An Efficient and Secure Architecture For Data Storage In Multi Cloud

  • Upload
    ijafrc

  • View
    7

  • Download
    0

Embed Size (px)

DESCRIPTION

In proposed system we are implementing the concept of multiple cloud storage along withenhanced security using EMSE techniques. Where storing complete file on single cloud system willencrypt the file then split the file in different chunks and store it on different cloud and the Metadata required for decrypting and rearranging a file will be stored in metadata managementserver. The basic plan is to use many clouds at constant time to mitigate the risks of maliciousknowledge manipulation, disclosure, and method molding. This design changed targets theconfidentiality of knowledge and process logic. The proposed system, file get distributed at threedifferent location. First location i.e. cloud server is our application and next two more FTP where2nd and 3rd file is store. In proposed system, we design setting page where this will be furtherused by application to upload and download file from created table. Develop a web interface toupload and download files in cloud storage. The different file uploading links are open. The usercan choose the link which we want to upload on cloud. In Proposed system, we are splits the file indifferent portions then encode and store it on different cloud. Meta data necessary for decryptingand moving a file will be stored in metadata management server. File can club with another file. Inthis data are merging in the form of chunks of files are collected at one place which is alreadystored in different cloud server. The rearranging a files and decrypt the file using decryptiontechnique and data stream will convert into original files.

Citation preview

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    1 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    An Efficient and Secure Architecture For Data Storage In

    Multi Cloud. Mr. Gajendrasingh Chandel, Mr.Rajkumar R. Yadav

    Assistant Professor, Student M.tech 2nd Year

    Computer Science & Engineering, SSSIST, Sehor

    A B S T R A C T

    In proposed system we are implementing the concept of multiple cloud storage along with

    enhanced security using EMSE techniques. Where storing complete file on single cloud system will

    encrypt the file then split the file in different chunks and store it on different cloud and the Meta

    data required for decrypting and rearranging a file will be stored in metadata management

    server. The basic plan is to use many clouds at constant time to mitigate the risks of malicious

    knowledge manipulation, disclosure, and method molding. This design changed targets the

    confidentiality of knowledge and process logic. The proposed system, file get distributed at three

    different location. First location i.e. cloud server is our application and next two more FTP where

    2nd and 3rd file is store. In proposed system, we design setting page where this will be further

    used by application to upload and download file from created table. Develop a web interface to

    upload and download files in cloud storage. The different file uploading links are open. The user

    can choose the link which we want to upload on cloud. In Proposed system, we are splits the file in

    different portions then encode and store it on different cloud. Meta data necessary for decrypting

    and moving a file will be stored in metadata management server. File can club with another file. In

    this data are merging in the form of chunks of files are collected at one place which is already

    stored in different cloud server. The rearranging a files and decrypt the file using decryption

    technique and data stream will convert into original files.

    I. INTRODUCTION

    Cloud computing is growing technology in recent years. As on before the development of the cloud

    computing generally the enterprises used to store the data in the internal storage of the organization

    itself. The data stored will be very confidential and even it has some security measures and it is protected

    from the unauthorized user. But in the cloud computing environment the storage of data is somewhere

    from the client workplace and the data storage and security measures will be in the service provider of

    the cloud computing environment. Generally the data is stored after it is encrypted. This is for the

    security of the clients or users data. The explosion in cloud computing over the past few years has led to

    a situation that is common to many innovations and new technologies. This dissertation will attempt to

    clarify the mis-conceptions regarding the topic by offering a comprehensive definition of cloud

    computing and the business benefits it can bring. Security challenges are the biggest obstacles when

    considering the adoption of cloud services. This triggered a lot of research activities, resulting in a

    quantity of proposals targeting the various cloud security threats. Alongside with these security issues

    the cloud paradigm comes with a new set of unique features which open the path towards novel security

    approaches, techniques and architectures. A survey is provided security merits by making use of multiple

    clouds simultaneously. Various architectures are introduced and discussed according to their security

    and privacy capabilities and prospects.

