f201401201390279406 - Academic Science,International

advertisement
“INFORMATION SYSTEM FOR GMAIL WITH KNOWLEDGE DISCOVERY NEW
ARCHITECTURE FOR CLOUD ”
1JAVED AKHTAR KHAN (Ph.D Scholar )
Computer Science & Engineering Department
Takshshila Institute Of Engineering & Technology
Bhagwant University Ajmer
Jabalpur (M.P) INDIA
(er.javedkhan@gmail.com)
2Dr.M.R ALONY
Computer Science & Engineering Department
TIT Group Of Institute Of Engineering
Bhagwant University Ajmer
Bhopal (M.P) INDIA
mr.alony@gmail.com
Abstract:-With the development of cloud
computing Data Security become very important in
cloud computing .This paper analyses the basic
problem of cloud computing data security. In this
research paper we concentrate on cloud App’s
(Pass/Sass/Iass) is application of cloud computing,
and set up new architecture model of data security
in cloud computing with knowledge discovery .The
main objective of this paper is to elaborate how get
internal mail information without clicking mail
after login, apart from that we face another problem
user not able to login another mail ID at on same
domain if user already login/used his/her other
mail in the same domain. So in this Paper I
proposed user can access all the mail id in the same
domain in the same time and read all massages at a
time this is done on only single click. this is
facilities we are provide as in the drop down
manner . In the other word we can say we provide
the switching facilities one mail id to other mail id
in same domain or in the other domain at the same
time .
Gartner defines Cloud computing as being scalable,
delivering IT-enabled services using the Internet
[2]. Each model has different levels of
responsibility for security management. See Figure(1) below for a depiction of these service
models.
Key words:- cloud computing ,Data security model
, Software as a Service (SaaS), Platform as a
Service (PaaS), , Infrastructure as a Service
(IaaS),Private Cloud Computing.
I-Introduction
There are many definitions of Cloud computing,
but they all focus on certain characteristics of it.
The definition mostly used today is the one
expressed by the National Institute of Standards and
Technology (NIST), which states: “a model for
enabling convenient, on-demand network access to
a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and
released with minimal management effort or
service provider interaction” [1]. According to
Figure[1] Cloud computing models. Taken from
(Buecker, Lodewijkx, Moss, Skapinetz, Waidner,
2009)[3]. This Figure-1 above shows that Software
as a Service (SaaS) provides a number of ways to
control access to the Web portal, such as the
management of user identities, application level
configuration, and the ability to restrict access to
specific IP address ranges or geographies. Platform
as a Service (PaaS) allow clients to assume more
responsibilities for managing the configuration and
security for the middleware, database software, and
application runtime environments. Infrastructure as
a Service (IaaS) model transfers even more control,
and responsibility for security, from the Cloud
provider to the client; access is available to the
operating system that supports virtual images,
networking, and storage. Security concerns such as
secure data transfer, secure software interfaces,
secure stored data, user access control and data
separation must be considered before moving to the
Cloud . The cloud vendors list Microsoft, IBM
Smart Cloud, and Google. Every trade publication
and analyst firm has done a survey of CIOs
regarding Cloud adoption. Results showed that
security was the top reason why CIOs are not too
anxious about adapting to the Cloud See Figure (2).
s
public or a large industry group. Public Clouds are
owned by the organization(s) selling Cloud services
. Figure (3) below gives a basic illustration of an
organization
using
a
public
Cloud.
Figure-3 Illustration of an organization using public
Cloud services. (Diagram by Delvis Simmonds and
Alli Wahab, 2012).
B. Private Cloud Computing
The highest challenge/issue related to the Cloud is
security. Security is not the only concern. Issues
such as cost, availability, performance, and
standardization are also very high considerations.
According to the National Institute of Standards
and Technology (NIST) a private Cloud is a Cloud
infrastructure that is operated solely for an
organization. The organization or a third party can
manage it. Private Clouds can exist on-site or offsite . Typically private Clouds are used when
sensitive data is involved. Figure(4) below gives a
basic illustration of an organization using a private
Cloud.
A. Public Cloud Computing
There are three Cloud models which companies can
choose from, which are public Cloud computing,
private Cloud computing and hybrid Cloud
computing. Public Cloud computing means relying
on third parties to offer efficient IT services over
the Internet as needed. On the other hand, Private
Cloud computing reassures the organization that
their information and processes are more secure
since everything is managed internally. Hybrid
Cloud computing is a combination of both private
and public services. Hybrid Cloud computing is
another extensive topic; therefore this paper will
not discuss it. The National Institute of Standards
and Technology defines a public Cloud as a Cloud
infrastructure that is made available to the general
Figure (4): Illustration of an organization with a
private Cloud. (Diagram by Delvis Simmonds and
Alli Wahab, 2012).
