high security for cloud data storage

29
HIGH SECURITY FOR CLOUD DATA STORAGE AKHIL NADH PC ANU ANNIE KOSHY DHANYA M SABITHA M VARGHESE

Upload: akhil-nadh-pc

Post on 16-Jul-2015

62 views

Category:

Engineering


4 download

TRANSCRIPT

HIGH SECURITY FOR CLOUD DATA STORAGE

AKHIL NADH PCANU ANNIE KOSHYDHANYA MSABITHA M VARGHESE

CLOUD STORAGE

Data Storage

Floppy Disk

Hard drives

External storage devices like thumb drives or

compact discs

CLOUD STORAGE

Why is Cloud Security Important

People Store Everything In Cloud

Personal Photographs

Video Clips

Files

Growing Adoption of Cloud Services in Government

Departments

Data should be safe and secure

What are the challenges?

CSPs believe that Security is End-user’s Issue

Lack of Awareness about Cloud Security

Inconsistent Network Connection Issues

Lack of Proper Cloud Security Standards

Existing System

To secure data, most systems use a combination of techniques,

including:

Encryption

complex algorithm

Encryption key

Authorization practices

ACCESS

Owner User Registration

Owner Upload File

User Registration to view files in cloud

Unauthorised users must not get access to contents

PRIVACY

The user’s cannot simply access the

May can see the details of the file.

To download the file the user should have the key which

can be obtained only with the owner’s permission.

STORAGE

The file user once if he receive the key he can download

the file and access the contents of the file.

The CSP and TPA can have the key but the CSP cannot

modify the contents of the file.

EFFICIENCY

Any file owner can store and share data files with others

in the group by the cloud. The user can know the contents of

only particular if he gets an particular key from the owner

DISADVANTAGES

Passwords are more easy to guess

Celebrity photos leaked from iCloud in 2014

Unauthorised access permission

Examples

Present successful cloud storage system

Google cloud Storage

Microsoft OneDrive

Dropbox

PROPOSED SYSTEM

High Security For Cloud Data Storage

Main Features

Security in Authentication

Security in File Access

PROPOSED SYSTEM

Working

Authentication

File Upload

File Access

WORKING

Authentication

Client has a login form

Password + MAC address = high secure login

Server validate user ,system and send acknowledgement.

Different system ?

Asks client to verify system by OTP generated

Client may / may not trust the new system

WORKING

File Upload

Client Side

File Name & other details associated with file.

Set sharing permissions by entering the username

Server Side

Generate a unique id for every file

(unique id , IP address ) -> owner

unique id + IP is rearranged using a algorithm

This value is set as a file attribute

file is uploaded to cloud

WORKING

File Access

Client Side

user searches and request a file

If permitted , can view and download the file

Server Side

Extract the file attribute and rearrange it

unique id + IP -> the owner

Owner Access Permission ->client user name

Permitted user , access to that file is granted

DESIGN

ARRANGEMENTfile attribute : SASC username: hello

S-83 A–65 S–83 C-67

83 mod 5 = 3

0 A

1

2 C

3 S S

4

5

New attribute: 3032

DESIGN

ARRANGEMENT ALGORITHMARRANGEMENT(fileattribute,username)

WHILE fileattribute[i] != '\0'

do

begin

ascii = toascii(fileattribute[i])

letter= ascii mod strlen(username)

if(arrangement.next==NULL)

Arrangement.word[letter]=fileattribute[i]

else

do

begin

Arrangement.next=linktonextlist

Arrangmenet.word[letter]=fileattribute[i]

end else

newattribute[i]=letter

I++

END WHILE

DESIGN

RE-ARRANGEMENT ALGORITHMREARRANGEMENT(newattribute)

WHILE newattribute[i] != '\0'

do

begin

pos = newattribute[i])

if(arrangement.next==NULL)

fileattribute[i]=Arrangement.word[pos]

else

do

begin

Arrangement.next=linktonextlist

fileattribute[i]=Arrangement.word[pos]

end else

END WHILE

Languages Used.

Django 1.7 (web framework)

Python 2.7

IMPLEMENTATION

MODULES

MAIN MODULE

Client module

SUB MODULE

Server module

Admin module

CLIENT MODULE

Client is a user who is engaged in the file access system. A

client has the following features

View and modify client information

View and modify the files

View the shared file details

Can change file sharing permissions.

Upload and download a file to Cloud

SERVER MODULE

Server is a system which manages the user requests and gives back necessary responses properly judging the requests.

ADMIN MODULE

Server is a user who is the sole of High Secure Password

Authentication System.

Can view user details and file details .

If any dispute occurs , he can give the necessary details

preserving the privacy in user agreement .

USECASE DIAGRAM

ADVANTAGES

Security in file authentication improved.

Security in file access improved

DISADVANTAGES

File modification and security in the file modification is

not taken into consideration .

FUTURE SCOPE

Build a CSP by implementing our techniques to improve

the security in authentication and file upload.

File modification and security in file modification will be

taken into consideration

CONCLUSION

“Cloud” is a virtualized pool of computing resources

High Secure Cloud Data Storage is a technique to improve

security over the existing system

Security in authentication and file share is improved

We believe that, we are completed our project on High Secure

Cloud Data Storage