Main Project
Main Project
CHAPTER 1
INTRODUCTION
With the rapid development of network bandwidth, the Volume of user’s data is rising geometrically.
User’s of ownership and management of data. The CSP can freely access and search the data stored
in the cloud. Meanwhile the attackers may also attack the CSP server to get the user’s information.
The on top of 2 cases each build users fell into the danger of information outflow and data loss.
requirement cannot be satisfied by the capacity of local machine any more. Therefore, people try to
find new methods to store their data. For more powerful storage capacity, a growing number of users
select cloud storage. Cloud storage is a cloud computing system which provides data storage and
management service. With a cluster of applications, network technology and distributed file system
technology, cloud storage makes a large number of different storage devices work together
coordinately. Nowadays there are lot of companies providing a variety of cloud storage services,
such as Dropbox, Google Drive, iCloud, Baidu Cloud, etc. These companies provide large capacity
of storage and various services related to other popular applications. However, cloud storage service
still exists a lot of security problems. The privacy problem is particularly significant among those
security issues. In history, there were some famous cloud storage privacy leakage events. User
uploads data to the cloud server directly. Subsequently, the Cloud Server Provider (CSP) will take
place of user to manage the data. In consequence, user do not actually control the physical storage of
their data, which results in the separation of ownership and management of data. The CSP can freely
access and search the data stored in the cloud. Meanwhile the attackers may also attack the CSP
server to get the user’s information. The on top of 2 cases each build users fell into the danger of
information outflow and data loss.
Here, user uploads the data directly to the cloud server subsequently the cloud server provider
(CSP) will take place of user to manage the data. CSP can freely search and access the data stored in
the cloud meanwhile attackers can also attack CSP server to obtain the user’s data. So, the above two
cases make users data loss and information leakage. Traditional secure cloud storage solutions are
usually focusing on data encryption these methods can eliminate most part of the problems but all of
these solutions cannot solve the internal attack.
User (owner of data) upload the information to the server directly. Subsequently, the server provider
will now act like a user (owner) to manage the information. In consequence, users don’t actually
control the physical storage of their data, which ends up within the separation of ownership and
management of information. The server provider can freely access and search the information stored
within the server. Meanwhile, the attackers can even attack the server to get the users information.
These two cases both make users fell into danger of data leakage. Traditional secure server storage
solutions for the above problems are usually that specialize in access restrictions or encryption.
1.1 OBJECTIVE
The security degree is an important metric to measure the quality of cloud storage system.
Furthermore, data security is the most important part in cloud storage security and it includes three
aspects: data privacy, data integrity and data availability. Ensuring data privacy and integrity has
always been the focus of relevant researches. On another hand, data privacy is also the most
concerned part of the users. From a business perspective, company with high security degree will
attract more users. Therefore improving security is an crucial goal no matter in academia or business.
1.2
CHAPTER 2
LITERATURE SURVEY
Over the year a lot of researchers have made several contributions in this field of A Three Layer
based Intelligent Data Privacy Protection Scheme in Cloud Storage.
The development of cloud computing technology with the explosive growth of unstructured
data, cloud storage technology gets extra attention and better development. The cloud
provider does not have suggestions regarding the information and the cloud data stored and
maintained globally anywhere in the cloud. The privacy protection schemes supported
encoding technology. There are several privacy protective strategies within the aspect to
forestall information in cloud. We tend to propose a three-layer storage security in cloud.
In recent years, which evidence the event of cloud computing technology with growth of
unstructured data, cloud storage technology gets more attractive and development. Within the
current storage scheme, user’s data is stored in cloud servers where users lose the control
over their own data and will face privacy protection risk. Moreover, privacy protection
source is supported on encryption technology, these methods can’t avoid attack from the
insiders of cloud servers.
Recent years witness the development of cloud computing technology. With the explosive
growth of unstructured data, cloud storage technology gets more attention and better
development. However, in current storage schema, user’s data is totally stored in cloud
servers. Traditional privacy protection schemes are usually based on encryption technology,
but these kinds of methods cannot effectively resist attack from the inside of cloud server. In
order to solve this problem, we propose a three-layer storage framework based on fog
computing.
