Capstone Project Phase 3
Capstone Project Phase 3
Capstone Project Phase 3
IMPLEMENTATION OF PRIVACY
PRESERVATION IN PUBLIC CLOUD
Batch No:-
Under the Guidance of
Project Team Members:
Data validation has become one of the key aspects in the present world
scenario. Since the use of hardware storage devices have been reduced over
the course of time, tech users are now using virtual cloud to store their
personal and professional data. Hence, preserving the authenticity and
security of the uploaded data has become the major concern. So, it’s a
necessary feature to have extra security to maintain the confidentiality of the
data.
To obtain API token from the backend for every authorized user and
fetch their requests using the token as the passkey.
To make sure it’s a good system that can be applied and used without
facing any problems with unauthorized accesses.
1 Cloud Computing This paper provide the The system maintain the the best usage of the model we
Security Challenges and current and future trends of confidentiality of the data. To need to remove the current
this technology, what induce that type of trust in cloud security issues in cloud
its Potential
services provided by the computing, there is required a computing. So in this paper
Solution(2019) CC, security issues and system which can perform they used two cryptographic
challenges, Attacks on the verification, authentication and algorithms RSA algorithm and
Cloud Computing. encrypted data transmission, Digital Signature in order to
therefore that should maintain enhance the security.
the confidentiality of the data.
2 Enhancing Public Cloud In this paper an enhanced a Model that uses the two-factor This proposed model increases
Security by Developing a model for public cloud user authentication using the user confidence in cloud
authentication and files username and password and a application as we use
Model For User
integrity checking. certificate-based authentication symmetric and asymmetric
Authentication and Data for user authentication. encryption for uploading of
Integrity Checking files to ensure a secure
(2020) connection between cloud users
and cloud providers, The model
also reduces the computation
power on user devices.
3 The State of the Public This paper explores the This paper approaches security It explains the impact of these
Cloud: Security current state of cloud threats that continue to make security risks and their impact
computing security. such concerns relevant, and on the adoption of cloud
Concerns with Cloud
examines mitigations to these computing
Computing(2020) threats described in the current
literature.
4 A Survey on cloud Survey on Privacy, data All data are transferred in file Considering the security issues,
security issues and integrity Preservation in format within the groups, those they have proposed a model
the Cloud environment files are encrypted using AES which increases the integrity of
block chain(2019)
and cloud security algorithm and integrity is the data. The increase in
issues using maintained by connected devices and increase
Blockchain MD5 or SHA algorithm. The in computation is the need for
MD5 or SHA algorithm is used cloud computing in now a-days
to check for the modifications in trend.
the data
being stored in the cloud storage
5 Enforcing Implementing security Brief discussion of different The projected methodology
Confidentiality and for public cloud using SHA algorithms and their defends the client in sequence,
different cryptographic comparison, also designed starting unconstitutional
Authentication over
encryption techniques Scheme of Encryption and alright to use throughout the
Public Cloud Using like SHA (secure hash description Process purpose in time of message
Hybrid algorithms) and communication and The
Cryptosystems(2019) blowfish algorithms finding of study work improves
with SHA-3, time unit of
improvement has been created.
1
Existing System
To protect the data from misuse there are various approaches proposed.
Methods include use of cryptography and mandate an application to be
installed in client device for performing the cryptography related operations.
Other approaches propose the block wise data encryption access control
frame works etc. however these have key management complexities and
overheads for user.
The system’s processor plays a key role in encryption and many cloud
providers will offer basic encryption of a few database fields such as
passwords and account numbers, if data size increases, encryption process
slows down.
14-06-
Department of ISE, BMSCE
2022
1
Problem Statement
14-06-
Department of ISE, BMSCE
2022
1
SYSTEM REQUIREMENT SPECIFICATION
Functional Requirements
• Front end authorizing page
• Secure
• Compatible
• Reliable
14-06-
Department of ISE, BMSCE
2022
1
Hardware and Software Requirements
• Desktop/Laptop
• Webcam
1
SYSTEM DESIGN
Every cloud user logs into the system.
And as the authorised person needs to access the files stored in public
cloud, he/she is assured the security is their data as we are enabling one
more layer of security apart from the one's provided by the hosts of the
service.
The data used for our security model will never be shared with the hosts
or any other third parties.
Once the user verifies his/her credentials with us, they will get the access
token which would be the part of the header is every request they make.
This ensures the total privacy of user data. And allows the user to use all
the services without any interruptions or data hindrance.
14-06-
Department of ISE, BMSCE
2022
1
1
DETAILED DESIGN
User case Design
System
User 1
Request
Access
User 3
Server
14-06-
Department of ISE, BMSCE
2022
1
Dataflow Diagram
Start
Launching Get
software Login credentials
Starting
Providing access Access token
server Logout
Stopping
End Server
server
Modules
Home Login
JS
Flux
Frontend
Backend
Technology Stack
• gitpod.io
• Postman
• React.js
• JWT
14-06-
Department of ISE, BMSCE
2022
1
Methodology
14-06-
Department of ISE, BMSCE
2022
1
Once the server received the request from the user-end, if the user is
unauthorized then it will react with the classic 401 (unauthorized), which is
the response for unauthorized request. Else if the user does not have access
on a particular file, then it would be responded with a 403 (forbidden) error,
which is for an authorized user but permission denial service.
