0% found this document useful (0 votes)
75 views11 pages

Webcloud Web Based Cloud Storage For Secure Data Sharing Across Platforms

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views11 pages

Webcloud Web Based Cloud Storage For Secure Data Sharing Across Platforms

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

ISSN: 2366-1313

WEBCLOUD: WEB-BASED CLOUD


STORAGE FOR SECURE DATA
SHARING ACROSS PLATFORMS
Mr. B. NARSINGAM, 2K. VIMAL KUMAR, 3K. NIMESH REDDY, 4K. SANDEEP
1

REDDY

1
(Assistant Professor) ,CSE. Teegala Krishna Reddy Engineering College Hyderabad

B,tech scholar ,CSE. Teegala Krishna Reddy Engineering College Hyderabad


234

ABSTRACT development of interconnected devices and


systems, but it has also presented previously
The need for effective and safe cross-
unheard-of difficulties in preserving the
system data sharing has grown in
security and privacy of shared data.
importance due to the quickly changing
Conventional techniques for transmitting
digital communication and information
and storing data are frequently open to
exchange landscape. This paper presents
intrusions and illegal access. This study
"WebCloud," a new cloud repository
presents "WebCloud," a novel solution to
connected to the internet that is intended to
these problems that tackles the complexities
enable secure information sharing between
of safedata sharing across several platforms.
various platforms. WebCloud provides a
WebCloud combines the strengths of cloud
strong platform that guarantees the
computing and internet access to provide a
confidentiality, integrity, and accessibility of
complete framework that puts data security
shared data by including so phisticated
first without sacrificing usability. The
authentication and encryption techniques.
purpose, goals, and structure of the
This article highlights WebCloud's potential
following sections—which include the
to revolutionize safe information transfer in
WebCloud system's technical features,
a connected society by presenting its
security precautions, and possible uses—are
architecture, essential features, and security
explained in this document.
protocols. A new era of information
exchange has been brought about by the

Volume IX Issue I APRIL 2024 www.zkginternational.com 1265


ISSN: 2366-1313

1. INTRODUCTION and cyber security weaknesses. Asa result,


Web Cloud shows up as a trailblazing
Problem Statement: In the dynamic
solution ready to transform data sharing
landscape of modern information exchange,
procedures. Web Cloud makes use of the
the incessant flow of data across networks
capabilities of cloud computing and the
has underscored the critical need for secure
extensive reach of the internet to enable safe
and efficient data sharing mechanisms. More
and effective information sharing between
and more people and organizations are
various platforms. Web Cloud protects the
looking for ways to maintain the
privacy of shared data with its strong
confidentiality, integrity, and accessibility of
architecture, cutting-edge encryption
their data while facilitating easy information
methods, and strict authentication
sharing. The amalgamation of cloud
procedures.
computing and internet-connected
repositories has brought about a fundamental WebCloud is created with a laser-like focus

transformation in the methods of storing and on security, in contrast to standard cloud

sharing data. Nevertheless, there are a lot of storage solutions. It recognizes the necessity

obstacles in the way of this development, for a strong fortress of protective systems to

such as privacy issues, unauthorized access, preserve confidential data. Data interchange

cyber security risks, and data breaches. To was formerly restricted to localized systems

tackle these obstacles, creative solutions are with few communication channels, which

needed that put security first without hampered the smooth transfer of information

sacrificing usability. Description: Global and limited the accessibility of data. This

system interconnection brought about by the environment has changed with the

quick speed of digitalization has resulted in introduction of cloud computing, which

an exponential increase in data generation makes it possible to store, access, and share

and sharing activities. Information can be data across several devices 2and places.

exchanged for important purposes across the Nevertheless, worries over data security

digital world, from personal chats to continue, which is why WebCloud and other

complicated economic transactions. Still, solutions have been developed. As digital

there are a number of issues with this data- environments change and data becomes

driven progress, such as privacy concerns more essential to contemporary life, creative
solutions like WebCloud stand out as