    Cloud computing offers dynamically scalable resources provisioned as a service over the Internet. The

    third-party users, on-demand base, self-service for users, pay as per use and seamlessly scalable

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    2 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    computing resources and services offered by the cloud paradigm promise to reduce capital as well as

    operational expenditures for hardware and software.

    Usually the monolithic system tracks across various PCs means splitting the file into distinct client and

    server modules. In such schemes, the client module controls the user interface and the server provided

    back-end handling, such as record entrance, printing, and so on.

    As computers are proliferated, low cost, and became connected by more bandwidth networks, splitting

    software applications into multiple components became more convenient, with each and every

    component running on a different computer and performing a specialized function. Traditionally, having

    a monolithic system run across multiple computers has splitting the system into separate client and

    server components. In such systems, the client component handles the user interface and the server

    provided back processing, such as database authorization, displaying data, and so on.

    This approach simplified the development, management, administration, and often improved

    performance and robustness, since failure in one computer did not necessarily disable the entire system.

    In proposed system we are implementing the concept of multiple cloud storage along with enhanced

    security using EMSE techniques. Where storing complete file on single cloud system will encrypt the file

    then split the file in different chunks and store it on different cloud and the Meta data required for

    decrypting and rearranging a file will be stored in metadata management server. The basic plan is to use

    many clouds at constant time to mitigate the risks of malicious knowledge manipulation, disclosure, and

    method molding. This design changed targets the confidentiality of knowledge and process logic. It

    provides a solution to the subsequent question.

    Figure: Design of Multi cloud Storage Environment

    II. ASSUMPTION AND OBJECTIVES OF DATA SECURITY ON MULTICLOUD STORAGE ENVIRONMENT

    The assumptions and development of data security on cloud are as follows

    Setting up and configuring different cloud server in order to having storage cloud access

    Using cloud server API develop file accessing method in different cloud.

    Developing encryption technique before storing it on cloud.

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    3 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    Develop a file management classes in dot net.

    Develop a web interface to upload and download files in cloud storage.

    Cloud Server Setting Module

    The proposed system, file get distributed at three different location. First location i.e. cloud server is our

    application and next two more FTP where 2nd and 3rd file is store. In proposed system, we design setting

    page where this will be further used by application to upload and download file from created table.

    Upload And Download Module

    Develop a web interface to upload and download files in cloud storage. The different file uploading links

    are open. The user can choose the link which we want to upload on cloud. User can upload the file on

    cloud such as doc file, video, mp3, etc. Homepage will show list of file uploaded by user from user specific

    directory. In proposed system, we use data list to show file list .File class to get folder and file details like

    file name, file size. Upload file by using file uploaded control we can let the user select file to be upload.

    File Encryption Module

    Setting up and configuring different cloud server in order to having storage cloud access. Each clouds its

    own server. Using encryption technique like AES for file decryption before storing it on multi cloud

    environment. In proposed system, we use combination of AES algorithm and SHA-1 algorithm for

    encryption and splitting of File.

    File Splitting And Merging Module

    In Proposed system, we are splits the file in different portions then encode and store it on different cloud.

    Meta data necessary for decrypting and moving a file will be stored in metadata management server. File

    can club with another file. The basic plan is to use many clouds at constant time to mitigate the risks of

    malicious knowledge manipulation, disclosure, and method meddling. This design changed targets the

    confidentiality of knowledge and process logic. It provides a solution to the subsequent question:

    however will a cloud user avoid absolutely revealing the information or process logic to the cloud

    provider. The information shouldn't solely be protected whereas within the persistent storage, however

    particularly once it's processed.

    The idea of this design is that the applying logic must be divided into fine-grained components and these

    components area unit distributed to distinct cloud. In coding technique, the user encrypts the

    information together with his public key and uploads the cipher texts to the Cloud. The cloud will

    severally figure on the encrypted knowledge to get encrypted result that solely the user will decode. The

    user (or a little trusty non-public cloud) manages the keys and performs the coding and coding

    operations, whereas the huge computation on encrypted knowledge is finished by AN untrusted public

    cloud.

