“INFORMATION SYSTEM FOR GMAIL WITH KNOWLEDGE DISCOVERY NEW ARCHITECTURE FOR CLOUD ” 1JAVED AKHTAR KHAN (Ph.D Scholar ) Computer Science & Engineering Department Takshshila Institute Of Engineering & Technology Bhagwant University Ajmer Jabalpur (M.P) INDIA (er.javedkhan@gmail.com) 2Dr.M.R ALONY Computer Science & Engineering Department TIT Group Of Institute Of Engineering Bhagwant University Ajmer Bhopal (M.P) INDIA mr.alony@gmail.com Abstract:-With the development of cloud computing Data Security become very important in cloud computing .This paper analyses the basic problem of cloud computing data security. In this research paper we concentrate on cloud App’s (Pass/Sass/Iass) is application of cloud computing, and set up new architecture model of data security in cloud computing with knowledge discovery .The main objective of this paper is to elaborate how get internal mail information without clicking mail after login, apart from that we face another problem user not able to login another mail ID at on same domain if user already login/used his/her other mail in the same domain. So in this Paper I proposed user can access all the mail id in the same domain in the same time and read all massages at a time this is done on only single click. this is facilities we are provide as in the drop down manner . In the other word we can say we provide the switching facilities one mail id to other mail id in same domain or in the other domain at the same time . Gartner defines Cloud computing as being scalable, delivering IT-enabled services using the Internet [2]. Each model has different levels of responsibility for security management. See Figure(1) below for a depiction of these service models. Key words:- cloud computing ,Data security model , Software as a Service (SaaS), Platform as a Service (PaaS), , Infrastructure as a Service (IaaS),Private Cloud Computing. I-Introduction There are many definitions of Cloud computing, but they all focus on certain characteristics of it. The definition mostly used today is the one expressed by the National Institute of Standards and Technology (NIST), which states: “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. According to Figure[1] Cloud computing models. Taken from (Buecker, Lodewijkx, Moss, Skapinetz, Waidner, 2009)[3]. This Figure-1 above shows that Software as a Service (SaaS) provides a number of ways to control access to the Web portal, such as the management of user identities, application level configuration, and the ability to restrict access to specific IP address ranges or geographies. Platform as a Service (PaaS) allow clients to assume more responsibilities for managing the configuration and security for the middleware, database software, and application runtime environments. Infrastructure as a Service (IaaS) model transfers even more control, and responsibility for security, from the Cloud provider to the client; access is available to the operating system that supports virtual images, networking, and storage. Security concerns such as secure data transfer, secure software interfaces, secure stored data, user access control and data separation must be considered before moving to the Cloud . The cloud vendors list Microsoft, IBM Smart Cloud, and Google. Every trade publication and analyst firm has done a survey of CIOs regarding Cloud adoption. Results showed that security was the top reason why CIOs are not too anxious about adapting to the Cloud See Figure (2). s public or a large industry group. Public Clouds are owned by the organization(s) selling Cloud services . Figure (3) below gives a basic illustration of an organization using a public Cloud. Figure-3 Illustration of an organization using public Cloud services. (Diagram by Delvis Simmonds and Alli Wahab, 2012). B. Private Cloud Computing The highest challenge/issue related to the Cloud is security. Security is not the only concern. Issues such as cost, availability, performance, and standardization are also very high considerations. According to the National Institute of Standards and Technology (NIST) a private Cloud is a Cloud infrastructure that is operated solely for an organization. The organization or a third party can manage it. Private Clouds can exist on-site or offsite . Typically private Clouds are used when sensitive data is involved. Figure(4) below gives a basic illustration of an organization using a private Cloud. A. Public Cloud Computing There are three Cloud models which companies can choose from, which are public Cloud computing, private Cloud computing and hybrid Cloud computing. Public Cloud computing means relying on third parties to offer efficient IT services over the Internet as needed. On the other hand, Private Cloud computing reassures the organization that their information and processes are