An Intelligent Approach for Data Fortification in Cloud Computing



Similar documents
Security Considerations for Public Mobile Cloud Computing

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

Dynamic Query Updation for User Authentication in cloud Environment

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Data Integrity Check using Hash Functions in Cloud environment

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Security Analysis of Cloud Computing: A Survey

Cloud Computing Services and its Application

Application Based Access Control on Cloud Networks for Data Security

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Manual for Android 1.5

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

CLOUD COMPUTING SECURITY CONCERNS

A Model for Data Protection Based on the Concept of Secure Cloud Computing

Cloud Data Protection for the Masses

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Scientific Journal Impact Factor (SJIF): 1.711

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

About me & Submission details

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Cloud storage Security Mechanism with Authentication in Public Cloud

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

CLOUD COMPUTING An Overview

CHAPTER 8 CLOUD COMPUTING

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Research on Storage Techniques in Cloud Computing

Cloud Computing Security Issues And Methods to Overcome

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Banking Security using Honeypot

Keyword: Cloud computing, service model, deployment model, network layer security.

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 02 Issue: 05 Aug p-issn:

Cryptographic Data Security over Cloud

Role of Cloud Computing in Education

Indian Journal of Science International Weekly Journal for Science ISSN EISSN Discovery Publication. All Rights Reserved

VIRTUALIZATION IN CLOUD COMPUTING

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Chapter 1: Introduction

Mobile Cloud Computing Security Considerations

SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

A Security Integrated Data Storage Model for Cloud Environment

Security Issues In Cloud Computing and Countermeasures

Cloud Web-Based Operating System (Cloud Web Os)

Role Based Encryption with Efficient Access Control in Cloud Storage

Abstract 1. INTRODUCTION

Cloud Computing Services In Libraries: An Overview

Cloud Computing for Education Workshop

Cloud Computing. What is it? Presented by Prof. Dr.Prabhas CHONGSTITVATANA Asst. Prof. Dr.Chaiyachet SAIVICHIT. Source : Montana State Library Archive

A Secure Authenticate Framework for Cloud Computing Environment

Cloud Computing Security Issues and Controls

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

Index-Terms - S-Box Key Exchange, DSKE Method, And Three Layer Security, Modified Diffie-Hellman Key Exchange.

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

How To Compare Resource Allocation In Cloud Computing

Parametric Analysis of Various Cloud Computing Security Models

Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

Cloud Computing: Advantages and Security Challenges

Proposal. Deployment Guide. How to Use CloudBerry Drive with Oracle Storage Cloud Service

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

A Survey on Cloud Security Issues and Techniques

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Performance Analysis of Client Side Encryption Tools

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Transcription:

An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology, Mumbai, India 2 St. Francis Institute of Technology, Mumbai, India Abstract Popularity of cloud computing is increasing now-a- days. With the increasing use of cloud computing we can share information, resources, and data. Also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security of data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjoint stores on different locations. Keywords Cloud, Data Protection Mechanism, Data Security I. INTRODUCTION Popularity of cloud computing is increasing day by day in distributed computing environment. There is a increasing trend of using cloud computing environments for storage of data [1].Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through Internet. Cloud computing has the ability to run a program on many connected computers at the same time [2]. There are basically three types of Cloud Computing service models. They are as follows: 1. Software as a Service (SaaS): The facility given to the user is to use the vendor s applications which are running on a cloud infrastructure. These applications can be accessed by user from anywhere. The user does not need to control these applications which are provided by vendor on the cloud infrastructure [3]. Examples: Google Apps, Microsoft Office 365 [4]. 2. Platform as a Service (PaaS): In this model software or development environment is offered as service upon which higher levels of services can be built means in which applications can be developed and deployed. Examples: Force.com, Google App Engine [4]. 3. Infrastructure as a Service (IaaS): This service provides basic storage and computing capabilities. The user doesn t need to manage cloud infrastructure but he can control applications which are deployed by him, stored data on cloud infrastructure etc. Examples: Amazon EC2, Windows Azure [4] Deployment models of cloud computing: 1. Private Cloud: The cloud infrastructure is built for individual or single enterprise and which will be used by multiple users. Private cloud is maintained and controlled by that organization only[3]. 2. Public Cloud: Public cloud is a set of computing resources which are provided by third party organizations and use by general public [3]. 3. Hybrid cloud: Hybrid cloud is a combination of public cloud and private cloud. Hybrid cloud uses mix of computing resources provided by private as well public cloud [3]. Applications of Cloud Computing: Gmail: Gmail is a free email service which is provided by Google [5]. Dropbox: Dropbox is a file hosting service. In this users can share and store their files, folders [5]. Nowadays cloud computing environments are used for storage of data and to process that data. Applications provided by these cloud environments are available to their authorized users only if internet connection is available. Data on cloud should be stored in such way that is should not be available to any third party without users permission. Managing the security of data and privacy of data is a new challenge in cloud computing [6]. 422