    III. THE DATA ENCRYPTION ON MULTICLOUD ENVIRONMENT

    In proposed methodology Encryption is the conversion of data into a form, called a cipher text that

    cannot be easily understood by unauthorized people. The only way to get meaning out of the cipher text

    is to use AES and the same key to transform it back into the plaintext.

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    4 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    Figure: Data Encryption on Multi Cloud Environment

    IV. THE DATA MERGING ON MULTICLOUD ENVIRONMENT

    In this data are merging in the form of chunks of files are collected at one place which is already stored in

    different cloud server. The rearranging a files and decrypt the file using decryption technique and data

    stream will convert into original files.

    Figure: Data Merging on Multi cloud Environment

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue

    5 | 2015, IJAFRC All Rights Reserved

    V. EXPERIMENTAL RESULT AND ANALYSIS

    This section provides result and analysis of our experiment. Different size of data files are used to

    evaluate performance. The results are taken out

    Following table show the result of our experiment on different file size with calculated average value of

    time.

    Table: Experimental Result in Cloud Environment

    Below Figure shows the experimental result graph respectively for AES, DES and 3DES

    Figure : Comparison of different size of the file using AES in cloud environment

    050

    100150200250300350400450500

    30 32

    Res

    pon

    se Ti

    me

    (MS)

    Sr.

    No.

    File

    Type

    Data

    Size

    (KB)

    AES

    (MS)

    Single

    Cloud

    1 EXEL 30

    2 DOC 32

    3 HTML 286

    4 JPG 763

    5 PDF 2125

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853

    2015, IJAFRC All Rights Reserved

    IMENTAL RESULT AND ANALYSIS

    This section provides result and analysis of our experiment. Different size of data files are used to

    evaluate performance. The results are taken out on the single cloud and multi cloud environment.

    Following table show the result of our experiment on different file size with calculated average value of

    Experimental Result in Cloud Environment

    shows the experimental result graph respectively for AES, DES and 3DES

    : Comparison of different size of the file using AES in cloud environment

    32 286 763 2125

    File Size in KB

    AES

    (MS)

    DES

    (MS)

    3DES

    (MS)

    Single

    Cloud

    Multiple

    Cloud

    Single

    Cloud

    Multiple

    Cloud

    7 8 46 39

    22 6 96 40

    110 97 140 140

    65 10 762 139

    464 169 1517 471

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    4853, Impact Factor 1.317

    www.ijafrc.org

    This section provides result and analysis of our experiment. Different size of data files are used to

    on the single cloud and multi cloud environment.

    Following table show the result of our experiment on different file size with calculated average value of

    shows the experimental result graph respectively for AES, DES and 3DES

    : Comparison of different size of the file using AES in cloud environment

    Single Cloud

    Multiple Cloud

    3DES

    (MS)

    Single

    Cloud

    Multiple

    Cloud

    30 25

    31 29

    102 102

    110 21

    489 193

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue

    6 | 2015, IJAFRC All Rights Reserved

    Figure : Comparison of different size of the file using DES in cloud environment

    Figure : Comparison on different size of the file using 3

    These experimental result shows that EMSE performs better than single cloud in terms of response

    VI. CONCLUSION

    By implementing the cloud based storage many security problems and safe storage issues of Business is

    done. But on the other side many expert state that it is more risky to put the data over single cloud as it

    increase the malicious user attack possibilities, so it is the responsibility of a good cloud service provider

    to ensure secure storage of data on the cloud to his customer. We are trying to provide two way

    securities to the data by encrypting the data and by storing data on the mul

    050

    100150200250300350400450500

    30 32

    Res

    pon

    se Ti

    me

    (MS)

    050

    100150200250300350400450500

    30

    Res

    pon

    se Ti

    me

    (MS)

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853

    2015, IJAFRC All Rights Reserved

    Comparison of different size of the file using DES in cloud environment

    : Comparison on different size of the file using 3-DESin cloud environment

    These experimental result shows that EMSE performs better than single cloud in terms of response

    By implementing the cloud based storage many security problems and safe storage issues of Business is

    done. But on the other side many expert state that it is more risky to put the data over single cloud as it

    attack possibilities, so it is the responsibility of a good cloud service provider

    to ensure secure storage of data on the cloud to his customer. We are trying to provide two way

    securities to the data by encrypting the data and by storing data on the mul

    32 286 763 2125

    File Size in KB

    32 286 763 2125

    File Size in KB

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    4853, Impact Factor 1.317

    www.ijafrc.org

    Comparison of different size of the file using DES in cloud environment

    DESin cloud environment

    These experimental result shows that EMSE performs better than single cloud in terms of response time.

