Contenu connexe
Similaire à 50120140504005
Similaire à 50120140504005 (20)
Plus de IAEME Publication
Plus de IAEME Publication (20)
50120140504005
- 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
41
SECURE DATA SHARING THROUGH CLOUD COMPUTING
*Midya Azad Ismail, **Klinsega Jeberson
*Technical College /Kirkuk, Foundation of Technical Education,
Ministry of Higher Education and Scientific Research, Republic of Iraq
**Deptt. of Comp. Science & IT. SSET, SHIATS-DU Allahabad (U.P.) INDIA-211007
ABSTRACT
As an emerging technology and business paradigm, Cloud Computing has taken commercial
computing by storm. Cloud computing platforms provide easy access to a company’s high-
performance computing and storage infrastructure through web services. We consider the problem of
building a secure cloud storage service where the registered user could store their data and can share
them with other registered user.
But due to security reasons the uploaded file is encrypted. The advantages of this task are that
even the person who administrates is not able to read the content of uploaded file. For encrypting and
decrypting the Base64 algorithm is used. This process make our application more secure.
Another security technique is the usage of J2ME technology to implement the application.
When the user registers himself the One Time Password (OTP) will be accessed only through given
mobile number using the mobile device then after entering the OTP to the user login interface
another window will appear asking about security code which is also will be access using the mobile
device for every user login that is the security code will be arbitrary given to the user and he has no
control on it. This is the another program which is integrated with our application. It makes
application more secure.
Keywords: Cloud Computing; Security; Encryption; J2ME Technology.
1. INTRODUCTION
Information Technology has always been considered a major pain point of enterprise
organizations, from the perspectives of both cost and management. However, the information
technology industry has experienced a dramatic shift in the past decade – factors such as hardware
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 4, April (2014), pp. 41-47
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
- 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
42
commoditization, open-source software, virtualization, workforce globalization, and agile IT
processes have supported the development of new technology and business models[4].
Cloud computing now offers organizations more choices regarding how to run
infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral
part of technology and business models, and has forced businesses to adapt to new technology
strategies[4]. Our work attempts to overcome these security threats. The proposed methodology
suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of
the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to
the data only on successful authentication.
Cloud computing is a complex infrastructure of software, hardware, processing, and storage,
all of which are available as a service. It is comprised fundamentally of applications running
remotely (popularly referred to as “in the cloud”) which is made available to all its users. This
technology offers access to a large number of sophisticated supercomputers and their resultant
processing power, connected at numerous locations around the world, thus offering speed in the tens
of trillions of computations per second [2].
Cloud promises tangible cost savings and speed to customers. Using the technology of cloud,
a company can rapidly deploy applications where expansion and contraction of the core technology
components can be attained with the high and low of the business life cycle. This can be achieved
with the help of cloud enablers, such as virtualization and grid computing, that allow applications to
be dynamically deployed onto the most suitable infrastructure at run time. It’s worth noting that
while this might appear alluring, there remain issues of reliability, portability, privacy and security.
2. CLOUD COMPUTING
Cloud computing , or the cloud ,as shown in figure (2.1) is a colloquial expression used to
describe a variety of different types of computing concepts that involve a large number of computers
connected through a real-time communication network (typically the Internet).cloud computing is a
jargon term without a commonly accepted unequivocal scientific or technical definition. In science,
cloud computing is a synonym for distributed computing over a network and means the ability to run
a program on many connected computers at the same time. The phrase is also, more commonly used
to refer to network-based services which appear to be provided by real server hardware, which in fact
are served up by virtual hardware, simulated by software running on one or more real machines.
Such virtual servers do not physically exist and can therefore be moved around and scaled up (or
down) on the fly without affecting the end user - arguably, rather like a cloud.
Figure 2.1: Cloud System
- 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
43
The popularity of the term can be attributed to its use in marketing to sell hosted services in
the sense of application service provisioning that run client server software on a remote location.
2.1 Cloud Storage
Cloud Storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a
model of networked online storage where data is stored in virtualized pools of storage .The data
storage process can be time-consuming and costly[11]. This includes maintaining data servers,
storage disks, firewalls, backup copies and disaster- recovery provisions. My Cloud Storage reduces
these burdens, allowing you to store, retrieve, share, and analyze your data, day after day, without
worrying about maintenance, scaling up or down or hardware and firmware u upgrades[2]. Cloud
storage is shown in figure (2.8).
Figure 2.8: Cloud Storage System
3. PROPOSED WORK
Here the proposed design is a three layered architecture that will ensure the accountability
and track the usage of owner’s data. This architecture is developed to bring trust between end user
and the owner regarding the usage of data. We propose a framework which involves securing of files
through file encryption. The file present on the device will be encrypted using password based
Base64 algorithm. Every uploaded file has a unique key which should be known by the user who
want to download it and he also should know the name of the person who upload that file.
i. Fist Layer – New User Registration
• Any person could register himself for using the cloud service.
• He / She must give the basic information along with a mobile number.
ii. Second Layer – Mobile Based Authentication
• The One Time Password (OTP) will automatically generated by the user at the time of
registration.