Volume IX Issue I APRIL 2024 www.zkginternational.com 1266


ISSN: 2366-1313

examples of innovation. Through tackling secondhand attributes to specify the


the urgent problems with data exchange, encrypted dossier and buxom policies into
WebCloud hopes to transform sectors, give consumer's answers; while in our
people more control, and protect the arrangement attributes are used to interpret a
confidentiality of shared data. This user's attestations, and a body encrypting
introduction lays the groundwork for a more dossier decides a policy for the one can
thorough examination of WebCloud's decipher. Thus, our systems are conceptually
technological wonders and its ability to tighter to usual access control orders in the
bring about the advent of a new era of way that Role-Based Access Control
accessible and secure information exchange. (RBAC). In addition, we support an exercise
of our system and present conduct
2. LITERATURE SURVEY
calculations. Wireless Body Area Networks
In various delivered plans a user concede (BANs) be necessary to play a critical part
possibility only within financial means inpatient energy monitoring in the
approach dossier if a user gangs the set of forthcoming future. Establishing secure
attestations or attributes. Currently, the only media middle from two points BAN sensors
designfor sanctioning such tactics search out and outside consumers is key to discussing
engage a trustworthy server to store the the widespread security and solitude
dossier and intercede approach control. concerns
However, if some server locking away the
.In this paper, we suggest the barbaric
dossier is marred, before the secrecy of the
functions to implement a secret-giving
data will be jeopardized. In this paper we
located Ciphertext- Policy Attribute-Based
present a plan for earning complex approach
Encryption (CP_ABE) blueprint, that
control onencrypted data that we call
encrypts the data established an approach
Ciphertext-Policy Attribute-Based
building particularized for one dossier
Encryption. By utilizingour
beginning. We also design two obligation
methodsencrypted dossier maybe observed
stosolidly save the impressionable patient
confidential even though the depository
dossier from a BAN and tell the sensors in a
attendant is untrusted .Moreover, our orders
BAN. Our study indicates that the projected
are secure against collusion attacks.
blueprint is doable, can specify meaning
Previous Attribute Based Encryption wholes
genuineness, and cancounter possible big

Volume IX Issue I APRIL 2024 www.zkginternational.com 1267


ISSN: 2366-1313

attacks to a degree conspiracy attacks and 3.SYSTEM DESIGN


assault-tiring attacks. In this paper, we
3.1 SYSTEM ARCHITECTURE
intend a delivered Prediction-based Secure
and Reliable beating foundation(PSR) for
emerging Wireless Body Area Networks
(WBANs). It maybe joined accompany in
gas pecific crushing obligation to improve
the latest's dependability and avert data dose
attacks all along dossier communication. In
PSR, utilizing past link condition
measurements, each bud anticipates the
characteristic of every related link, and
accordingly any change in the neighbor set
also, for the next future. When skilled are
multiple attainable next hops for bundle
Figure 3.1 System Design of WebCloud
forwarding(in accordance with the
conquering code used), PSR selects the The WebCloud system architecture aims to
individual accompanying the highest called offer a stable and expandable frame work for
link value between them. Specially-tailor- safe data exchange and storage on many
made inconsequential beginning and data platforms. It is made up of a number of inter
confirmation designs are employed by knots connected components, each of which has a
to secure dossier ideas. 4Further, each distinct function in promoting easy
growth adaptively enables or immobilizes communication and guaranteeing user data
beginning authentication in accordance with security. The Data Owner Module, which
predicted neighbour set change and guess enables users to start and oversee safe data
veracity so as to fast clean false beginning storage and sharing operations, is at the
authentication requests. We display that PSR center of the system architecture. The Cloud
considerably increases routing dependability Service Provider Module, which is in charge
and effectively withstand dossier injection of setting up and maintaining the underlying
attacks through meticulous safety analysis infrastructure needed for the WebCloud
and thorough simulation study platform, communicates with this module.

Volume IX Issue I APRIL 2024 www.zkginternational.com 1268


ISSN: 2366-1313

The Cloud Service Provider Module uses so


phisticated security procedures and
compliance checks to safeguard user data,
ensuring the platform's availability,
scalability, and security. Furthermore, the
User's Module facilitates user registration,
authentication, and data access by acting as
Figure 3.2 System Architecture of
an interface between individual users and
WebCloud
the WebCloud platform. After completing
the authentication process successfully, A webpage for accessing and storing data in
users work with the Data Owner Module to Web user agents is provided by the public
safely upload, arrange, and manage access to cloud server. It also provides the following
their data. Sensitive data is encrypted before services
being stored by the Data Encryption Module,
:  PKG creates, sends, and receives system
and data security is increased by the Key
keys and parameters to other entities. It also
Management Module, which guarantees safe
gives the cloud instructions on how to
key production and storage. 10In addition,
remove a user. PKG serves as the primary
the Data Management Module integrates
Certificate Authority (CA) and manages the
critical management features to support data
Public Key Infrastructure (PKI). We
security protocols and is essential in
emphasize that sincekey distribution and
managing encrypted data storage and
certificate issuance are finished
retrieval. The integration of these modules
simultaneously, this only slightly increases
results in a unified system design that
PKG's burden.
guarantees user data
availability ,confidentiality, and integrity he browser and server (B/S) architecture is
within the WebCloud platform, offering adopted by the WebCloud. A public cloud
users a reliable and effective environment server, a private key generator (PKG), data
for exchanging data. owners, and data consumers are the four
parties involved. The following are each
entity's roles: Data owners establish access
controls and encrypt data in accordance

