professor, Department of CSE for his guidance and encouragement that helped us
to complete this project.

We express my deep sense gratitude to Mr.G.Hemanth Kumar Yadav M. Tech., Project


Coordinator for their guidance and encouragement that helped us to complete this
project.

We also wish to place on record my gratefulness to other Faculty of CSE Department


and also to our friends and our parents for their help and cooperation during our project
work.

iii

DECLARATION
We hereby declare that the results embodied in this project IMPLEMENTATION
OF DATA INTEGRITY WITH REGENERATING DATA USING ERASURE CODE
AND TPA SYSTEM by us under the guidance of
Mr. B.Krishna Sagar,

M. Tech.,(Ph.D)

Assistant Professor, Dept. of CSE in partial

fulfillment of the award of Bachelor of Technology in Information Technology


from Jawaharlal Nehru Technological University Anantapur, Ananthapuramu and
we have not submitted the same to any other University/institute for award of
any other degree.

Date :
Place :

PROJECTASSOCIATES
K.Arunsimha Reddy
R.Pushkar Kumar
D.Balaji
D.Chaithanya Kumar

I certify that above statement made by the students is correct to the best of my
knowledge.

Date :

Guide :

iv

TABLE OF CONTENTS
ABSTRACT

vivii

LIST OF FIGURES

vError! Bookmark not defined.

LIST OF ABBREVIATIONS

CHAPTER NO
1.

ix

TITLE

PAGE NO

1.1
1.2
1.3
1.4

INTRODUCTION
OVERVIEW OF PROJECT
LITERATURE REVIEW
LIMITATIONS
MOTIVATIONS

1
1
2
8
9
10

2.1

AIM AND SCOPE OF THE PRESENT


INVESTIGATION
SCOPE OF THE PROJECT

10

2.2

OBJECTIVES OF THE PROJECT

10

2.3

EXISTING SYSTEM

10

2.4

PROBLEM STATEMENT

11

2.5

OVERVIEW OF PROPOSED SYSTEM

11

2.

3.

METHODS AND ALGORITHM USED

12

3.1

HARDWARE REQUIREMENTS

12

3.2

HARDWARE DESCRIPTION

12

3.3

SOFTWARE REQUIREMENTS

13

3.4

SOFTRWARE DESCRIPTION

14

3.5

SYSTEM DESIGN

15

3.5.1 Architecture diagram

16

3.6

PROPOSED METHODOLOGY

17

3.7

MODULES
3.7.1 Data owner
3.7.2 Main cloud server
3.7.3 Data splitting and encryption
3.7.4 Parity bit addition and erasure code

17
17
18
18
18

CHAPTER NO

4.

TITLE

PAGE NO

3.7.5 Trusted party auditor


3.7.6 Replica server
3.8 ALGORITHMS USED
3.8.1 AES algorithm
3.8.2 Random key generation
RESULTS AND PERFORMANCE ANALYSIS
4.1 RESULTS
4.1.1 User login
4.1.2 User registration
4.1.3 Successful registration

24

4.1.4 Successful login

25

4.1.5 To upload a file

25

4.1.6 Browse file to upload

26

4.1.7 Select file to upload

27

4.1.8 Uploaded successful

27

4.1.9 File replication in cloud server

28

4.1.10 Download file

30

4.1.11 TPA

31

4.2 PERFORMANCE AND ANALYSIS


5.

19
19
19
19
22
23
23
23
24

SUMMARY AND CONCLUSION

34
36

5.1 SUMMARY

36

5.2 CONCLUSION

36

5.3 FUTURE WORK

36

REFERENCES

37

APPENDIX

39

CODING

39

PUBLICATION REPORT

54

vi

ABSTRACT
In the existing system, cloud computing uses MRPDP and HAIL method for
regenerating code has to minimize repair traffic. In the proposed system, using
Functional Minimum-Storage Regenerating-Data Integrity Protection (FMSR-DIP)
codes for allow clients to remotely verify the integrity of random subsets of long term
archival data under multi server setting. FMSR-DIP codes perform basic file operations
Upload, Download, Check and Repair for 1. Read data from the other surviving
servers, 2. Reconstruct the corrupted data of the failed server, and 3. Write the
reconstructed data to a new server using NCCloud. FMSR-DIP codes preserve fault
tolerance and repair traffic saving. Modification of this Project is Data is encrypted,
splitted and stored in separate Servers. After Data is Splitted, Parity Bit is added to
that and stored in replica Servers also for Backup. The proposed system also changes
the Data into Hash format using SHA 256 Algorithm. TPA is used to verify the Data
Integrity. The proposed system uses Erasure Code implementation for Code
Reconstruction Technique.

vii

LIST OF FIGURES
FIGURE NO

TITLE

PAGE NO

3.1

Architecture Diagram

15

4.1

User Login

23

4.2

User Registration

24

4.3

Successful Registration

24

4.4

Successful Login

25

4.5

Uploading file

26

4.6

Browse the File to Upload

26

4.7

Select the File to Upload

27

4.8

Upload Successful

28

4.9

File Replication in Cloud Server

28

4.10

Text File in Cloud

29

4.11

Bit Conversion of Text

29

4.12

Downloading File

30

4.13

Downloaded File

30

4.14

TPA

31

4.15

File Corruption

32

4.16

Sending the Corrupted File Information

32

4.17

Deleting File

33

4.18

Checking Replica Server

33

4.19

Downloading the Actual File

34

4.20

Performance Analysis

34

viii

LIST OF ABBREVATIONS
POR

Proof of Retrievability

PDP

Proof of Data Possession

MR-PDP

Multiple-Replica Provable Data Possession

HAIL

High-Availability and Integrity Layer

FMSR-DIP

Functional Minimum Storage RegeneratingData Integrity Protection

DIP

Data Integrity Protection

RDC

Remote Data Checking

RAID

Redundant Array of Inexpensive Disks

RACS

Redundant Array of Cloud Storage

ix

Вам также может понравиться