SECURE CLOUD STORAGE OF DATA IN SMART PHONES Priyadarshini P B.E.,(third Year)Electronics and communication Engineering, St.Joseph’s college of Engineering, Chennai-6000119. S.Divya, B.TECH(Information Tecnology), Shri Sairam Institute Of Tecnology, Priya13ps@gmail.com. ABSTRACT This paper deals with the security of data in smart phones using cloud. The importance of the data stored in the smart phones is increased as more applications are deployed and executed. Once the smart phone is damaged or lost, the valuable information treasured in the device is lost altogether. If cloud storage can be integrated with cloud services for periodical data backup of a mobile client, the risk of data lost can be minimized. However, the important data might be uncovered by a malicious third party during retrieval or transmission of information using wireless cloud storage without proper authentication and protection. Therefore, in this paper, we design an archive mechanism that integrates cloud storage, security requirements for data storage of mobile phones. The security measures consists of three levels. The lower priority data is protected by digital signatures, the next level of security is thumb print and finally the most confidential and important data is secured by iris detection. This mechanism not only can avoid malicious attackers from illegal access but also can share desired information with targeted friends by distinct access rights. I. INTRODUCTION The main purpose of the original cloud is that “users can use the service anytime, anywhere through the Internet, directly through the browser.” It is an extension of distributed computing through the Internet. A huge operation procedure is automatically split into several smaller operation procedures, processed by a number of extensive systems of the server, and the output finally goes through the search and operations to return to the user. The alternative is to install software or replace Storage of data in computers requires lots of memory space which becomes a disadvantage. Hence we are moving to cloud service that stores the data in virtual space. Clouds has some security concerns such as Data security issues that include data stored in a server; servers can be accessed through browsers to obtain internal information. If a hacker attacks many servers to steal information, data stored in the server’s security is a concern. Management reliability refers to cloud security mechanisms to prevent security breaches. Protecting user privacy in clouds is the most important issue in the industry. II. ADVANTAGE OF USING CLOUD Before, the development of many algorithms, distributed computing, and grid computing , we need to understand the underlying architecture and structure. We also require specific hardware and software facilities. Traditional applications are expensive and complicated for both hardware and software. Whereas Clouds do not need to understand the underlying structure; the user only needs browsers connected to the network with the required capabilities. Clouds have the feature of enabling user access anywhere at anytime. Mobile phones have become an integral part of life; mobile users store personal data on phones, such as contact lists, text messages, photos, and programs. Smart phones can perform many of the programs detailed above. Business owners keep schedules in the phone; although the information may not be important to other mobile users, it is important to the owner of the phone. If the phone is lost or damaged, or phone numbers are changed, the issue comes up of what to do with the data stored in the phone. In previous methods, mobile users would backup data inside a computer; in the event of data loss, they would retrieve the data from the computer and place it back into the phone memory. The same procedure would apply when phones are changed. Thus, the data are backed up despite actions, but this procedure is not very convenient. There is no means to update the data in real time. Remote backup is convenient to business owners by referring to the phone number, they can plan their schedules and save important documents. Moreover, if a phone is damaged or suddenly no longer working, there is no way to get data from other places. Clouds have to be accessible over the network. However, with the constant threats of attacks and tampering on the Internet, clouds do not have the best security protection, so users do not want to store data there owing to concerns over tampering of transmissions of personal data. In addition to these issues, there have been information security incidents in the past as well as incidents of conspiracies to attack enterprises, which involve the loss of a lot more data than general attacks. Simply by using clouds, users can store personal data and back up actions. In this study, a method was developed by which mobile users register and share in a stage through the certification center to verify the signature of legitimate sources. The next level of security is thumb print and finally the most confidential and important data is secured by iris detection. III. This diagram shows the steps involved in digital signature DIGITAL SIGNATURE A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are important to detect forgery or tampering. The above picture shows a set of digital signatures. The framework consists of five stages. They are REGISTRATION STAGE: Step 1: Mobile users send information to the center. Certification Step 2: Certification center receives information that is passed to telecommunication. IV. OVERALL FRAMEWORK Data storage in the cloud is designed so that users can use mobile phones as a platform to upload, download, share, and synchronize information through cloud computing anywhere at any time. Security uses a combination of TPM chips in the mobile phones to protect the identity of mobile users as well as security technology to protect data transmissions from malicious attacks and tampering for data integrity. 