II. Literature Survey
I am read some latest research paper regarding to
cloud computing security issue some of them
introduce here Security is one of the major issues
which hamper the [4] growth of cloud. The idea of
handing over important data to another company is
worrisome; such that the consumers need to be
vigilant in understanding the risks of data breaches
in this new environment. Now in This paper
author introduces a detailed analysis of the cloud
computing security issues and challenges focusing
on the cloud computing types and the service
delivery types. According to Secure Overlay Cloud
Storage with Access Control and Assured Deletion
[5] implement FADE, a secure overlay cloud
storage system that achieves fine-grained, policybased access control and file assured deletion. It
associates outsourced files with file access policies,
and assuredly deletes files to make them
unrecoverable to anyone upon revocations of file
access policies. To achieve such security goals,
FADE is built upon a set of cryptographic key
operations that are self-maintained by a quorum of
key managers that are independent of third-party
clouds.
strength of security mechanisms. His architecture
adjusts security strength according to the specific
service needs as well as the risk. S. Ram govind
and colleagues provide an overall security
perspective on cloud computing, illustrating
security requirements coupled with cloud service
and deployment models.[11] Hassan Takabi and
his colleagues discuss user authentication, access
control, policies, service, and trust in the cloud
environment.[12] In 2011, S. Subashini and V.
Kavitha surveyed SQL injection flaws, cross-site
scripting, insecure storage, and invalidated redirects
or forwards.[13] Minqi Zhou and colleagues
investigated cloud security and privacy issues in
terms of the special relationship between users and
providers in a cloud.[14] The relationship contains
three parties: the cloud service user, cloud service
provider/cloud user, and cloud provider. However,
most of the existing research discusses cloud
security from a generic viewpoint outside a cloud.
III. Problem Definition
Threshold proxy re-encryption scheme [6] and
integrate it with a decentralized erasure code such
that a secure distributed storage system is
formulated. The distributed storage system not only
supports secure and robust data storage and
retrieval, but also lets a user forward his data in the
storage servers to another user without retrieving
the data back. The main technical contribution is
that the proxy re-encryption scheme supports
encoding operations over encrypted messages as
well as forwarding operations over encoded and
encrypted messages. Current research on cloud
security is still in the early stages, and no universal
model or set of techniques has yet emerged.
Methods include segregating user resources during
data processing to prevent widespread virus
infection, the use of a third-party auditor to verify
the integrity of data stored in the cloud[7][8] and
access control based on data attributes and
semantics.[9][10]Some trust management experts
recommend applying multiple security policies to
authenticate users, manage identities, and protect
data
from
unauthorized
users.
Amazon
administrators, for example, log and routinely audit
any access to customers’ data or operating systems
To fill the need for a more discerning security
architecture, author exploring a security-on-demand
design that applies security algorithms and
protocols according to three stages in the service
data’s life cycle: in transmission, Traditional
security planning has maintained the security level
in high-risk system environments by increasing the
We all are have the Email -ID in various domain
like Yahoo ! Gmail, Hotmail So many more . we
know that maximum people have a more then one
mail Id some time In the same domain like Gmail,
yahoo etc but people not access all Id in the same
time in the same domain .I am provide the solution
of this problem in my research work. Shown in
Figure (5).
In this figure-5 I am take Gmail Login Page
generally used by many people after Successfully
login we get this page shown in figure (6).
Now after successfully login we get this page in the
Gmail Domain .Say for example I have more than
one mail id in the Gmail which is
er.javedkhan@gmail.com
and
javedkhan505@gmail.com when I log in the
gmail.com and access er.javedkhan@gmail.com
inbox at this time I am not able to access the
javedkhan505@gmail.com inbox. So in this Paper I
proposed user can access all the mail id in the same
domain in the same time and read all massages at a
time this is done on only single click. this is
facilities we are provide as in the drop down
manner . In the other word we can say we provide
the switching facilities one mail id to other mail id
in same domain or in the other domain at the same
time this is done with the help of using the concept
of virtualization .
IV. Proposed Solution
Google cloud Application Gmail in conventional
architecture user only access one Mail ID. so in my
research work we Proposed New architecture that
have a feature to provide facilities to user able
access more than one ID at the same Time in same
Domain .shown in figure(7)
New Architecture Gmail Cloud Computing
This is new proposed Architecture for Gmail
Cloud Application working step
1. User Enter in the Gmail login and Insert his/her
User Name Password.(Figure E)
2. Next Process is Username /Password
Verification.
3. After Authentication (if Correct) user get Home
page (Inbox page) (Figure F)
4. If user want to switch to another Mail –ID then
user only going to Drop Down List click and insert
password.(Figure G )
5. After password verification user get new Mail-ID
page (For New Different Mail-ID in the same
Domain ) at the same time .
V. Conclusions & Future Work
This figure (8) show the output of my research
work here user able access more then one Mail-Id
at the same time without logout previous ID and
read all Mail from Different Mail –ID in same
domain . Our method fully integrates encrypting,
encoding, and forwarding.