more secure since everything is managed internally. Hybrid Cloud computing is a combination of both private and public services. Hybrid Cloud computing is another extensive topic; therefore this paper will not discuss it. The National Institute of Standards and Technology defines a public Cloud as a Cloud infrastructure that is made available to the general Figure (4): Illustration of an organization with a private Cloud. (Diagram by Delvis Simmonds and Alli Wahab, 2012). II. Literature Survey I am read some latest research paper regarding to cloud computing security issue some of them introduce here Security is one of the major issues which hamper the [4] growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. Now in This paper author introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types. According to Secure Overlay Cloud Storage with Access Control and Assured Deletion [5] implement FADE, a secure overlay cloud storage system that achieves fine-grained, policybased access control and file assured deletion. It associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to anyone upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. strength of security mechanisms. His architecture adjusts security strength according to the specific service needs as well as the risk. S. Ram govind and colleagues provide an overall security perspective on cloud computing, illustrating security requirements coupled with cloud service and deployment models.[11] Hassan Takabi and his colleagues discuss user authentication, access control, policies, service, and trust in the cloud environment.[12] In 2011, S. Subashini and V. Kavitha surveyed SQL injection flaws, cross-site scripting, insecure storage, and invalidated redirects or forwards.[13] Minqi Zhou and colleagues investigated cloud security and privacy issues in terms of the special relationship between users and providers in a cloud.[14] The relationship contains three parties: the cloud service user, cloud service provider/cloud user, and cloud provider. However, most of the existing research discusses cloud security from a generic viewpoint outside a cloud. III. Problem Definition Threshold proxy re-encryption scheme [6] and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Current research on cloud security is still in the early stages, and no universal model or set of techniques has yet emerged. Methods include segregating user resources during data processing to prevent widespread virus infection, the use of a third-party auditor to verify the integrity of data stored in the cloud[7][8] and access control based on data attributes and semantics.[9][10]Some trust management experts recommend applying multiple security policies to authenticate users, manage identities, and protect data from unauthorized users. Amazon administrators, for example, log and routinely audit any access to customers’ data or operating systems To fill the need for a more discerning security architecture, author exploring a security-on-demand design that applies security algorithms and protocols according to three stages in the service data’s life cycle: in transmission, Traditional security planning has maintained the security level in high-risk system environments by increasing the We all are have the Email -ID in various domain like Yahoo ! Gmail, Hotmail So many more . we know that maximum people have a more then one mail Id some time In the same domain like Gmail, yahoo etc but people not access all Id in the same time in the same domain .I am provide the solution of this problem in my research work. Shown in Figure (5). In this figure-5 I am take Gmail Login Page generally used by many people after Successfully login we get this page shown in figure (6). Now after successfully login we get this page in the Gmail Domain .Say for example I have more than one mail id in the Gmail which is er.javedkhan@gmail.com and javedkhan505@gmail.com when I log in the gmail.com and access er.javedkhan@gmail.com inbox at this time I am not able to access the javedkhan505@gmail.com inbox. So in this Paper I proposed user can access all the mail id in the same domain in the same time and read all massages at a time this is done on only single click. this is facilities we are provide as in the drop down manner . In the other word we can say we provide the switching facilities one mail id to other mail id in same domain or in the other domain at the same time this is done with the help of using the concept of virtualization . IV. Proposed Solution Google cloud Application Gmail in conventional architecture user only access one Mail ID. so in my research work we Proposed New architecture that have a feature to provide facilities to user able access more than one ID at the same Time in same Domain .shown in figure(7) New Architecture Gmail Cloud Computing This is new proposed Architecture for Gmail Cloud Application working step 1. User Enter in the Gmail login and Insert his/her User Name Password.