Cloud computing oriented Business Application
Abstract
Cloud
Computing has been envisioned as the next generation architecture of IT
Enterprise. In contract to traditional solutions, where the IT services are
under proper physical, logical and personnel controls, Cloud Computing moves
the application software and database to the large data centers, where the
management of the data and services may not be fully trustworthy. This unique
attribute, however, poses many new security challenges which have not been well
understood. In this article, we focus on cloud data storage security, which has
always been an important aspect of quality services. To ensure the correctness
of users’ data in the cloud, we propose effective and flexible distributed schemes
with two salient features, opposing to its predecessors. By utilizing the
homomorphism token with distributed verification of erasure-coded data, our
scheme achieves the integration of storage correctness insurance and data error
localization, i.e., the identification of misbehaving server(s). Unlike most
prior works, the new scheme further supports secure and efficient dynamic
operations on data blocks, including: data update, delete and append. Extensive
security and performance analysis shows that the proposed scheme is highly
efficient and resilient against Byzantine failure, malicious data modification
attacks, and even server colluding attacks.
SYSTEM ENVIRONMENT
HARDWARE SPECIFICATION
PROCESSOR : Intel Pentium IV 1.8 GHz
MOTHERBOARD
: Intel 915GVSR chipset board
RAM : 1 GB DDR2 RAM
HARD
DISK DRIVE : 160 GB
FLOPPY
DRIVE : 1.44 MB
DVD/CD
DRIVE : Sony 52 x Dual layer drive
MONITOR : 17” Color TFT Monitor
KEYBOARD : Multimedia Keyboard 108 Keys
MOUSE : Logitech Optical Mouse
CABINET
:
ATX I ball.
HUB
:
Complex 16 lines.
BANDWIDTH
: 100 mbps.
SOFTWARE CONFIGURATION
FRONTEND
: ASP.NET 2008
OPERATING SYSTEMS : Microsoft
windows-xp
Database : Ms-Sql server 2005
No comments:
Post a Comment