The common solution for data confidentiality is data encryption. To ensure the effectiveness of encryption it is necessary to consider the use of both encryption algorithm and key strength. As the cloud computing environment consist of large amounts of data transmission, storage and handling of data, it also necessary to consider processing speed and computational. Main problem about data encryption is managing the key of encryption. The cloud providers need to maintain keys for a large number of users, key management will become more difficult and complex because the users have not enough expertise to manage the keys [6]. II. RELATED WORK With the cloud computing, user can use various services over the Internet and also on the pay per use model [8]. Instead of storing your data on your own hard drive or updating applications as per your need you can use cloud services over the Internet. Cloud Computing services are used by many enterprises as per their need. As the use of cloud computing increases data security challenges also increase. There are number of data breaches that are happening day by day that affect the cloud growth. The main concern in adapting cloud is its security. Organizations are having large amount of data which gets increased day by day and because of that data security and privacy also needs to increase.increasing growth in information technology makes easy to steal data..of course, the burglar will take the advantage of this feature, so the security of digital data becomes more important. The objective is to ensure that the data required by customer should be confidential means is not being accessed by or not being disclosed to any unauthorized third person in the cloud. The client has to assure themselves that he providers are executing their security responsibility [6] [9]. In two ways it is possible to protect data or file. The first way is to hide the file. If we hide the file, hacker can t find that file and then he can t steal it. To a low level burglar, it is valid to prevent illegal access. But for a hacker, it is very easy to find out the hidden files in your system, so it doesn t work. The second method is encryption of data. If the encryption algorithm is proper, it is difficult to plagiarize the original data. But the question is obvious: the data can be falsified or broken. This method is also not sufficient to secure your data. The system contains three parts: SFS (Security File System) Daemon, FUSE (File System in User space) and Authorization Server. The application process will use system call to access the service of the kernel and start accessing the data. VFS (Virtual File System) in Linux kernel will turn the request to FUSE and then pass it to SFS Daemon. According to authorization result, the SFS Daemon returns the requested data to the application process where as FUSE is a user space file system development framework [9].It consists of: a Kernel Module, a User Space library, a Mount Utility. SFS s function is to provide secure mechanism to data. Authorization server s function is to give authorization to user. When file is created or uploaded by user, author or admin have rights to decide whether user needs the server authorization or not. By organizing the close grouping of these three modules, the file or data protection will performance increased dramatically. The aim of system protect file is not only from access methods and authority of data but also security of content resolution, and can mitigate the chance of data leakage at utmost [9]. III. PROPOSED WORK Cloud computing provides many services to enterprises. Also it is possible to access and store not only our business but also personal data on cloud. But with this benefits security of data is a major concern in cloud computing. Though user authentication is provided to access data but it is not sufficient for the security of data. To overcome this problem, it is necessary to develop a system which will provide not only access rights, encryption of data but also data will be disjointly stored. The aim of this work is to develop a system which will provide highest security to data. The implementation will consist of 4 modules: 1. User Authentication Module: In this module a cloud server will be developed. The server will be managed by an Admin and so admin panel development will be done. In the same way admin will create users and the users created by admin can only access the file by proper authentication. Once authenticated a user can download, read, write a file. Admin plays a vital role in the access rights definition of the users. 2. Encryption of data: Admin will define the role of different users and users data will be encrypt using the AES algorithm. The user access rights to be made more complex as apart from the reading and writing access rights there also needs to be a clear bifurcation of the file type and the prevention of certain files and/or programs can be prevented to safeguard the server data. 423

