A Framework for Inspection Approach Over Cloud Services Mula Sudhakar ,Chanti.Suragala

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 5 Number 4 - Nov 2013
A Framework for Inspection Approach Over Cloud
Services
Mula Sudhakar *,Chanti.Suragala#
*
*
M.Tech Scholar,#Assistant professor
Department of Software Engineering , SISTAM college, Srikakulam, Andhra Pradesh
#
Dept of CSE , SISTAM college, Srikakulam, Andhra Pradesh
Abstract: There are so many users using third party services
to store their data. Some of them storing data and some of
them are using that data. In this process, there is a security
issue such as storing and retrieve the data securely. For
frequent verification required for the file stored in the third
party services. That verification should be done by trusted
authority between the data owner and cloud service provider.
For achieving these requirements we introduced a framework
that includes secure uploading, retrieving and verification of
data in the cloud services such as third party services.
I.INTRODUCTION
Basically, a cloud storage system can be
considered to be a network of distributed data centres
which typically uses cloud computing technologies like
virtualization offers some kind of interface for storing data.
To increase the availability of the data and may be
redundantly stored at different locations. There are multiple
use cases for cloud storage services used by both
companies and individuals. This is also includes ondemand storage capacities accessible from various
locations (e.g. from mobile and local devices) and the
backup facilities without the need to maintain hardware
devices or appropriate software tools and the
synchronization features allowing the customers to always
have access to the latest version of their data independent
of the device (PC, laptop, smartphone). The following use
cases shall present the potential benefits of such storage
services.
Copy. Bob is a sales representative, working most
of the time out of the office. At the moment he is traveling
home from a two weeks business trip and visited many
customers and this made a lot of notices and sketched some
drafts for potential missions. It was very successful, but
Bob is depressed. It is inattentive while waiting for the
plane and the bag including his laptop has been stolen. It
does not worry about disclosure of data because he uses an
encrypted harddisk, but he is sad when he is thinking about
the results of the last two weeks. Using the copy feature of
a cloud storage service Bob would be able to solve this
problem. In his laptop continuously copies all changes to
existing data and all new files to the cloud service. It is
convenient to recover this data to his new laptop.
Backup. Charlie, an architect, is the owner of a
medium sized and prosperous architectural office. It is
desperately seeking a building plan which he had drawn up
last year. House plan for a customer who has repeatedly
ISSN: 2231-5381
changed his mind and it forcing Charlie to frequently alter
it. Since then the architect has been searching for the digital
version. It protects his data by making copies and storing
them on external devices, he cannot find that particular
version. Are liable cloud backup service and which keeps
all versions of all files, would have enabled Charlie to
restore the building plan from any particular date.
Synchronization of Devices. Diana has worked
the first half of the day in the office on a presentation for
tomorrow. The moment she is traveling to the location of
her speech. It planned to polish her slides in the train. It
worked in the office on her Desktop PC and she forget to
copy the presentation on an USB stick. Using a service that
offers a synchronization feature Diana could solve this
problem. Desktop PC would permanently copy all data to
the cloud and like in the storage scenario above. The
synchronization feature allows the connection of any
number of devices. Service takes care that all devices have
the same data pool. If she creates new files on different
devices while she is offline the service recognizes that.
Even better, if she changes one file on two devices and
service is able to detect version conflicts.
Sharing Files. Eve is a self-employed
photographer. At the moment she is writing a travel guide
and together with Frank a talented writer. They are
working together using email and Both of them are
displeased on this scenario because the book is made of
more then 100 files and it is very cumbersome to send them
via email and to hold them in sync. Using a service that
offers a file sharing feature working on any number of files
would very easy. Eve and Frank could just edit their piece
of work and each computer would copy the results
immediately to the cloud. The other computer would
automatically download the file. They are always in
synchronizing without any pain. And if they accidentally
edit the same file at the same time and the service creates a
notice and offers alternatives how to proceed.