(Figure E) 2. Next Process is Username /Password Verification. 3. After Authentication (if Correct) user get Home page (Inbox page) (Figure F) 4. If user want to switch to another Mail –ID then user only going to Drop Down List click and insert password.(Figure G ) 5. After password verification user get new Mail-ID page (For New Different Mail-ID in the same Domain ) at the same time . V. Conclusions & Future Work This figure (8) show the output of my research work here user able access more then one Mail-Id at the same time without logout previous ID and read all Mail from Different Mail –ID in same domain . Our method fully integrates encrypting, encoding, and forwarding. This paper has described a new architecture for Gmail application. With the help of virtualization concept we used this unique idea for different Domain like Gmail to Yahoo switching, Yahoo to Gmail Switching etc in future. We have demonstrated the output of new architecture. In this paper we have provided a definition of Cloud computing and highlighted the security issues/concerns related to public Clouds and private Clouds. Cloud computing is a very wide subject area. Even though the scope was scaled down to the security issues in public Cloud computing and private Cloud computing it was still quite a challenge getting details on certain areas; most information found during the research is related to either public Cloud computing or Cloud computing in general. Reference [1](2009) The NIST Definition of Cloud Computing. Retrieved March 15, 2012 from http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf [2]Cloud Computing. Retrieved April 15, 2012 from http://www.gartner.com/technology/itglossary/cloud-computing.jsp [3]Buecker. A., Lodewijkx. K., Moss. H., Skapinetz. K., & Waidner. M. (2009). Cloud Security Guidance. IBM Recommendations for the Implementation of Cloud Security. Cloud security: the grand challenge. Retrieved April 16, 2012 from http://www.redbooks.ibm.com/redpapers/pdfs/redp 4614.pdf [4] Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 247 Cloud Computing Security Issues and Challenges Kuyoro S. O. afolashadeng@gmail.com Department of Computer Science Babcock University IlishanRemo, 240001, Nigeria Ibikunle F. faibikunle2@yahoo.co.uk Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. delealways@yahoo.com Department of Computer Science Babcock University IlishanRemo, 240001, Nigeria [5] Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P.C. Lee, Member, IEEE, John C.S. Lui, Fellow, IEEE, and Radia Perlman, Fellow, IEEE IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 6, NOVEMBER/DECEMBER 2012 [6] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member, IEEE . [7]. C. Wang et al., “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, 2010, pp. 19-24. [8] Q. Wang et al., “Enabling Public Auditability and Data Dy- namics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. [9] 2011, pp. 847-859. 5. L.K. Hu, S. Yi, and X.Y. Jia, “A Semantics-Based Approach for Cross Domain Access Control,” J. Internet Technology, vol. 11, no. 2, 2010, pp. 279-288. [10]G. Pallis, “Clou d Computing: The New Frontier of Internet Computing,” IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 70-73. [11] S. Ramgovind, M.M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” Proc. Information Security for South Asia (ISSA 10), IEEE Press, 2010, pp. 1–7. [12] H. Takabi, J.B.D. Joshi, and G.-J. Ahn, “SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments,” Proc. 2010 IEEE 34th Ann. Computer Software and Applications Conf. Workshops, IEEE Press, 2010, pp. 393–398. [13] S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J. Network and Computer Applications, vol. 34, no. 1, 2010, pp. 1– 11. [14] M. Zhou et al., “Security and Privacy in Cloud Computing: A Survey,” Proc. 6th Int’l Conf. Semantics, Knowledge and Grids, IEEE Press, 2010, pp. 105–112 Author Information – 1 Javed Akhtar Khan is Currently an Assistant professor in the Department of Computer Science and Engineering Technology , at Takshshila Institute of Engineering & Technology Jabalpur (M.P) INDIA. He is pursuing his Ph.D degree in Computer Science and Engineering from Bhagwant University Ajmer .He serves on the editorial boards for IJETMR Journal .He is member of ISTE,IDES. 2 Dr. MR Alony is Currently an Professor in Department of Computer Science and Engineering Technology ,at TIT Excellence Bhopal .He received his Ph.D degree in Computer Science and Engineering in year 2000.He has published various research paper in various reputed journals , and coordinate a various International and National Conference . .