A Fog-Centric Secure Cloud Storage Scheme
A Fog-Centric Secure Cloud Storage Scheme
ABSTRACT:
The storage service is excellent unless users outsource their sensitive data to cloud storage
server. Cloud server gets full access and control over user’s data once data is outsourced
to the cloud. It can read or search through the user’s data. Recently, fog server based three-layer
architecture has been presented for secure storage. In that architecture, the portion of data to
be stored in cloud, fog and user’s local machine. Some portion of data in the cloud and
their customized hash algorithm, take extra computation/storage overhead, In this project, we
create fog-based cloud storage scheme. In that scheme, data is splitted into multiple blocks
through xor-combination and combine this blocks into 2-blocks or 3-blocks using xor-operation.
So using this scheme, we enhance the efficiency of fog based cloud storage service and
improve the security of fog server for a robust fog centric cloud computing infrastructure and we
we enhance cypto system to secure data without revealing any information from it using AES
algorithm.
SOFTWARE USED:
FRONT-END: PHP
BACK-END: MYSQL
MODULES DESCRIPTION
1. Storing Procedure
Storing procedure takes a file to be uploaded to cloud server securely. It has several steps
and most crucial steps take place in fog server. When the user intends to upload a data file, he
sends the file to the fog server through some secure channel. Then, fog server starts
processing the file.
2. Splitting File
Fog server pads the file as per needs based on system policy. After that fog server splits
the file into several fixed length blocks and combines them. At the end of this step, we
get two sets of 2-block-combinations and 3-blockcombinations together known as combined
blocks.
3. Integrity Processing
For each combined block, fog server generates random number, file key and stores this
information into fog database for future integrity check.
4. Block Management
At this module, fog server determines which block to be stored to which cloud server using
block management technique and stores this metadata into fog database and sends the
blocks to respective cloud servers.
5. Cloud Storage
Cloud server receives and stores the blocks along with metadata into its storage.
6. Retrieval Procedure
Retrieval procedure takes a request of a file, collects necessary combined blocks from
various cloud servers, and checks their integrity. If integrity check fails then it requests
faulty blocks from other cloud servers. When all the necessary combined blocks pass
integrity check, the fog server reconstructs the entire file and sends it back to the user.
Existing System
In exiting system, uploaded data divided and stored into the cloud encrypted format and
corresponding encrypted key, block of data information, file permission details, file owner
details are also stored in the same cloud. Even they are encrypted, when intruders attack the
cloud, they can also know about cloud log information and decrypt file content dishonestly.
Proposed System
Fog server is presented between cloud server and user. In proposed system, when a client
uploads the file into the cloud, first his request will be sent to fog server which divides the data
into no of blocks and send them to cloud. In cloud, divided data will be stored in the different
cloud server. Since cloud server maintains actual data and fog server maintains metadata such as
block of file details, hacker could not compromise both servers. So this system maintains the
files securely from unauthorized access.
ALGORITHM
1. The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and
U.S. government standard for secure and classified data encryption and decryption.
2. The AES has three fixed 128-bit block ciphers with cryptographic key sizes of 128, 192 and
256 bits. Key size is unlimited, whereas the block size maximum is 256 bits.
3. The AES replaced the DES with new and updated features:
The above Hardware specifications were used in both Server and Client machines when
developing.
Processor : Core I3
Ram : 2 GBB
Mouse : Logitech
SOFTWARE SPECIFICATION
SERVER :
Database : My-Sql
CLIENT :