    By implementing the cloud based storage many security problems and safe storage issues of Business is

    done. But on the other side many expert state that it is more risky to put the data over single cloud as it

    attack possibilities, so it is the responsibility of a good cloud service provider

    to ensure secure storage of data on the cloud to his customer. We are trying to provide two way

    securities to the data by encrypting the data and by storing data on the multiple servers. Also, the

    Single Cloud

    Multiple Cloud

    Single Cloud

    Multiple Cloud

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    7 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    responsibility of storing the sensitive data about the user accounts is taken by different central server,

    which will help in securing the data from attacks hence by designing the proposed system we are

    extending the storage cloud security by distributing and encrypting the data. The performance of this

    technique shows that it provide the better result for storing, uploading, encryption time.

    VII. REFERENCES

    [1] Eman M.Mohamed, Hatem S. Abdelkader, Sherif EI-Etriby, Enhanced Data Security Model for

    Cloud Computing, The 8th International Conference on informatics and Systems (INFOS2012),

    Cairo, pp CC-12-CC17, May 2012.

    [2] J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono,N. Marnau, Security and Privacy-Enhancing Multi-

    cloud Architectures, IEEE Transaction on dependable and secure computing, VOL. 10, NO. 4, pp

    212-224, March 2013.

    [3] Kan Yang, Ren, XiaohuaJia, Bo Zhang, and Ruitao Xie, DAC-MACS: Effective Data Access Control

    for Multi-Authority Cloud Storage Systems, Information Forensic and Security, IEEE Transaction

    on, Vol: 8, Issue: 11, pp 1790-1801, Aug 2013.

    [4] P. Mell and T. Grance, The NIST definition of cloud computing, National Institute of Standards

    and Technology, NIST special publication, Computer Security Division, Sept 2011.

    [5] Jing-Jang Hwang and Hung-Kai Chuang A Business Model for Cloud Computing Based on a

    Separate Encryption and Decryption Service, Information Science and Application (ICISA),

    International Conference, Jeju Island, pp 1-7, April 2011.

    [6] J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, Security Prospects through

    Cloud Computing by Adopting Multiple Clouds, Proc. IEEE Fourth Intl Conf. Cloud Computing

    (CLOUD),Washington, DC , pp 565-572 ,July 2011.

    [7] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical Security Issues in Cloud

    Computing In Proceeding of IEEE Intl Conf. Cloud Computing (CLOUD-II), Bangalore, pp 109-

    118, Sept 2009.

    [8] Kan Yang, XiaohuaJia, Attributed-based Access Control for Multi-Authority Systems in Cloud

    Storage, in Proceeding of IEEE 32nd International Conference on Distributed Computing

    Systems , Macau , pp 536-545,18 21, June 2012.

    [9] Prakash G L, Dr. Manish Prateek, Dr. Inder Singh Data Encryption and Decryption Algorithms

    using Key Rotations for Data Security in Cloud System Signal Propagation and Computer

    Technology (ICSPCT), 2014 International Conference on, Ajmer, July 2014.

    [10] M. A. AlZain, B. Soh and E. Pardede, MCDB: Using Multi-Clouds to Ensure Security in Cloud

    Computing, in Proceeding of 2011 Ninth IEEE International Conference on Dependable,

    Autonomic and Secure Computing, Sydney, NSW, pp 784-791, Dec 2011.