14-06-
Department of ISE, BMSCE
2022
1
1. Creating a token:
Step 1- Installation of Flask JWT extended
By using postman, and with our API URL generated by the server, create
a token by inputting our username and password
2. Storing the token
The storage of the access token needs happen in the session storage of the
backend, because a newer access token would be generated for the next login
of the authorized user.
Once the token is generated for a given user, he can login and perform action
as required and logout by removing the presence and might need to login
again with a newer access token for next access onto his public cloud.
While user is inside the cloud system he/she can request any service with that token .
FACE API INCLUSION
Here, we have used a open source face API namely Compreface which
provides the service of face verification.
Initially, we need to set up docker desktop on our service and obtain the
compreface archive provided by them. Then run the docker command to
start the service and launch the application over the localhost on our
system.
The admin will have to setup up his account and receive the api token to
the sample sdk
Later on, the face stored in while registering an user will be used to again
verify him and obtain a access token if the similarity index is more than
0.95. This token will be concatenated with the one which will be obtained
from username and password previously.
Testing
Shows the error dialog box popping up when a user gives a
wrong credentials in the input form .
14-06-
Department of ISE, BMSCE
2022
1
shows that it will show this message when there is no header or token in
matching with the header in postman.
When we put token which was produced in the headers naming authorization it will
match the header and successfully shows the message. By this way we can check the
code in postman itself .
The verification of the images of same person of different age.
The similarity is 0.99~1 .Hence age also a factor that determines the
similarity.
The verification of the images of different person
Here, the similarity is 0.5 which shows that both are two different
persons.
Results
This is the home page of the cloud authentication system.
It consists of two links where one will show the documentation of this project
and other one is about the BMS college. After clicking the login button , login
page will show up
14-06-
Department of ISE, BMSCE
2022
1
This is the login page where user has to give the login credentials
This is the user page after putting correct credentials in login page.
It shows the name of the user entering session succesfully
The application inspection of
user session
1
After logging out , the token won’t be there .It will deleted as soon as the
session ends.
This shows the verification of two images of same person where the
similarity is shown as 1 , gender and age of the person .
Conclusion
With the implementation of this system, public cloud seems more secure
and reliable. Since we are using external server and storage not only it's
safe from third party intervention, but also it blocks the hosts from data
accessing. This would solve the major concern like data hindrance, theft
and many other tech related problems.
2. Bappaditya Jana, Jayanta Poray , A Multilevel Encryption Technique in Cloud Security, West
Bengal, IEEE, 2017.
3. Naseer Amara, Huang Zhiqui , Awais Ali , Lahore, Cloud Computing Security Threats and
Attacks with their Mitigation Techniques,China,IEEE,2017.
5. Wg Cdr Nimit Kaura, Lt Col Abhishek Lal , Survey Paper on cloud computing security, India,
IEEE,2017.
7. Shehzad Ashraf Chaudhry1 , Luk Kim , Seungmin Rho ,Mohammad Sabzinejad Farash , Taeshik
Shon, An improved anonymous authentication scheme for distributed mobile cloud computing
services,Springler,2017.
8. A.Praveena , Dr.S.Smys , Ensuring Data Security in Cloud Based Social Networks, India , IEEE,
2017.
9. Mr. Amit Gyandev Prajapati , Mr. Shankarlal Jayantilal Sharma , Mr. Vishal Sahebrao
Badgujar ,All About Cloud : A Systematic Survey,India,IEEE,2018.
10. Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernandez-Encinas, and David Arroyo ,Review of
the Main Security Threats and Challenges in Free-Access Public Cloud Storage
Servers,Springler,2018.
11. Hussam Hourani , Mohammad Abdallah ,Cloud Computing: Legal and Security
Issues,IEEE,2018.
12. Srijita Basu , Arjun Bardhan, Koyal Gupta,Payel Saha, Mahasweta Pal,Manjima Bose,
Kaushik Basu,Saunak Chaudhury, Pritika Sarkar ,Cloud Computing Security Challenges &
Solutions-A Survey,India,IEEE,2018.
13. Suryadipta Majumdar , Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and
Mourad Debbabi Cloud Security Auditing: Major Approaches and Existing
Challenges ,Canada, Springler,2019.
15. S.Pavithra , S.Ramya , Soma Prathibha ,A Survey on cloud security issues and block chain ,
India , IEEE, 2019.
16. Srijita Basu , Arjun Bardhan, Koyal Gupta,Payel Saha, Mahasweta Pal,Manjima Bose,
Kaushik Basu,Saunak Chaudhury, Pritika Sarkar ,Cloud Computing Security Challenges and
its Potential Solution, India, IEEE,2019.
17. Kennedy A. Torkura , Muhammad I. H. Sukmana , Feng Cheng, and Christoph Meinel ,Cloud
Strike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure , Germany,
IEEE,2020.
18. Chandler Cain , David Raymond, J. Scot Ransbottom ,The State of the Public Cloud: Security
Concerns with Cloud Computing,IEEE,2020.
19. Abdulmajeed Raji , Murtada Adam, Enhancing Public Cloud Security by Developing a Model
For User Authentication and Data Integrity Checking, Africa, Researchgate,2020.
20. Leila Megouache, Abdelhafd Zitouni1 and Mahieddine Djoudi, Ensuring user authentication
and data integrity in multi‑cloud environment,Springler,2020.
13