This paper has described a new architecture for
Gmail application. With the help of virtualization
concept we used this unique idea for different
Domain like Gmail to Yahoo switching, Yahoo to
Gmail Switching etc in future. We have
demonstrated the output of new architecture. In
this paper we have provided a definition of Cloud
computing and highlighted the security
issues/concerns related to public Clouds and
private Clouds. Cloud computing is a very wide
subject area. Even though the scope was scaled
down to the security issues in public Cloud
computing and private Cloud computing it was still
quite a challenge getting details on certain areas;
most information found during the research is
related to either public Cloud computing or Cloud
computing in general.
Reference
[1](2009) The NIST Definition of Cloud
Computing. Retrieved March 15, 2012 from
http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf
[2]Cloud Computing. Retrieved April 15, 2012
from
http://www.gartner.com/technology/itglossary/cloud-computing.jsp
[3]Buecker. A., Lodewijkx. K., Moss. H.,
Skapinetz. K., & Waidner. M. (2009). Cloud
Security Guidance. IBM Recommendations for the
Implementation of Cloud Security. Cloud security:
the grand challenge. Retrieved April 16, 2012 from
http://www.redbooks.ibm.com/redpapers/pdfs/redp
4614.pdf
[4] Kuyoro S. O., Ibikunle F. & Awodele O.
International Journal of Computer Networks
(IJCN), Volume (3) : Issue (5) : 2011 247 Cloud
Computing Security Issues and Challenges Kuyoro
S. O. afolashadeng@gmail.com Department of
Computer Science Babcock University IlishanRemo,
240001,
Nigeria
Ibikunle
F.
faibikunle2@yahoo.co.uk Department of Computer
Science Covenant University Otta, 240001, Nigeria
Awodele O. delealways@yahoo.com Department
of Computer Science Babcock University IlishanRemo, 240001, Nigeria
[5] Secure Overlay Cloud Storage with Access
Control and Assured Deletion Yang Tang, Patrick
P.C. Lee, Member, IEEE, John C.S. Lui, Fellow,
IEEE, and Radia Perlman, Fellow, IEEE IEEE
TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 9, NO. 6,
NOVEMBER/DECEMBER 2012
[6] A Secure Erasure Code-Based Cloud Storage
System with Secure Data Forwarding Hsiao-Ying
Lin, Member, IEEE, and Wen-Guey Tzeng,
Member, IEEE .
[7]. C. Wang et al., “Toward Publicly Auditable
Secure Cloud Data Storage Services,” IEEE
Network, vol. 24, no. 4, 2010, pp. 19-24.
[8] Q. Wang et al., “Enabling Public Auditability
and Data Dy- namics for Storage Security in Cloud
Computing,” IEEE Trans. Parallel and Distributed
Systems, vol. 22, no.
[9] 2011, pp. 847-859. 5. L.K. Hu, S. Yi, and X.Y.
Jia, “A Semantics-Based Approach for Cross
Domain Access Control,” J. Internet Technology,
vol. 11, no. 2, 2010, pp. 279-288.
[10]G. Pallis, “Clou d Computing: The New
Frontier of Internet Computing,” IEEE Internet
Computing, vol. 14, no. 5, 2010, pp. 70-73.
[11] S. Ramgovind, M.M. Eloff, and E. Smith,
“The Management of Security in Cloud
Computing,” Proc. Information Security for South
Asia (ISSA 10), IEEE Press, 2010, pp. 1–7.
[12] H. Takabi, J.B.D. Joshi, and G.-J. Ahn,
“SecureCloud: Towards a Comprehensive Security
Framework for Cloud Computing Environments,”
Proc. 2010 IEEE 34th Ann. Computer Software and
Applications Conf. Workshops, IEEE Press, 2010,
pp. 393–398.
[13] S. Subashini and V. Kavitha, “A Survey on
Security Issues in Service Delivery Models of
Cloud Computing,” J. Network and Computer
Applications, vol. 34, no. 1, 2010, pp. 1– 11.
[14] M. Zhou et al., “Security and Privacy in Cloud
Computing: A Survey,” Proc. 6th Int’l Conf.
Semantics, Knowledge and Grids, IEEE Press,
2010, pp. 105–112
Author Information – 1 Javed Akhtar Khan is Currently
an Assistant professor in the Department of Computer
Science and Engineering Technology , at Takshshila
Institute of Engineering & Technology Jabalpur (M.P)
INDIA. He is pursuing his Ph.D degree in Computer
Science and Engineering from Bhagwant University
Ajmer .He serves on the editorial boards for IJETMR
Journal .He is member of ISTE,IDES.
2
Dr. MR Alony is Currently an Professor in Department
of Computer Science and Engineering Technology ,at
TIT Excellence Bhopal .He received his Ph.D degree
in Computer Science and Engineering in year 2000.He
has published various research paper in various reputed
journals , and coordinate a various International and
National Conference .
.
Download