    [11] C. Selvakumar, G. JeevaRathanam, M.R.Sumalatha PDDS Improving Cloud Data Storage

    Security Using Data Partitioning Technique Advanced Computing Conference (IACC) ,pp 7-11,

    Ghaziabhad , Feb 2013.

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    8 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    [12] Akash Kumar Mandal, Mrs. Archana Tiwari, Performance Evaluation of Cryptographic

    Algorithms: DES and AES, in Proceeding of Students Conference on Electrical, Electronics and

    Computer Science, pp 1-5, Bhopal, March 2012.

    [13] Taeho Jung, Xiang-Yang Li, Zhiguo Wan,Meng Wan Privacy Preserving Cloud Data Access With

    Multi-Authorities INFOCOM, 2013 Proceedings IEEE, Turin, pp 2625 2633 , April 2013.

    [14] ZHANG Wei, SUN Xinwei, Data Privacy Protection Using Multiple Cloud Storages Mechatronic

    Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference

    on, Shengyang, pp 1768-1772, Dec. 2013.

    [15] Ms. S. Vijaya Lekshmi, Mrs. M.P. Revathi, Implementing Secure Data Access Control for

    Multiauthority Cloud Storage System Using Cipher text Policy-Attribute Based Encryption,

    Information Communication and Embedded Systems (ICICES), 2014 International Conference on,

    Chennai , pp 27-28 Feb. 2014.

    [16] Prashant Kumar , Lokesh Kumar, Security Threats to Cloud Computing, International Journal of

    IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013.

    [17] Bupesh Mansukhani, Tanveer A. Zia, An empirical study of challenges in managing the security

    in cloud computing In Proceedings of the 9th Australian Information Security Management

    Conference, Edith Cowan University, Australia, pp 172-181 , December 2011 .

    [18] Elminaam, D S Abd; Kader H M Abdual and Hadhoud, M Mohamed, Evaluating the Performance

    of Sysmmetric Encryption Algorithms, International Journal of Network Security, Vol. 10, No. 3,

    pp 216-222, May 2010.

    [19] G.Devi, M.Pramod Kumar, A CRM Service Based on a Separate Encryption and Decryption using

    Blowfish algorithm International Journal of Computer Trends and Technology- volume 3, Issue 4,

    pp 592-596, Aug 2012.

    [20] Jawahar Thakur, Nagesh Kumar, AES, DES, .Blowfish: Symmetric key algorithm Simulation based

    performance analysis, International Journal of Emerging Technology and Advanced Engineering

    ,Volume 1, Issue 2, pp 6-12, December 2011.

    [21] Sunil Sanka, Chittaranjan Hota, Muttukrishnan Rajarajan, Secure Data Access in Cloud

    Computing IEEE 4th International Conference on Internet Multimedia Services Architecture and

    Application (IMSAA), Banglore, pp 1-6, December 2010.

    [22] Balasaraswathi V.R.I, Manikandan , Enhanced Security for Multi-Cloud Storage using

    Cryptographic Data Splitting with Dynamic Approach, Advanced Communication Control and

    Computing Technologies (ICACCCT), 2014 International Conference on, Ramanathapuram ,pp

    1190 1194, May 2014

    [23] Michael Gregg 10 Security Concerns for Cloud Computing

    http://viewer.media.bitpipe.com/1078177630_947/1268847180_5/WP_VI_10SecurityConcerns

    cloudComputing.pdf, Accessed on Jan14.

    [24] Atul Kahate Cryptography and Network Security, Tata Mc-graw Hill, 3rd Edition 2008.

  • International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

    9 | 2015, IJAFRC All Rights Reserved www.ijafrc.org

    [25] Stallings, W; Cryptography and Network Security: Principals and Practices, Prentice Hall, 8th

    Edition, 2009.

    [26] Secaas- category- 8- encryption- implementation, Retrieved 2012, from

    https://cloudsecurityalliance.org/download/secaas-category-8- encryption implementation-

    guidance.

    [27] D.R. Stinson Cryptography Theory and Practice CRC Press, INC., 2002.

    [28] Panchaghare V.K, Eastern Economy Edition, Cryptography and Information Security, PHI

    publication, 17/11/2008