Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati at P.R.P.C.E&M, Amravati Abstract:- In this paper, we are presenting a solution to protect data on the cloud by using splitting technique,encryption technique, Integrity checking also reduce the time it take for storing the data when uses splitting algorithm, users can access and share the data with security assurance including key agreement and authentication. Key-Words: Cloud computing, Data sharing, Cloud storage, security analysis, Authentication, Key Agreement. 1.INTRODUCTION Cutting in recent innovations, with Rapid development of information technologies and Network technologies, demand of information systems in a government departments and organizations has increased to improve their business efficiency but Businesses and organizations benefit through greater productivity and efficiency when data is shared or exchanged with business partners around the world using cloud technology. [1][2]. The Cloud helps the organizations are dynamically scalable computing infrastructure that is available on-demand and in a pay-per-use basis. Although the cloud Infrastructures are much more reliable and efficient [3]. Their are three types of cloud private, public(shared), hybrid cloud each one plays an important role in a architecture like. A private clouds operation is within the organization's internal enterprise data center which may be upto single user level. A public (shared) cloud in which a group of people combinely can make a single cloud and their they can perform an operations on it and it is restricted to only group members. A hybrid cloud in which an all authenticated member can performs all the Page 24
operations on it which is visible to everyone no restrictions on number of users. In today s world, there is a strong need to share information to groups of people around the world at the time of data sharing the data being in an encrypted form, it however becomes complicated to share the data with other users, as this usually requires the data owner to share the decryption key with those users who are deemed to have the access right to the data. It is also an important problem in a cloud to share and integrate the data in data sources of different autonomous systems. Data integration is a solution to the problem when splitted data is going to stored on a cloud, and to share the data in a databases of different autonomous organizations quickly and flexibly an important problem of traditional data integration systems are considered to be a solution of the problem.[4],[5]. 2. LITERATURE REVIEW Data storage in a cloud where the user storing his data through a CSP (cloud service provider) It is of vital importance to guarantee users that their data are being correctly stored and maintains, as users no longer have their data locally. Pengzhi Xu, Xiaomeng Huang, Yongwei Wu, Likun Liu, Weimin Zheng In 2009 has proposed that the cloud technology can provide a comprehensive solution for flexible, and coordinated file sharing among dynamic collections of individuals and institutions. [7]. Shucheng Yu_, Cong Wang, Kui Ren and Wenjing Louhasin In 2009 has proposed that the data owner enjoy fine-grained access control of data stored on untrusted cloud servers, a possible solution would be encrypting to the data through a certain mechanism or by an encryption algorithm. Unauthorized users, including cloud servers are not able to decrypt since they do not have the data decryption keys[6]. Yanjiang Yang,Youcheng Zhang in 2011 has proposed that data encryption turns out to be a data being in an encrypted form, however it becomes cumbersome to sharing data is very much likely to be enforced in a fine-grained fashion in terms of which user has the access right to data with other users, as this typically requires the data owner to share the decryption key with those users who are deemed to have the access right to the data[10]. Page 25
