International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 A Novel Data Authentication and Monitoring approach over cloud B.S.L.Satyavathi Devi1, M.Vamsi Krishna2, B.Srinivas3 1,2 Chaitanya Institute of Science and Technology, Kakinada, A.P., India 3 Pragati Engineering college, Surampalem, A.P., India Abstract: Security is one of the important and interesting factors in the field of cloud computing, during the usage of cloud resources, Even though various traditional approaches are there for cloud storage, but they are not optimal providing optimal services because many of the traditional mechanisms are not optimal for data correctness, integrity and dynamic data support. In this paper we are introducing an efficient mechanism for data correctness and detection of errors and the implementation purpose we simulated the system with the new architecture. I.INTRODUCTION Cloud computing promises greater flexibility in business planning along with significant cost savings by leveraging economies of scale in the IT infrastructure. It also offers a simplified capital and expenditure model for compute services as well as increased agility for cloud customers who can easily expand and contract their IT services as business needs change and there are many enterprise customers are hesitant to buy into cloud offerings due to governance and security concerns. Many potential users of cloud services lack confidence that cloud providers will adequately protect their data and deliver safe and predictable computing results. As the most recent evolution in computing architecture, cloud computing is simply a further extension of the distributed computing model. Its key characteristics such as multi-tenancy and massive scalability are also those that may create new governance challenges for both cloud Providers and their customers. Today’s cloud computing solutions may also provide a computing infrastructure and related services in which the consumer has limited or no control over the cloud infrastructure thus creating a greater need for customers to assess and control risk. Customers must trust the security and governance of the cloud environment in order to have confidence that their data will be protected and its integrity maintained. Many potential cloud customers are also looking for some level of assurance that appropriate security measures are indeed being properly implemented in the daily operations of the cloud infrastructure. These potential customers want to make informed decisions about whether their data will be sufficiently protected and whether they will be able to comply with specific regulations when using a cloud service. In short they want the security of the cloud offering to be transparent. Transparent security would entail cloud providers disclosing adequate information ISSN: 2231-5381 about their security policies design and practices and that includes disclosing of relevant security measures in daily operations. The best ways to help customers understand the cloud security environment is for cloud service providers to develop a common way to disclose relevant practices as well as principles and capabilities using a common framework such the providers of cloud and customers can create a governance framework by leveraging the existing ISO 27001 and ISO 27002 standards4 to provide an approach that can naturally be applied in a cloud environment. In computing a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users and anyways that means to carry out the motives for and targets of a DoS attack may vary and consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks and credit card payment gateways and even root name servers. This technique has now seen extensive use in certain games used by server owners or disgruntled competitors on games. Increasingly these attacks have also been used as a form of resistance and they say is a tool for registering dissent. The author Richard Stallman has stated that Daniel of service attack is a form of Internet Street Protests and generally used relating to computer networks but is not limited to this field for example it is also used in reference to CPU resource management. One common method of attack involves saturating the target machine with external communications requests and so much of that it cannot respond to legitimate traffic or responds so slowly as to be rendered essentially not available. That attacks are usually leads to server burden.In normal terms DoS attacks are implemented by either forcing the targeted computer(s) to reset or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. http://www.ijettjournal.org Page 3726 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 II. RELATED WORK Cloud storage is a model of networked enterprise storage where data is stored not only in the user's computer but in virtualized pools of storage which are generally hosted by third parties too. Hosting companies operate large data centres and people who require their data to be hosted buy or lease storage capacity from them. The data centre operators in the background virtualizes the resources according to the requirements of the customer and expose them as storage pools which the customers can themselves use to store files. Manually the resource may span across multiple servers and for the files safety depends upon the hosting websites. The storage system of cloud users store their data in the cloud and no longer possess the local data and the correctness and availability of the data files being stored on the distributed cloud servers must be guaranteed and finalized and One of the key issues is to effectively detect any unauthorized data modification and mal functioning, mostly due to server compromise and/or random Byzantine failures and Besides the distributed case when such inconsistencies are successfully identified to find which server the data error lies in is also of great significance, because it can always be the first step to fast recover the storage errors and/or identifying potential threats of external attacks. The simplest Proof of retrievability (POR) scheme can be made using a keyed hash function hk(F) and in this approach the verifier, before archiving the data file F in the storage of cloud and pre-computes the cryptographic hash of F using hk(F) and stores this hash as well as the secret key(K) and to check if the integrity of the file F is lost the verifier releases the secret key K to the cloud archive and asks it to compute and return the value of hk(F) while storing multiple hash values for different keys the verifier can check for the integrity of the file F for Multiple times, each one being an independent proof. The traditional architecture contains basic three roles data owner, auditor and user as follows. ISSN: 2231-5381 Public Auditing Auditing Delegation Dataflow Data auditing to enforce service level agreement Coud Servers Fig 1 : Architecture of the protocol In this paper we are proposing an efficient mechanism i.e novel signature for authentication for error recovery and for the data integrity we implemented an efficient file segmentation method for error correctness and for providing the language interoperability we implemented our application in service oriented application III. PROPOSED WORK Our proposed work consists of data integrity, data correctness and language interoperability. In our framework it generates an authentication code for each and every block and that is used to detect the error