1.TABLE Role Mobile User Certificate Authority Mission Upload, download, sharing, and synchronization Step 3: Telecommunication receives registration information to generate a Cloud Service Password. Step 4: Authentication center switches to pass on to the mobile user. Step 5: Action to complete the registration the user receives the message including Mobile User, Phone Number and Cloud Service Password. Step 6: The cloud service password is stored in phone memory. UPLOAD STAGE: Step 1: Mobile user uploads data. Authentication source Generated cloud password, Telecommunication store user information action DOWNLOAD STAGE: Step 1: Mobile users send download information including cloud service password, mobile user name and secret values. Step 2: Return the user’s personal data to the cloud. Cloud Stores mobile user personal data An example of finger print technology used in smart phones. SYNCHRONISM STAGE: Step 1: Mobile user uses phone A to upload data and phone B to access the cloud. Step 2: Cloud passes a message to telecommunication and telecommunication passes the password to the mobile user. Step 3: The mobile user receives the password and stores the password in phone(B) memory and access the cloud again. Step 4: Allow access to cloud and the cloud checks the Password. SHARING STAGE: Step 1:Mobile user B sends a message to Mobile user A to share A’s personal data. Step 2: Certification Authority verifies the signature. Mobile user A authenticates mobile user B. Step 3: Mobile user B access the cloud in order to share A’s personal data. V. FINGER PRINT A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. In a wider use of the term, fingerprints are the traces of an impression from the friction ridges of any part of a human hand. A friction ridge is a raised portion of the epidermis on the fingers or toes. Matching the friction edges is a process of measuring the degree of similarity between two fingerprints. Scores are calculated by based on the correspondence of characteristics, and the scores have to be higher than a certain level in order to determine that two fingerprints match. Character or pressure points of fingerprint images are derived, and compared to character points of fingerprints in a database to calculate the matching scores. Initially the user saves his/her finger print in the smart phone. While accessing the data the user enters his finger impressions and the match is calculated. If an exact match is found the the users identity is revealed else the user is not allowed to access the data. The friction edges are clearly shown in this image. VI. IRIS RECOGNITION The iris is the coloured ring around the pupil of every human being and like a snowflake, no two are alike. Each are unique in their own way, exhibiting a distinctive pattern. The iris is a muscle that regulates the size of the pupil, controlling the amount of light that enters the eye. Iris recognition is rarely impeded by glasses or contact lenses and can be scanned from 10cm to a few meters away. The iris remains stable over time as long as there are no injuries and a single enrolment scan can last a lifetime. Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irises of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. Iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual. Iris cameras, in general, take a digital photo of the iris pattern and recreating an encrypted digital template of that pattern. That encrypted template cannot be re-engineered or reproduced in any sort of visual image. Iris recognition therefore affords the highest level defence against identity theft, the most rapidly growing crime. Iris cameras perform recognition detection of a person’s identity by mathematical analysis of the random patterns that are visible within the iris of an eye from some distance. It combines computer vision, pattern recognition, statistical inference and optics. An user registering with distinct iris. VII. CONCLUSION In the study, we used some levelsof security to secure the data in cloud Communication between mobile users uses a random number to access the data. A message for mobile users is verified by the certificate authority which gives the message to cloud and password is given back. data can be transmitted with more layers of protection such as digital signatures, fingerprint recognition, iris recognition. Hence this provides a safe method for storing and retrieval of data from cloud through smart phones. VIII. REFERENCES: 1.Google Storage for Developers: http://code.google.com/intl/zhTW/apis/storage/docs/overview.html. 2. Amazon Simple Storage Service: http://aws.amazon.com/s3/. Taxonomy and Survey of Cloud Computing Systems”. International Joint Conference on INC, IMS and IDC, Seoul, pages 44- 51. Aug, 2009. 4. www.wikipedia.org 5. http://www.irisid.com/