• By using the Mobile Device Simulator the user can get the OTP.
• After entering the OTP another window will appear asking about the Security Key which the
user can get by using the Mobile Device Simulator.
iii. Third layer- Upload & Encrypt
• After login the user can upload the files on cloud server for sharing.
• At the time of uploading the files will be encrypted by using the Base64 Algorithm.
• Only after download the user can read the particular file.
- 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
44
3.1 Flow Chart
Figure 3.1: Flow Chart for Login Use
4. RESULT AND DISCUSSION
4.1 Result
Proposed Model has shown the best provided service when it is compare to some of the
existing Cloud Storage Websites.
- 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
45
4.1 Discussion
- The project is executed with high security, without login the user cannot access any kind of
service.
- The logged in user can not download a file directly he can do that only after giving the owner
name and the key of that file.
- The system has been developed by using JSP with integration with J2ME. It provides a lot of
facility for designing a good user interface as well as server side programming.
- The data has implemented by using MySql.
- Here we also use Servlets for implementing different logics.
- 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
46
5. SUMMARY AND CONCLUSION
I have tried my level best for creating a secure system by implementing two types of
password for user login that is OTP and secure code. the first one is get by entering the user mobile
number into the mobile device then after enter that password to the user login interface another page
is appear asking about the second password (I called it secure code) .The secure code is changed
arbitrary by the system for every user access and it cannot be changed by the user. When user upload
a file it will be uploaded with a unique key that made automatically by the system and to enable any
user to download any file from the cloud he must have the security key and the user name of that file.
I am also proving unlimited storage to a user as well as there is no registration cost. The uploaded
data is encrypted using the base64 algorithm this mean that even the person who administrates the
server is not able to read the content of uploaded file.
REFERENCES
1. Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems",
EECE 571B, TERM SURVEY PAPER, (2012).
2. Debajyoti Mukhopadhyay, Gitesh Sonawane et.el, "Enhanced Security for Cloud Storage
using File Encryption", Department of Information Technology Maharashtra Institute of
Technology Pune 411038, India, (2012).
3. Deepanchakaravarthi Purushothamanand, Dr.Sunitha Abburu, "An Approach for Data
Storage Security in Cloud Computing", IJCSI International Journal of Computer Science
Issues, Vol. 9, Issue 2, No 1, ISSN (Online): 1694-0814, (2012).
4. Eugene Gorelik, "Cloud Computing Models", Working Paper CISL# 2013-01 (2013).
5. Issa M. Khalil et.el, "Cloud Computing Security: A Survey", computers ISSN 2073-431X,
(2014).
6. Jijo.S. Nair, BholaNath Roy, "Data Security in Cloud", International Journal of
Computational Engineering Research (IJCER) ISSN: 2250-3005.
7. Mahima Joshi, Yudhveer Singh Moudgil, "SECURE CLOUD STORAGE", International
Journal of Computer Science & Communication Networks, Vol 1(2), 171-175,
ISSN: 2249-5789, (2011).
8. Mariana Raykova et . el, "Privacy Enhanced Access Control for Outsourced Data Sharing",
Columbia University, Department of Computer Science, New York, NY 10027-7003, USA.
9. MdMasoomRabbani, "Enhancing Accountability for Distributed Data Sharing in the Cloud",
International Journal of Engineering and Technology (IJET), Vol 5 No 3, ISSN: 0975-4024,
(2013).
10. Mohit Marwahal, Rajeev Bedi, "Applying Encryption Algorithm for Data Security and
Privacy in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol.
10, Issue 1, No 1, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814, (2013).
11. PENG Yong, ZHAO Wei, XIE Feng, DAI Zhong-hua, GAO Yang, CHEN Dong-qing
"Secure cloud storage based on cryptographic techniques", the journal of china universities of
posts and telecommunications, 19(Suppl.2): 182-189 (2012).
12. Rich Maggiani, “Cloud Computing Is Changing How We Communicate”, In IEEE 978-1-
4244-4358-1/09, (2009).
13. Sai Vamsy et. el, "Data Synchronization Using Cloud Storage", International Journal of
Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11,
ISSN: 2277 128X ,(2012).
14. Saurabh Kumar Garg and Rajkumar Buyya, "Green Cloud computing and Environmental
Sustainability", (2011).
- 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
47
15. Simarjeet Kaur, "Cryptography and Encryption In Cloud Computing", VSRD International
Journal of Computer Science & Information Technology Vol. 2 (3), 242-249, (2012).
16. Talasila Sasidhar, Pavan Kumar Illa, Subrahmanyam Kodukula, "A Generalized Cloud
Storage Architecture with Backup Technology for any Cloud Storage Providers".
17. INTERNATIONAL JOURNAL OF COMPUTER APPLICATION, ISSUE 2, VOLUME 2,
ISSN: 2250-1797, (2012).
Websites
18. https://cloud.google.com/files/CloudStorage.pdf.
19. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ENCRYPTION,
ESSENTIAL GUIDE TO BUSINESS CONTINUITY AND DISASTER RECOVERY
PLANS ARTICLE PUBLISHED ON 10 JUL 2006.