Fog computing is an architecture that uses edge devices to carry out a substantial amount of
computation, storage, communication locally and routed over the internet backbone. The
development of cloud computing technology with the explosive growth of unstructured data,
cloud storage technology gets more attention and better development. The cloud provider
does not have suggestions regarding the information and the cloud data stored and
maintained globally anywhere in the cloud.
Year:2018
Recent years witness the development of cloud computing technology. With the explosive
growth of unstructured data, cloud storage technology gets more attention and better
development. However, in current storage schema, user’s data is totally stored in cloud servers.
In other words, users lose their right of control on data and face privacy leakage risk.
Traditional privacy protection schemes are usually based on encryption technology, but these
kinds of methods cannot effectively resist attack from the inside of cloud server. In order to
solve this problem, we propose a three-layer storage framework based on fog computing.
CHAPTER 3
System requirement specification is a fundamental document, which forms the foundation of the
software development process. It not only lists the requirements of a system but also has a
description of its major feature. An SRS basically an organization’s understanding (In writing) of
customer or potential client’s system requirements and dependencies at a particular point in time
prior to any actual design or development work. It is two way insurance policy that assures that the
client and the organization understand other’s requirements from that perspective at a given point in
time.
The SRS also functions as blueprint for completing a project with as little cost growth as
possible. The SRS is often referred to as the “parent” document because all subsequent project
management documents, such as design specifications, statements of work, software architecture
specifications, testing and validation plans, and documentation plans, are related to it. It is important
to note that an SRS contains functional requirements only; it doesn’t offer design suggestions,
possible solutions to technology or business issues, or any other information other than what the
development team understands the customer’s system requirements to be.
• Ram : 4 GB.
CHAPTER 4
SYSTEM DESIGN
4.1 METHODOLOGY
Fog computing is a transferable computing architecture here data is processed and stored between
source of the origin and cloud infrastructure. More use of Internet of things (IOT) devices is primary
motivation for fog computing wherein large amount of data is generated from an ever-expanding
array of devices. In other words, we can also say fog computing is extended form of cloud
computing on the edges of network. However, fog and cloud computing are similar data,
computation, storage and api services the only difference lies in decentralization. Features such as
processing of huge amount of data locally, freely portable, operate on-premise and can be installed
on heterogeneous hardware makes fog computing tremendously suitable for time and allocation
sensitive applications. Fog computing model aims to give scalable solution for any issues.
Challenges like exploding data velocity, variety and volume can be solved by fog computing offering
cloud computing to handle the huge set of data generated daily through IOT.
In existing system, data has been partitioned and stored in three storage servers such as cloud server,
fog server and local server by hash- Solomon code algorithm. One important thing is that the third
party don’t have the knowledge about our data partitioning. The Cloud server contains 80% of
unimportant information, the Fog server contains 15% of most important information and the Local
server contains 5% of important information. If hacker hacks the data in any one these layers either
he/she will modify the data or delete the data. Hence the user will loose that data. This is the major
disadvantage.
In order to protect user’s privacy, we propose a Three Layer Storage framework based on fog
computing model. The TLS framework can give user a certain power of management and effectively
protects user’s privacy. As mentioned, the interior attack is difficult to resist.Traditional approaches
work well in solving outside attack, but when CSP itself has problems, traditional ways are all
invalid. Different from the traditional approaches, in our scheme, user’s data is divided into three
different-size parts with encoding technology. Each of them will lack a part of key information for
confidentiality. Combining with the fog computing model, the three parts of data will be stored in the
cloud server, the fog server and user’s local machine according to the order from large to small. By
this method, the attacker cannot recover the user’s original data even if he gets all the data from a
certain server. As for the CSP, they also cannot get any useful information without the data stored in
the fog server and local machine because both of the fog server and local machine are controlled by
users.
As shown in Figure, the TLS framework makes full use of fog server’s storage and data processing
capability. Each server saves a certain part of data; the storage proportion is determined by user’s
allocation strategy. Firstly, user’s data will be encoded on user’s local machine. Then, for example,
let 1%encoded data be stored in the machine. Then upload the remainder 99% data to the fog server.
Secondly, on the fog server, we do similar operations to the data which comes from user’s machine.
