secure cloud storage of data in smart phones

advertisement
SECURE CLOUD STORAGE OF DATA IN SMART PHONES
Priyadarshini P
B.E.,(third Year)Electronics and communication Engineering,
St.Joseph’s college of Engineering,
Chennai-6000119.
S.Divya,
B.TECH(Information Tecnology),
Shri Sairam Institute Of Tecnology,
Priya13ps@gmail.com.
ABSTRACT
This paper deals with the security of data in smart phones using
cloud. The importance of the data stored in the smart phones is
increased as more applications are deployed and executed. Once the
smart phone is damaged or lost, the valuable information treasured
in the device is lost altogether. If cloud storage can be integrated
with cloud services for periodical data backup of a mobile client,
the risk of data lost can be minimized. However, the important data
might be uncovered by a malicious third party during retrieval or
transmission of information using wireless cloud storage without
proper authentication and protection. Therefore, in this paper, we
design an archive mechanism that integrates cloud storage, security
requirements for data storage of mobile phones. The security
measures consists of three levels. The lower priority data is
protected by digital signatures, the next level of security is thumb
print and finally the most confidential and important data is
secured by iris detection. This mechanism not only can avoid
malicious attackers from illegal access but also can share desired
information with targeted friends by distinct access rights.
I.
INTRODUCTION
The main purpose of the original cloud is that “users can use
the service anytime, anywhere through the Internet, directly
through the browser.” It is an extension of distributed
computing through the Internet. A huge operation procedure is
automatically split into several smaller operation procedures,
processed by a number of extensive systems of the server, and
the output finally goes through the search and operations to
return to the user. The alternative is to install software or
replace Storage of data in computers requires lots of memory
space which becomes a disadvantage. Hence we are moving to
cloud service that stores the data in virtual space. Clouds has
some security concerns such as Data security issues that
include data stored in a server; servers can be accessed
through browsers to obtain internal information. If a hacker
attacks many servers to steal information, data stored in the
server’s security is a concern. Management reliability refers to
cloud security mechanisms to prevent security breaches.
Protecting user privacy in clouds is the most important issue in
the industry.
II.
ADVANTAGE OF USING CLOUD
Before, the development of many algorithms, distributed
computing, and grid computing , we need to understand the
underlying architecture and structure. We also require specific
hardware and software facilities. Traditional applications are
expensive and complicated for both hardware and software.
Whereas Clouds do not need to understand the underlying
structure; the user only needs browsers connected to the
network with the required capabilities. Clouds have the feature
of enabling user access anywhere at anytime.
Mobile phones have become an integral part of life; mobile
users store personal data on phones, such as contact lists, text
messages, photos, and programs. Smart phones can perform
many of the programs detailed above. Business owners keep
schedules in the phone; although the information may not be
important to other mobile users, it is important to the owner of
the phone. If the phone is lost or damaged, or phone numbers
are changed, the issue comes up of what to do with the data
stored in the phone. In previous methods, mobile users would
backup data inside a computer; in the event of data loss, they
would retrieve the data from the computer and place it back
into the phone memory. The same procedure would apply
when phones are changed. Thus, the data are backed up
despite actions, but this procedure is not very convenient.
There is no means to update the data in real time. Remote
backup is convenient to business owners by referring to the
phone number, they can plan their schedules and save
important documents. Moreover, if a phone is damaged or
suddenly no longer working, there is no way to get data from
other places.
Clouds have to be accessible over the network. However, with
the constant threats of attacks and tampering on the Internet,
clouds do not have the best security protection, so users do not
want to store data there owing to concerns over tampering of
transmissions of personal data. In addition to these issues,
there have been information security incidents in the past as
well as incidents of conspiracies to attack enterprises, which
involve the loss of a lot more data than general attacks. Simply
by using clouds, users can store personal data and back up
actions. In this study, a method was developed by which
mobile users register and share in a stage through the
certification center to verify the signature of legitimate
sources. The next level of security is thumb print and finally
the most confidential and important data is secured by iris
detection.
III.
This diagram shows the steps involved in digital signature
DIGITAL SIGNATURE
A digital signature or digital signature scheme is a
mathematical scheme for demonstrating the authenticity of a
digital message or document. A valid digital signature gives a
recipient reason to believe that the message was created by a
known sender, and that it was not altered in transit. Digital
signatures are important to detect forgery or tampering.
The above picture shows a set of digital signatures.
The framework consists of five stages. They are
REGISTRATION STAGE:
Step 1: Mobile users send information to the
center.
Certification
Step 2: Certification center receives information that is passed
to telecommunication.
IV.
OVERALL FRAMEWORK
Data storage in the cloud is designed so that users can use
mobile phones as a platform to upload, download, share, and
synchronize information through cloud computing anywhere
at any time. Security uses a combination of TPM chips in the
mobile phones to protect the identity of mobile users as well
as security technology to protect data transmissions from
malicious attacks and tampering for data integrity.