II. RELATED WORK
Before customers are able to use a cloud storage
provider to synchronize or back up personal data, they have
to complete a registration process. Cloud storage providers
usually require the creation of a user account before any
services can be used. On the one hand, it is in the interest
of the service provider to establish a single point of contact
through which all subsequent configuration, logging and —
http://www.ijettjournal.org
Page 203
International Journal of Engineering Trends and Technology (IJETT) – Volume 5 Number 4 - Nov 2013
above all — accounting will take place. On the other hand,
a customer who wishes to entrust personal data to the
service provider wants to be certain that he communicates
with the intended service and — above all — establishes a
relationship of trust and contracts the service provider to
perform its duties as pledged. During the registration
process, the service provider and the new customer agree
upon credentials↑ – these must later be used to log in and
use the service. If at any time an attacker is able to
eavesdrop on the communication, he might obtain the
credentials, compromise the account and gain access to
uploaded data. Beyond that, if an attacker is able to
manipulate the messages exchanged between customer and
service provider, he might act as a proxy and defraud both
of them. In order to prevent these at- tacks, all
communication between service provider and customer
must be secured in terms of authenticity and confidentiality
and integrity.
The main reason to use a cloud storage provider
— for both individuals and companies — is to always have
a backup of valuable data which is off-premises yet easily
accessible. Arguably a reason for this is that personal data
or sensitive company data is highly valuable in either
sentimental or financial terms. Before cloud storage
became popular, individuals and companies had personal
backup strategies to pro- tect against data loss, but these
almost always relied on additional physical devices usually
at the same location as the original data. Since the stored
data was under the control of its owner, protection of the
data itself was not always regarded as imperative.
Nowadays, data is often entrusted to cloud storage
providers on servers visible on the public Internet. Frequent
discoveries of security vulnerabilities facilitate successful
external attacks with ensuing data thefts. Additionally,
there can be internal attacks from within the cloud storage
provider itself. Therefore, the data itself should be
protected in such a way that even in the event of a
successful attack, the contents of the stored data remain
confidential. To this end, all data needs to be stored on the
remote servers in encrypted form. There are several
cryptographically secure encryption schemes available
which can be used freely. Cloud storage providers often
offer a general encryption of all data stored on their servers
using a company key which is known only to them. This
may prevent data theft from external attackers, but does not
protect against any attacks which include theft of the
encryption key or internal attacks conducted by personnel
who are able to gain access to these keys. Therefore, all
data should be encrypted on the client system before the
data is transmitted into the cloud using a key unknown to
the service provider. Stand- alone software may be used to
encrypt all data on the client system, but this has
drawbacks: The software has to be installed, administrated
and operated on all client systems in addition to the client
software of the cloud storage provider. The key used to
encrypt the data needs to be distributed to all devices which
are used to access the stored data. In the event that this key
ISSN: 2231-5381
is lost, the data can never be decrypted again. As a
precautionary measure, all keys used to encrypt data could
be integrated into some kind of key escrow system to guard
against data loss. All keys that are used for encryption
should be generated at random resp. pseudo random. This
requirement ensures that two cryptograms of the same clear
text are different.
III. PROPOSED WORK
In our proposed work the framework contains safe
upload and retrieving of data upload. In our framework
there are four main features such as file encryption, file
upload, file decryption, and file download.
There are three types of users such as data owner,
Auditor and user.
Data owner initially selects file and generates
transformation key to encrypt selected file. After that data
owner encrypts the selected file and generates signature for
encrypted file. He sends Meta data to auditor such as file
index, file name, and signature.
Auditor is the trusted authority of the cloud
service provider. He frequently verifies files in the cloud
service using the Meta data sent by the data owner. He can
send status of the verification such as auditing to data
owner using simple mail transfer protocol.
In this verification auditor again generates
signature to the file in the cloud and compares with the
signature sent by the data owner. If the signatures are same
the file in the cloud service is secure otherwise he decides
that file was corrupted.
5. Get signatures
2.File Metadata
6. Auditing status
cloud
1.Encrypted File and
signatures
3. Request
for file
4.Response
Users
Fig 2: Block diagram for Data correctness over cloud
User view list of files and request to cloud service,
cloud service checks authentication and sends decrypted
file to download the requested file.
http://www.ijettjournal.org
Page 204
International Journal of Engineering Trends and Technology (IJETT) – Volume 5 Number 4 - Nov 2013
In our work we introduced a block based signature
algorithm to generate signatures. In we divide the
encrypted file into equal number of blocks. And generate
signature to each and every block of the divided file.
