Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420

mani424203 5 views 10 slides May 19, 2025
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

fdsfdsfdfdsfsdff


Slide Content

ATTRIBUTE BASED PROXY RE-ENCRYPTION WITH DIRECT REVOCATION MECHANISM FOR DATA SHARING IN CLOUDS PUNITHA A MCA (2023-25) 612723622024 GUIDED BY MR S.A CHENNAKESAVAN HOD

ABSTRACT Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches.

Introduction The venture of cloud computing provides a significant Progress in the field of IT industry. It is one of the most promising technologies out in the world today which gives numerous benefits to any organization or an individual. It comes with more appealing data storage, on demand services, ubiquitous network access and convenient data exchange for the users. Cloud computing offers solutions for data storage irrespective of local infrastructure limitations as well as equips the users with a platform to process their information. The main focus of this technology is to widen the efficacy of shared resources available in the cloud and also to reallocate them dynamically if needed. Even though the technology provides endless benefits, it lacks tight security capabilities and creates privacy issues for the data owners. Traditional security measures primarily relate to authentication of users to apprehend that the users access their own data fields. Along with the issues regarding security, there arose other issues when the cloud users need to share and access each other’s authorized information to bring about tremendous benefits. An example is considered where a group of supplier, carrier and retailer takes part in the system. Each group has its own set of authorized information and has access permission to access their data. In accessing data from different group privacy is revealed during the access request itself which becomes a security issue here. So, anonymous request matching mechanism is used to protect the privacy of the users. Different access control for different group of users is provided by a trusted third party auditor.

There exist various tools and technologies for multi-cloud, such as Platform VM Orchestrator, VM warevSphere , and Ovirt . These tools help cloud providers construct a distributed cloud storage platform for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with when they are stored into an∙ uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers to provide security techniques for managing their storage services. Existing SYSTEM

PROPOSED SYSTEM To check the availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession and Proofs of Retrievability . Ateniese et al. first proposed the PDP model for ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that achieves the communication cost. They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in advance and users cannot perform block insertions anywhere.

HARDWARE REQUIREMENT SPECIFICATION Processor : Intel Pentium IV Clock speed : 1.8 GHz RAM : 256 MB HDD : 80 GB FDD : 1.44 MB CD Drive : 52x Reader Pointing device : Scroll Mouse Keyboard : 101 Standard Key-board

SOFTWARE REQUIREMENT SPECIFICATION System Architecture : Java Core Language : Jsp , Servlet Operating System : Windows Xp Database : My Sql Server : Apache Tomcat

BIBLIOGRAPHY William Grosso, “JAVA”, O'Reilly Media, Inc.; 1 edition, 2001 John Zukowski, “Definitive Guide to Swing for Java 2”,1999 Roger S.Pressman , “SOFTWARE ENGINEERING –A PRACTIONERS APPROACH “, Tata McGraw Hill Publishing Company, 1997. JAVA 2 Platform, standard Edition, V 1.3.1 API Specification Java RMI: Remote method Invocation(Paperback) Troy Bryan Downing Patrick Naughton “The Java Hand Book” Tata McGraw Hill, 2006 Mark Grand and Jonathan Knudsen, “Java Fundamental Classes Reference”, Tata McGraw-Hill Publishing Company Limited, 1st Edition, May 1997. Dietel & Deitel , Java How To Program, BPB Publishers, New Delhi, 2000. O’reilly , Java Swings, Tata McGrawHill , Fifth Edition, 2002.

Websites www.java.sun.com www.samba.org http://www.db.cs.ucdavis.edu www.microsoft.com www.smartdraw.com www.laynetworks.com