high security for cloud data storage
TRANSCRIPT
CLOUD STORAGE
Data Storage
Floppy Disk
Hard drives
External storage devices like thumb drives or
compact discs
CLOUD STORAGE
Why is Cloud Security Important
People Store Everything In Cloud
Personal Photographs
Video Clips
Files
Growing Adoption of Cloud Services in Government
Departments
Data should be safe and secure
What are the challenges?
CSPs believe that Security is End-user’s Issue
Lack of Awareness about Cloud Security
Inconsistent Network Connection Issues
Lack of Proper Cloud Security Standards
To secure data, most systems use a combination of techniques,
including:
Encryption
complex algorithm
Encryption key
Authorization practices
ACCESS
Owner User Registration
Owner Upload File
User Registration to view files in cloud
Unauthorised users must not get access to contents
PRIVACY
The user’s cannot simply access the
May can see the details of the file.
To download the file the user should have the key which
can be obtained only with the owner’s permission.
STORAGE
The file user once if he receive the key he can download
the file and access the contents of the file.
The CSP and TPA can have the key but the CSP cannot
modify the contents of the file.
EFFICIENCY
Any file owner can store and share data files with others
in the group by the cloud. The user can know the contents of
only particular if he gets an particular key from the owner
DISADVANTAGES
Passwords are more easy to guess
Celebrity photos leaked from iCloud in 2014
Unauthorised access permission
PROPOSED SYSTEM
High Security For Cloud Data Storage
Main Features
Security in Authentication
Security in File Access
WORKING
Authentication
Client has a login form
Password + MAC address = high secure login
Server validate user ,system and send acknowledgement.
Different system ?
Asks client to verify system by OTP generated
Client may / may not trust the new system
WORKING
File Upload
Client Side
File Name & other details associated with file.
Set sharing permissions by entering the username
Server Side
Generate a unique id for every file
(unique id , IP address ) -> owner
unique id + IP is rearranged using a algorithm
This value is set as a file attribute
file is uploaded to cloud
WORKING
File Access
Client Side
user searches and request a file
If permitted , can view and download the file
Server Side
Extract the file attribute and rearrange it
unique id + IP -> the owner
Owner Access Permission ->client user name
Permitted user , access to that file is granted
DESIGN
ARRANGEMENTfile attribute : SASC username: hello
S-83 A–65 S–83 C-67
83 mod 5 = 3
0 A
1
2 C
3 S S
4
5
New attribute: 3032
DESIGN
ARRANGEMENT ALGORITHMARRANGEMENT(fileattribute,username)
WHILE fileattribute[i] != '\0'
do
begin
ascii = toascii(fileattribute[i])
letter= ascii mod strlen(username)
if(arrangement.next==NULL)
Arrangement.word[letter]=fileattribute[i]
else
do
begin
Arrangement.next=linktonextlist
Arrangmenet.word[letter]=fileattribute[i]
end else
newattribute[i]=letter
I++
END WHILE
DESIGN
RE-ARRANGEMENT ALGORITHMREARRANGEMENT(newattribute)
WHILE newattribute[i] != '\0'
do
begin
pos = newattribute[i])
if(arrangement.next==NULL)
fileattribute[i]=Arrangement.word[pos]
else
do
begin
Arrangement.next=linktonextlist
fileattribute[i]=Arrangement.word[pos]
end else
END WHILE
CLIENT MODULE
Client is a user who is engaged in the file access system. A
client has the following features
View and modify client information
View and modify the files
View the shared file details
Can change file sharing permissions.
Upload and download a file to Cloud
SERVER MODULE
Server is a system which manages the user requests and gives back necessary responses properly judging the requests.
ADMIN MODULE
Server is a user who is the sole of High Secure Password
Authentication System.
Can view user details and file details .
If any dispute occurs , he can give the necessary details
preserving the privacy in user agreement .
DISADVANTAGES
File modification and security in the file modification is
not taken into consideration .
FUTURE SCOPE
Build a CSP by implementing our techniques to improve
the security in authentication and file upload.
File modification and security in file modification will be
taken into consideration