3. Store data disjoint: When the admin will upload data (file), first file will encrypted and then system will automatically break the file and the files will be stored on different locations of different machines (systems), so file on different system will be in encrypted format. When the admin upload file, he will ask for user s Email_id, validation key and AAES key will be send to that particular user. 4. File Access: When the user want access any file, he will request for that file. The user got validation key and encryption key on his email_id.then after providing that keys by user,system will do cross-checking of key with the database. If the key matches then system will put all broken files together and display it to user. User will get that file in decrypted format. - Validation key should be five or more than five numbers and AAES key should be of 16 numbers only. 7. Click on upload button. Server panel will show file has been successfully uploaded. 8. Client panel will show file received. 9. File will break and stored on different client machines on different locations.(file uploading is done) Steps for File Access (Downloading file): 1. To download file, user will provides appropriate login details. 2. Again start the server and connect client to server. If admin have uploaded files in two client machines then connect both the client machines to server. Otherwise server will show an error. 3. Click on download button and provide details like name of the file which user wants to download, validation key and AAES key which user got on his email_id. 4. Click on download button. 5. System will put broken files together; user will get that file and location of that file where the file is stored. 6. Client will show file has been sent to user. IV. RESULTS Figure 1: Proposed Work Steps for File storing (Uploading file): 1. Admin login with correct details 2. Start server. -After starting server, server will automatically show system s IP address, date and time. 3. Admin will create new user who can download the file. 4. On client side, connect client machine to server machine by providing appropriate IP address. (Note: You can connect many client machines to server. In the following results two systems connected to server.) 5. On server side, it will show number of clients connected to server with their system name, date and time. 6. Click on upload file button and provide all the details. (Choose file which you want to upload, AAES key, validation key, user s email_id) Figure 2. Admin login information 424 Figure 3. Server Connection

Figure 4. New User Created by Admin Figure 8. File database information (AAES key and validation key, Host name in database) Figure 5. Client Connected to Server Figure 9. File sucessfully uploded(server Side) Figure 6. Two Clients connected to Server Figure 10. File Receeived Sucessfully (Client Side) Figure 7. File uploading with Encryption key and Validation key Figure 11. Encrypted Broken files on different systems 425

Figure 12. User login information Figure 15. File successfully downloaded from two clients (systems) and showing file path Figure 13. Server connection for downloading file Figure 16. Client showing file sent to user Figure 14. User providing file downloading details which he got on his email_id Figure17. Merged file from two systems V. PERFORMANCE ANALYSIS Performance of the system will be measured on the strength of security provided. The performance parameters include read, write, upload, and download operation to file and breaking of file. 426

Performance will be analysed on four layers for security of data: 1. Authentication of User and defining roles of user 2. Encryption of data 3. Breaking of data and then storing that data on different locations VI. CONCLUSION In information society, data is become one of the most important part to company or individual. At the same time data leakage becomes an important aspect. By designing four layers for security of data which consist of providing authentication of user, and from administrator side access control mechanism is also provided to each user.based upon that only user can perform various activities. Also user s data will be stored in encrypted format. User s data will be stored disjoint so hacker cannot access whole data. Using the combination of this four layers security of file can be increased. REFERENCES [1] Ranjita Mishra, Sanjit Kumar Dash, A Privacy Preserving Repository for Securing Data across the Cloud,Electronics Computer Technology(ICECT), vol. 5, pp.6-10, 2011 [2] www.isim-indore.blogspot.in/2013/08/cloud-computing-iscolloquial-expression.html, Cloud computing is a colloquial expression, 22 Aug 2013 [3] www.csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf, NIST Definition of Cloud, 22 Aug 2013 [4] www.stackoverflow.com/questions/16820336/what-is-saas-paasand-iaas-with-examples, Cloud computing service models, 30 Aug 2013 [5] www.thebowditchgroup.com/17-cloud-computing-applicationssmall-business,cloud Computing Applications, 15 Sep 2013 [6] Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, vol.1.pp.647-651, 2012 [7] Wayne A. Jansen, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 44th Hawaii International Conference on System Sciences (HICSS), pp.1-10, 2011 [8] Di Iu, Pingchang Bai, Hong Jiang, Using The User Space File System To Protect File International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp.350-353,2010. [9] V.Nirmala,R.K.Sivanandhan,Dr.R.ShanmugaLakshmi, Data Confidentiality and Integrity Verification Using User Authentication Scheme in Cloud IEEE International Conference on Green High Performance Computing (ICGHPC),pp.1-5, 2013 427