Volume IX Issue I APRIL 2024 www.zkginternational.com 1269


ISSN: 2366-1313

withthesepoliciesbefore uploading it to the their secret keys. PK Gand data owners,


public cloud. We note that it is not difficult however, are taken to be completely
to locate a trusted party (acting as PKG), for trustworthy. TLS provides security for all
example, largebanksor government agencies. the communications. We examine the
adversary models listed below: Passive
 Data consumers download encrypted data
Man-in-the-Middle. The opponent does not
from the public cloud server and decrypt it
carry out any active attacks, such as
locally.
changing network packets; instead, they
 o Transformation keys and encrypted data passively read all network traffic. Web
are reliably stored by Storage Service(SS). Attacker Model. The common security
model for web applications is this one.
o To reduce the computational burden of
According to this concept, an adversary can
decryption for consumers, the
send emails and other messages, access any
Out sourced Decryption Service (DS) pre- open Web application, obtain its client-side
processes the ciphertext and verifies if a data code, and create their own (malicious) Web
consumer has been revoked. o When the apps. The adversary is unable.
current cloud secret key (CSK) is leaked or
ACTIVITY DIAGRAM
updated on a regular basis, Key Update
Service (KUS) is triggered. o New CSK is Activity Diagrams in UML offer visual
added to ciphertexts via the Ciphertext depictions of dynamic workflows, detailing
Update Service (CUS). 11Security Notions: the sequence and conditions of activities
For cloud storage systems, WebCloud's within a system or business process. They
security objective is to shield user data from consist of nodes, representing actions or
server-side disclosure. We take the cloud to decisions, and transitions, illustrating the
be sincere but inquisitive. In an honest flow between these nodes. Initial and final
manner, the cloud offers storage services nodes denote the activity's commencement
and outsources decryption services, for and conclusion, respectively. Control flows
example. Users' data is not altered by connect Decision Nodes: Enable branching
adversaries. While the majority of data in the workflow based on conditions
consumers are truthful, a small percentage
 Control Flows: Connect nodes, defining
may be dishonest and collaborate by sharing
the sequence of execution.

Volume IX Issue I APRIL 2024 www.zkginternational.com 1270


ISSN: 2366-1313

 Initial and Final Nodes: The Activity Diagram provides a visual


representation of the work flow and control
Indicate the start and end points of the
flow with in the WebCloud system. It
activity.
illustrates the sequence of activities,
 Transitions: decisions, and parallel flows involved in
completing a specific task or use case.
Depict the flow of control between nodes.
Activities such as user registration, log in
 Nodes: authentication, data encryption, storage, and
retrieval are depicted along with decision
Represent actions or decisions within the
points and branching conditions. The
workflow.
Activity Diagram aids in understanding the
 actions, dictating the order of execution, system's behavior and logic during
while decision nodes enable branchingbased execution.
on conditions. Additionally, forks and joins
8. OUTPUT SCREENS
manage parallel flows, andswimlanes
partition activities among different entities
for clarity.