There will be about 4% data stored in the fog server and then upload the remainder data to the cloud
server.
4.4.2 Cryptography
Cryptography is a technique of securing information and communications through the use of codes
so that only those persons for whom the information is intended can understand and process it. Thus,
preventing unauthorized access to information. The prefix “crypt” means “hidden” and the suffix
“graphy” means “writing”. In Cryptography, the techniques that are used to protect information are
obtained from mathematical concepts and a set of rule-based calculations known as algorithms to
convert messages in ways that make it hard to decode them. These algorithms are used for
cryptographic key generation, digital signing, and verification to protect data privacy, web browsing
on the internet and to protect confidential transactions such as credit card and debit card transactions.
Cryptography is the process of hiding or coding information so that only the person a message was
intended for can read it. The art of cryptography has been used to code messages for thousands of
years and continues to be used in bank cards, computer passwords, and ecommerce.
4.5 ALGORITHM
The Caesar Cipher is one of the simplest and oldest methods of encrypting messages, named after
Julius Caesar, who reportedly used it to protect his military communications. This technique involves
shifting the letters of the alphabet by a fixed number of places. For example, with a shift of three, the
letter ‘A’ becomes ‘D’, ‘B’ becomes ‘E’, and so on. Despite its simplicity, the Caesar Cipher formed
the groundwork for modern cryptographic techniques. The Caesar cipher is a simple encryption
technique that was used by Julius Caesar to send secret messages to his allies. It works by shifting
the letters in the plaintext message by a certain number of positions, known as the “shift” or “key”.
The Caesar Cipher technique is one of the earliest and simplest methods of encryption techniques.
It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter with a
fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by
B, B would become C, and so on. The method is apparently named after Julius Caesar, who
apparently used it to communicate with his officials.
CONCLUSION
In conclusion, The development of cloud computing brings us a lot of benefits. Cloud storage is a
convenient technology which helps users to expand their storage capacity. However, cloud storage
also causes a series of secure problems. When using cloud storage, users do not actually control the
physical storage of their data and it results in the separation of ownership and management of data.
In order to resolve the matter of privacy protection in cloud storage, we have a tendency to propose a
three layer privacy protective secure cloud storage methodology framework supported fog
computing model and style. By allocating the magnitude relation of knowledge blocks keep in
several servers fairly, we will make sure the privacy of knowledge in every server. Through the
experiment take a look at, this theme will efficiently complete encryption and coding while not
influence of the cloud storage efficiency.
REFERENCES
1. Q. Hou, Y. Wu, W. Zheng, and G. Yang, “A method on protection of user data privacy in
cloud storage platform,” J. Comput. Res. Develop., vol. 48, no. 7, pp. 1146–1154, 2011.
2. P. Barham et al., “Xen and the art of virtualization,” ACM SIGOPS Oper. Syst. Rev., vol. 37,
no. 5, pp. 164–177, 2003.
3. G. Feng, “A data privacy protection scheme of cloud storage,” vol. 14, no. 12, pp. 174–176,
2015.
4. Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multi keyword fuzzy search
over encrypted outsourced data with accuracy im provement,” IEEE
Trans.Inf.ForensicsSecurity, vol. 11, no.12,pp.2706 2716, Dec. 2016.
5. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted
outsourced data with efficiency improvement,” IEEE Trans. Parallel Distrib. Syst., vol. 27,
no. 9, pp. 2546–2559, Sep. 2016.
6. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi keyword ranked search
scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp.
340–352, Feb. 2016.
7. Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C.-N. Yang, “Enabling semantic search based on
conceptual graphs over encrypted out sourced data,” IEEE Trans. Serv. Comput.
8. G.Kulkarni, R.Waghmare, R.Palwe, V.Waykule, H.Bankar, and K.Koli, “Cloud storage
architecture,” in Proc. 7th Int. Conf. Telecommun. Syst., Serv., Appl., 2012, pp. 76–81.
9. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for
secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.
10. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol
with novel dynamic structure for cloud data,” IEEE Trans. Inf. Forensics Security, vol. 12,
no. 10, pp. 2402–2415, Oct. 2017.