Shan-shan Tu, Shao-zhang Niu, Hui Li, Yun Xiao-ming and Meng-jiao Li in 2012 has proposed that the data stored in the cloud system can meet the problem of stolen and modified illegally. with this cloud storage service, the members of an organization can distribute data with other members easily by uploading their data to the cloud the data can be encrypted before stored in the cloud system but if the data size is extremely large, it will need more time and computing resource.[5] Ching-Nung Yang, Jia-Bin Lai in 2013 has proposed storing the data over multi clouds is efficient, and when this data is encrypted with Shamir s secret sharing algorithm it is guaranteed to be more secure and harder to compromise but the combination of multiclouds and secret sharing algorithm is promising, but as it still deals with many uncertainties the worst case failing probability of the system is low and the time complexity of the system is reduced.[4] Xin HONG, Chun Ming RONG In 2014 has proposed that the data stored on cloud should be splitter over the multiple cloud drive as a chunk of file along with encryption. This paper provides a study on the achievable security merits by making use of multiple different cloud simultaneously.[8] 3. PROPOSED WORK : We have developed an three types of clouds they are private cloud which is only for single user, public cloud(shared) which is restricted for number of user(registered) which are selected at the time of cloud creation and hybrid cloud which is openly available for all the registered members. 3.1 Algorithm used a) MD5 : The MD5 message-digest algorithm is generally used a cryptographic hash function producing a 128-bit (16-byte) hash value Fig.MD5 Algorithm Structure typically expressed in a text format as a 32 digit hexadecimal number. MD5 has been utilized in a large variety of cryptographic applications, and is also generally used to Page 26
verify data integrity. MD5 processes a variable-length message into a fixed-length output of 128 bits. b) File Splitting Algorithm : Step 1 : Select the File Step 2: Calculate the size of file Step 3: If file Size>10 MB 3.1 number 5 3.2 goto step 5 Step 4: Else temp. number = Size/2. 4.1 goto Step 5 Step 5: Split file into temp numbers of subfile. Step 6: Select temp number uploading Thread. Step 7 : Assign each subfile to each thread Step 8: Start Uploading Step 9: Stop c) AES Algorithm : Fig. Cryptographic Tools by Using AES The Steps required to use AES Algorithm. Step 1: Create a key for the file which is to be Encrypted and that key will stored into C:/Key. Step 2: Select the file from the system and Encrypt it with the key which is to be generated in Step 1.and that file will stored in the same place from where it is to be selected just by an Extension.AES. Step 3: To Decrypt the Encrypted file first select the.aes file and Apply the key which is to be generated in Step 1.and that Decrypt File will stored to same place from where it is selected with No Extension of.aes. Step 4: Exit. 4. SYSTEM IMPLEMENTATION & TESTING : Page 27
To improve the cloud data storage security, will work on Data Partitioning Technique, Data Integrity Checking for data storage, and end users can stores their data in cloud with help of cryptographic tool for secure data storage. Fig. Data Spliting and Merging. Provides security to cloud data using Encryption Algorithm : Cloud Computing is not secure computing model because there are several data security issues. The data security is provided to the data which is stored in data centre by using the encryption technique but still there is a loophole through which the data integrity can be compromised means when data is moving from the storage cloud to computational cloud for processing. MD5 Message Digest Algorithm: MD5 message digest algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or message digest" of the input. MD5 is an algorithm that is used to verify data integrity through the creation of a 128bit message digest from data input. Partitioning Data : Partitioning function plays an important role in this work. It splits (break up) larger files into smaller parts to store the data effectively in quick manner enhancing security to data when there is need. The original data is complex and take more time to storing it in cloud,so partitioning role is use to make the storage easy in cloud the partitioned is happens according to file size and make no. of partitioned copies and partitioning takes place automatically when the data is fed for storing in cloud. Original file is also reconstructed at destination side. 4.1 Experiments Result : To carried out a number of performance tests on our system like encryption, integrity preservance mechanism and comparison of uploading data using the splitting and intact file. we measured the performance of our system on local system this performance of our system can also be measured when it is on hosted on some server but this performance may vary Page 28