1.TABLE
Role
Mobile User
Certificate
Authority
Mission
Upload, download, sharing,
and
synchronization
Step 3: Telecommunication receives registration information
to generate a Cloud Service Password.
Step 4: Authentication center switches to pass on to the mobile
user.
Step 5: Action to complete the registration the user receives
the message including Mobile User, Phone Number and Cloud
Service Password.
Step 6: The cloud service password is stored in phone
memory.
UPLOAD STAGE:
Step 1: Mobile user uploads data.
Authentication source
Generated cloud password,
Telecommunication store user information action
DOWNLOAD STAGE:
Step 1: Mobile users send download information including
cloud service password, mobile user name and secret values.
Step 2: Return the user’s personal data to the cloud.
Cloud
Stores mobile user personal
data
An example of finger print technology used in smart phones.
SYNCHRONISM STAGE:
Step 1: Mobile user uses phone A to upload data and phone B
to access the cloud.
Step 2: Cloud passes a message to telecommunication and
telecommunication passes the password to the mobile user.
Step 3: The mobile user receives the password and stores the
password in phone(B) memory and access the cloud again.
Step 4: Allow access to cloud and the cloud checks the
Password.
SHARING STAGE:
Step 1:Mobile user B sends a message to Mobile user A to
share A’s personal data.
Step 2: Certification Authority verifies the signature. Mobile
user A authenticates mobile user B.
Step 3: Mobile user B access the cloud in order to share A’s
personal data.
V.
FINGER PRINT
A fingerprint in its narrow sense is an impression left by the
friction ridges of a human finger. In a wider use of the term,
fingerprints are the traces of an impression from the friction
ridges of any part of a human hand. A friction ridge is a raised
portion of the epidermis on the fingers or toes. Matching the
friction edges is a process of measuring the degree of
similarity between two fingerprints. Scores are calculated by
based on the correspondence of characteristics, and the scores
have to be higher than a certain level in order to determine that
two fingerprints match. Character or pressure points of
fingerprint images are derived, and compared to character
points of fingerprints in a database to calculate the matching
scores.
Initially the user saves his/her finger print in the smart phone.
While accessing the data the user enters his finger impressions
and the match is calculated. If an exact match is found the the
users identity is revealed else the user is not allowed to access
the data.
The friction edges are clearly shown in this image.
VI.
IRIS RECOGNITION
The iris is the coloured ring around the pupil of every human
being and like a snowflake, no two are alike. Each are unique
in their own way, exhibiting a distinctive pattern. The iris is a
muscle that regulates the size of the pupil, controlling the
amount of light that enters the eye. Iris recognition is rarely
impeded by glasses or contact lenses and can be scanned from
10cm to a few meters away. The iris remains stable over time
as long as there are no injuries and a single enrolment scan can
last a lifetime.
Iris
recognition
is
an
automated
method
of biometric identification that uses mathematical patternrecognition techniques on video images of the irises of an
individual's eyes, whose complex random patterns are unique
and can be seen from some distance. Iris recognition uses
camera technology with subtle infrared illumination to acquire
images of the detail-rich, intricate structures of the iris. Digital
templates encoded from these patterns by mathematical and
statistical
algorithms
allow
unambiguous
positive
identification of an individual.
Iris cameras, in general, take a digital photo of the iris pattern
and recreating an encrypted digital template of that pattern.
That encrypted template cannot be re-engineered or
reproduced in any sort of visual image. Iris recognition
therefore affords the highest level defence against identity
theft, the most rapidly growing crime.
Iris cameras perform recognition detection of a person’s
identity by mathematical analysis of the random patterns that
are visible within the iris of an eye from some distance. It
combines computer vision, pattern recognition, statistical
inference and optics.
An user registering with distinct iris.
VII.
CONCLUSION
In the study, we used some levelsof security to secure the data
in cloud Communication between mobile users uses a random
number to access the data. A message for mobile users is
verified by the certificate authority which gives the message to
cloud and password is given back. data can be transmitted
with more layers of protection such as digital signatures,
fingerprint recognition, iris recognition. Hence this provides a
safe method for storing and retrieval of data from cloud
through smart phones.
VIII.
REFERENCES:
1.Google Storage for Developers:
http://code.google.com/intl/zhTW/apis/storage/docs/overview.html.
2. Amazon Simple Storage Service:
http://aws.amazon.com/s3/.
Taxonomy and Survey of Cloud Computing
Systems”. International Joint Conference on
INC, IMS and IDC, Seoul, pages 44- 51. Aug,
2009.
4. www.wikipedia.org
5. http://www.irisid.com/
Download