A novel algorithm for signature generation
Algorithm:
1. Input file F.
2. Find length of L0.
3. Take Block length BL such as 128/256/512/1024
4. Divide L0 into the given block length BL
Block=L0/BL
5. If there any remaining bits append zeros rounded
to block length BL
6. Then For each block B={b1,b2...bn}
Encrypt block
Benc=Rjn(b)
7. Then for each Encrypted Block generate signature
8. S reverse[∑ nA=1((A XOR B) v (A ∩ B))]
9.
10.
Where B <- to_Integer (to_Char (A)) in
Block benc
11.
12. Sig  Sig+ to-Binary (S)
13.
14. Fn F1 + Sig
For encrypting the file we used advanced AES algorithm
called rijandael algorithm.
Variable block lengths and key lengths supported such
as128, 192, and 256. In this number of columns in the state
and round key arrays depend on the sizes.
Step 1: Byte Sub Transformation
Step 2: Shift Row Transformation
Step 3: Mix Column Transformation
Step 4: Round Key Addition
Final round is a little different and it removes the Mix
Columns step.
In our work file stored in the cloud service is deeply checks
by the auditor and updates to data owner.
IV. EXPERIMENTAL ANALYSIS
In our experimental analysis we take a text file and
followed our proposed process as shown below.
Data Owner:
Auditor:
IV.CONCLUSION
In our framework we used a secure encryption algorithm
with block based signature generation it reduces the man in
the middle attacks in the communication channel and
secure verification process to protect the file in the cloud
service. By providing trusted authority between the users,
data owner and cloud service provides secure
communication between the cloud service and the users.
We tested this frame work in the above experimental
results.
In future work it we can implement any advanced
symmetric key cryptographic algorithm with strong
signature generation algorithm. And there is a chance to
implement secure file transfer protocol algorithm to send
status of the auditing or verification of the files.
REFERENCES
1.
2.
3.
4.
ISSN: 2231-5381
https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_
und_technical_reports/Cloud-Storage-Security_a4.pdf
www.cs.xu.edu/~harnist/AA_Rijndael.ppt
ieeexplore.ieee.org/iel5/4381299/4381300/04381319.pdf?arn
umber...by A Sultana - 2007.
link.springer.com/chapter/10.1007%2F978-3-642-356155_6by HB Patel.
http://www.ijettjournal.org
Page 205
International Journal of Engineering Trends and Technology (IJETT) – Volume 5 Number 4 - Nov 2013
5.
6.
7.
8.
9.
J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,”
http://www.techcrunch.com/2008/07/10/
mediamaxthelinkup-closesits- doors, July 2008.
Amazon.com, “Amazon S3 Availability Event: July 20,
2008,”http://status.aws.amazon.com/s3-20080720.html,
July 2008.
S. Wilson, “Appengine Outage,” http://www.cioweblog.com/ 50226711/appengine_outage.php, June 2008.
B. Krebs, “Payment Processor Breach May Be Largest
Ever,” http://voices.washingtonpost.com/ securityfix/2009/
01/ Jan. 2009.
Juels and B.S. Kaliski Jr., “PORs: Proofs of Retrievability
forLarge Files,” Proc. 14th ACM Conf. Computer and
Comm. Security (CCS ’07), pp. 584-597, Oct. 2007.
Biblography :
Mula Sudhakar is received B.Tech
from Gokul
Institute of
Technology And Management,
Bobbili..He is pursuing M.Tech in
Sarada Institute of Science,
Technology
and Management,
Srikakulam,
Andhra
Pradesh.
Interesting areas are Network security and Data
minig.
Chanti.Suragala is working as a
Asst.professor in Sarada Institute
of Science, Technology And
Management, Srikakulam, Andhra
Pradesh. He received his M.Tech
(CSE) from Aditya Institute of
Technology And Management,
Tekkali. JNTU Kakinada Andhra
Pradesh. His research areas include Image Processing
ISSN: 2231-5381
http://www.ijettjournal.org
Page 206
Download