depends on the speed of internet so for the sack of convenience user have measured on local system. For each of the tests for sharing, used a number of files with sizes ranging from 1KB to 60MB & >60 MB to reflect different application requirements. The files used in the tests ranged from simple text files, to documents and also different image formats. For larger file video, audio files also tested this performance mainly measure when this files are uploaded on cloud(for local system) and the time is calculated for two options like Split and Intact and in all cases of files the Splitted file takes less time compare to intact. 1)Tested uploading time upto 60 MB Data For Split For Intact Size in MB File(Time in millisecond) File(Time in millisecond) 10 345 569 20 452 615 40 562 778 60 609 876 Where, x co-ordinate represents Data Size in MB & y co-ordinates represents Time in Millisecond. 2) Data Access time : Time is Measured by using Stopwatch. Data Size in MB File Downloading 1 3 5 5 20 7 51 10 57 12 Time(seconds) (time may vary) Where, x co-ordinate represents Data Size in MB & y co-ordinates represents Time in second. 15 10 5 0 Time to Download File (Seconds) Time to Download File (Seconds) 1000 800 600 400 200 Split Page 29 0 Intact 3MB 5MB 10MB 20MB 40MB 60MB
5. CONCLUSION & FUTURE SCOPE 5.1 Conclusion : We implemented an efficient data storage security in a cloud where splitting of data enables storing of the data in less time and efficient manner. It also gives way for flexible access and sharing of data. The time is also reduced during storage when concept of splitting is used compare to intact. Dynamic operation like an encryption is another key concept where, encoding and decoding procedure secures the data, when storing into cloud also the data integrity checking detects the threats and misbehaving server at the time of storing the data in a cloud ensuring data security. 5.2 Future Scope : As the usage of cloud computing is going to be enhance at major levels so in the future expecting the higher level of security is to be provided to the cloud as well as data which will be stored on cloud and reduce the time it takes for uploading and accessing the data Also,in the future cryptography mechanism similar to encryption,at the time of splitting of data is going to be implemented based on the access policy set out. REFERENCES : [1] Dr. L. Arockiam, S. Monikandan, Efficient Cloud Storage Confidentiality to Ensure Data Security, 978-1-4799-2352- 6/14/$31.00 2014 IEEE. [2] W. Sharon Inbarani, G. Shenbaga Moorthy, C. Kumar Charlie Paul, An Approach for Storage Security in Cloud Computing- A Survey, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 1, January 2013. [3] Mukesh Kant Tripathi I, Vivek Kumar Sehgal, Establishing Trust in Cloud Computing Security with the Help of Inter- Clouds, ISBN No. 978-1-4799-3914- 5114/$3l.00 2014 IEEE. [4] Ching-Nung Yang, Jia-Bin Lai, Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing, 978-0-7695-5010-7/13 $26.00 2013 IEEE DOI 10.1109/ISBAST.2013.46. [5] Shan-shan Tu, Shao-zhang Niu, Hui Li, Yun Xiao-ming and Meng-jiao Li, Finegrained Access Control and Revocation for Sharing Data on Clouds, 978-0-7695- Page 30
4676-6/12 $26.00 2012 IEEE DOI 10.1109/IPDPSW.2012.265. [6] Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, [7] Pengzhi Xu, Xiaomeng Huang, Yongwei Wu, Likun Liu, Weimin Zheng, Campus Cloud for Data Storage and Sharing, 978-0-7695-3766-5/09 $25.00 2009 IEEE DOI 10.1109/GCC.2009.18 [8] Xin HONG, Chun Ming RONG, Cloud Data Integration Sharing and Service, 978-1-4799-3351-8/14/$31.00 2014 IEEE. [9] Feng Zhao, Chao Li*, Chun Feng Liu, A cloud computing security solution based on fully homomorphic encryption, ISBN 978-89-968650-3-2 February 16,19,2014 ICACT 2014. [10] Yanjiang Yang, Youcheng Zhang, A Generic Scheme for Secure Data Sharing in Cloud, 1530-2016/11 $26.00 2011 IEEE DOI 10.1109/ICPPW.2011.51. Author Profile Page 31
Ashish G. Ahuja Received Bachelor of Engineering in Information Technology from SGB Amravati university & Pursuing Master of Engineering in Computer Science and Engineering from P.R.Pote(Patil) College of Engineering & Mgmt, Amravati. Prof. Komal B. Bijwe Received Master of Engineering in Computer Science and Engineering from SGB Amravati University & Working as a Asst. professor in P.R. Pote (Patil) College of Engineering and Management,Amravati.. Page 32