detection and it is service oriented architecture. A) Novel secure architecture In our architecture there are different users with different accessing privileges. The details of them are explained below: Cloud Server(CS): It is an entity that is monitored and maintained by cloud service provider and it contains sufficient storage and efficient computational resources. Third-Party Auditor: This is mediator and has the capability that users may not have and it is trusted to access and expose risk of cloud storage services on behalf of the users upon request. User: It is an entity and who has data to be stored in the cloud and relies on the cloud for computation and storage of data, can be either enterprise or individual customers. http://www.ijettjournal.org Page 3727 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 Auditor Get signatures File Meta data and S(s1,s2,..sn) Response f(f1,f2,..fn)& S(s1,...sn) Data Owner CSP Response Users Fig 2: Architecture for Data correctness over cloud In implementation process is here at first the data owner divides the data into blocks and then apply hash algorithm to individual blocks .Then for encryption of the resultant blocks uses Rijandael algorithm and uploads to the server. Then forward the meta-data of the uploaded file is send to third party auditor. Auditor monitors the uploaded files and he generate same signature too the uploaded files using meta-data and checks the uploaded and the generated signature is same for the individual blocks. If any block signature is mismatched it can intimate to the data owner that his file is corrupted. User can access the information by using the limited access provided by the cloud service. A) Error Detection and data correctness In order to accomplish this task we have devised an algorithm which uses block signature method to identify the exact block error. A new block signature strategy is proposed in this paper to know the exact location of error. We call this error free transfer technique. The above algorithm generates signatures against the data in file and appends those generated signatures at the end of file. It is very obvious from the algorithm generates signatures for every block separately and then those signatures are appended at the end of file as well. This algorithm uses 16 bytes as blocks reserved bytes. These bytes are used to send the original size of the file. Block size in this algorithm (n) is dependent upon the preference of users. The method of identifying corruption at the Technique receiving site uses the similar technique. The algorithm at receiving site first identifies the actual size of the file received. Then it separates the signatures from the received file. After doing this process file only contains the original data with appended zeros and 16 reserved .The signatures are separated the file. This algorithm then again generates ISSN: 2231-5381 signatures with received original file and compares the signatures with received signatures. If signatures exactly match, it means the file is received without errors. If match Is not found, it means that the file is corrupted. One very strong point about the proposed algorithm I - Calculate Length of(F1) is that it first divides the whole file into blocks of equal count *- 1/n size. Signature for each block is separately generated For j =1 to count and stored in the file. It means that the number of S <- 0 n blocks in the file is exactly equal to the number of signatures generated. That is, each signature represents signatures of the file received after removing sending site signatures from the file. The signatures generated Fn *- F1l Sig at sending site are then matched against the signature generated against the receiving site. Matching of match is found, it means that the block is received accurately. The mask us capable of corrupted. After the identification of corrupted blocks, while receiving side asks sending side only for those blocks which are received corrupted. Novel Authentication Based signature: Algorithm: Generate file with integrated Signatures Input: User File in ASCII (Fo) Output: File with Signature appended at end of (Fn) Method: For apply hash function on each n byte block of file which is corrupted? If we consider it with the file we perform the following steps to make (m mod n)= 0 of Fo M Calculate Length of (F0) n Length of Block (any one 1024 /204/4096/ 8192) bytes of128/ 256 /512/ res reserved 16 bytes P m mod n Q n- (P + res) if(Q > 0) FAppend Q zeros at the end of F0 Else if(Q < 0) R n+ Q F1 Append R zeros at the end of F0 F1 Append res at the end of F0 In order to generate Signatures of Fl, perform the following steps I Calculate_ Length of (Fl) count l/n For j1 to count S0 S reverse[∑ nA=1((A XOR B) v (A ∩ B))] Where B <- to_Integer (to_Char (A)) Sig Sig+ to-Binary (S) Fn F1 + Sig http://www.ijettjournal.org Page 3728 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013 IV.CONCLUSION Our approach is efficient during the segmentation and integration even it does not relives to the third party or auditor and error detection mechanism inform to the data owner whenever the correctness is failed with efficient signature authentication mechanism. The simulation of the process can be shown in an efficient way. REFERENCES [1] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), pp. 1-9, July 2009. [2] Amazon.com, “Amazon Web Services (AWS),” http://aws. amazon.com, 2009. [3] Sun Microsystems, Inc., “Building Customer Trust in Cloud Computing with Transparent Security,” https://www.sun.com/ offers/details/sun_transparency.xml, Nov. 2009. [4] K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012. [5] M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,” http://www.techcrunch.com/2006/12/28/gmaildisasterreportsof- mass-email-deletions, Dec. 2006. [6] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closesits- doors, July 2008. [7] Amazon.com, “Amazon S3 Availability Event: July 20, 2008,”http://status.aws.amazon.com/s3-20080720.html, July 2008. [8] S. Wilson, “Appengine Outage,” http://www.cioweblog.com/ 50226711/appengine_outage.php, June 2008. [9] B. Krebs, “Payment Processor Breach May Be Largest Ever,” http://voices.washingtonpost.com/ securityfix/2009/01/ Jan. 2009. [10] A. Juels and B.S. Kaliski Jr., “PORs: Proofs of Retrievability forLarge Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, Oct. 2007. years of teaching & research experience. He has 20 publications of both national and international conferences / journals. His area of interest includes AI, Computer Networks, information security, flavors of Unix. B.Srinivas Working as Associate Professor in CSE Dept. of Pragati Engineering College, Surampalem. He received M.Tech(CSE) from Acharya Nagarjuna university. He has 6 years of teaching experience, pursuing Ph.D. from JNTU Kakinada. His area of interest includes Computer Networks, Information Security, Mobile Computing and Cloud Computing. BIOGRAPHIES B.S.L.Satyavathi Devi is a student of Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, pursuing her M.Tech(Computer Science Engineering) from JNTU Kakinada. Her area of interest includes Computer Networks, Information security, Compiler Design and Artificial Intelligence. M.Vamsikrishna, well known Author and excellent teacher received M.Tech(AI&R), M.Tech(CS) from Andhra university. Working as Professor and HOD, CSE Dept., Chaitanya Institute of Science and Technology. He has 13 ISSN: 2231-5381 http://www.ijettjournal.org Page 3729