Figure 4.1 Cloud Main Page

The output screen represents the login page


interface to login with their respected
credentials

Figure 3.3 Activity Diagram

Volume IX Issue I APRIL 2024 www.zkginternational.com 1271


ISSN: 2366-1313

Figure 4.4 Represents Generating Key for


Encryption

The output screen shows all the Files and


their Generated Keys

Figure 4.2 Represents Upload Files to Cloud

The output screen shows how the user


upload the file

Figure 4.5 Request Mac Key

The above output screen shows the Interface


to Download a File

Figure 4.3 Represents Authorize Data


Owners

The output screen shows the Authorize Data


Owners

Figure 4.6 Decrypt and Download

The above output screen shows a Decrypt


and Download for the user to download the
File

Volume IX Issue I APRIL 2024 www.zkginternational.com 1272


ISSN: 2366-1313

5. CONCLUSION and improvements in cryptographic systems.


All things considered, WebCloud is a big
In conclusion, we introduce WebCloud, a
advancement in improving data security and
novel approach to the pressing problem of
privacy in the context of cloud storage.
safe and intuitive client-side encryption in
WebCloud has the potential to completely
public cloud storage settings over the
transform data protection in the digital age
internet. WebCloud ensures end-to-end data
by enabling users to easily and confidently
security and privacy by utilizing
secure their data thanks to its practicality,
contemporary web technologies to allow
security, and adaptability.
users to conduct cryptographic operations
from within their browsers. We have shown 6.FUTURE ENHANCEMENTS
the usefulness and efficacy of Web Cloud
In future iterations, we plan to implement a
via thorough security study and deployment
number of improvements in next versions to
based on our own Cloud platform. Our
further improve the WebCloud platform's
solution keeps excellent performance and
functionality and usability. Improving the
usability across several web browsers and
system's performance and scalability to
devices, while also offering strong
handle more users and heavier workloads is
encryption for sensitive data. Moreover, the
one possible improvement path. This can
experimental assessment carried out on
entail employing cloud-native technologies,
WebCloud demonstrates its effectiveness
streamlining backend infrastructure, and
and dependability in practical situations. The
putting in place caching techniques to speed
outcomes validate the feasibility of our
up data retrieval. Furthermore, adding
methodology and its capacity to tackle the
support for multi-factor authentication and
security issues that are intrinsic to cloud
broadening the spectrum of supported
storage setups. Additionally, WebCloud's
encryption techniques could improve user
design presents a novel CP-AB-KEM
flexibility and security. To further improve
scheme that is applicable and versatile even
the platform's resilience and dependability,
outside of its primary use case. This extra
integration with cutting-edge technologies
functionality highlights the adaptability and
like blockchain for improved data integrity
creativity built into the WebCloud solution,
and decentralized storage options could be
creating opportunities for wider applications
investigated. Additionally, adding features

Volume IX Issue I APRIL 2024 www.zkginternational.com 1273


ISSN: 2366-1313

like file versioning and collaborative editing [4] “Amazon data leak,” ElevenPaths, Tech.
capabilities, as well as improving the user Rep., November 2018. [Online]. Available:
interface and experience through intuitive https://www.elevenpaths.com/ amazon-data-
design changes, could improve user leak/index.html
satisfaction and encourage adoption. All
[5] K. Korosec, “Data breach exposes trade
things considered, the goal of these next
secrets of carmakers gm, ford, tesla,
improvements is to further advance
toyota,”TechCrunch, Tech. Rep., July 2018.
WebCloud's position as an all-encompassing
[Online].
and important solution for safe data sharing
and storing across a variety of platforms and Available:
user scenarios. https://techcrunch.com/2018/07/20/ data-
breach-level-one-automakers/
7. REFERENCES
[6] M. Grant, “$93m class-action lawsuit
[1] “Vulnearability and threat in 2018,”
filed against city of calgary for privacy
Skybox Security, Tech. Rep., 2018. [Online].
breach,” Tech. Rep., October 2017. [Online].
Available: https://lp.skyboxsecurity.com/
Available:
WICD-2018-02-Report-Vulnerability-
http://www.cbc.ca/news/canada/calgary/city
Threat-18 Asset.html
-calgary-class-action-93-million-privacy-

[2] D. Lewis, “iCloud data breach: Hacking breach-1.4321257

and celebrity photos,” Duo Security, Tech.


[7] (2020, April) Secure file transfer —
Rep., September 2014. [Online]. Available:
whisply. [Online]. Available:

https://www.forbes.com/sites/davelewis/201 https://whisp.ly/en

4/09/02/iCloud-data-breach-hacking-and-
[8] (2020, April) Cryptomator: Free cloud
nude-celebrity-photos
encryption for dropbox and others. [Online].

[3] T. Hunt, “Hacked dropbox login data of Available: https://cryptomator.org/

68 million users is now for sale on the


[9] (2020, April) Whitepapers from
darkweb,”Tech. Rep., September 2016.
spideroak. [Online]. Available:
[Online]. Available:
https://spideroak.com/whitepapers/
https://www.troyhunt.com/the-dropbox-
hack-is-real/

Volume IX Issue I APRIL 2024 www.zkginternational.com 1274


ISSN: 2366-1313

[10] W. Ma, J. Campbell, D. Tran, and D.


Kleeman, “Password entropy and password
quality,”inFourth International Conference
on Network and System Security, NSS 2010,
Melbourne, Victoria.

Volume IX Issue I APRIL 2024 www.zkginternational.com 1275

You might also like