Professional Documents
Culture Documents
Journal of Computer
Engineering
Technology (IJCET),
ISSN 0976-6367(Print),
INTERNATIONAL
JOURNAL
OFand
COMPUTER
ENGINEERING
&
ISSN 0976 - 6375(Online), Volume 6, Issue 2, February (2015), pp. 45-53 IAEME
TECHNOLOGY (IJCET)
IJCET
IAEME
2
3
Dr.A.K.Sen 2 ,
Rajkumar Shende3
ABSTRACT
In cloud computing we can store personal and business data. Cloud computing provides
various features like less maintenance, more storage capacity, pay-per-use etc. But with this features
cloud computing has some disadvantages like security and privacy. Existing data security
mechanisms are not sufficient for the security of the data. In this work, five layers of security of data
have been proposed which makes data more secure on cloud. In the 1st two layers user
authentication with one time password mechanism is proposed. Then in the next layers data
encryption, access rights and in the final layer file will be split and store that file on different
locations of server.
Keywords: AES (Advanced Standard Encryption), Access Rights, Cloud Computing, Data
Protection Mechanisms, File Split and Merge
I.
INTRODUCTION
Cloud computing is becoming more and more popular today. With traditional desktop
computing we were running copies of software programs on our own computer. Whatever the
documents created by user, that were store on users computer. Although documents can be accessed
from other computer within a network but they cant be accessed outside the network. But in cloud
computing we can use these services anywhere, anytime. Cloud computing offers various services
over the internet so customer doesnt need to buy that services [1].Cloud computing can run
programs at the same time on many connected computers [2].
45
1.1
REVIEW OF LITERATURE
Cloud Computing provides various services over the internet [7]. By using the cloud
computing user doesnt need to store his data on his personal hard drive. Pay per use facility which is
provided by cloud computing, many organizations started using it. But with the increasing use of
cloud computing security problems arises [6]. Cloud computing services and internet transmission can
be divided into security domains. First security domain is network domain. In the network domain
data is not secure when data is in transmission. Second domain is service domain .In this data is not
secured in cloud services. And the third domain is storage domain. In this data is not secure when it is
in storage. For these three domains it includes mechanisms such as authentication, encryption of data,
use of access control, etc. [6] [8].
46
In three ways it is possible to secure file .The first way is to to provide authentication to user. Second
method is to hide the type of file means the extension of file. For a low level hacker it is not possible
to find that file or its extension. But a high level hacker can easily find that file form a system so this
method also doesnt work. And next method is use of encryption algorithm. With the encryption
algorithm it is not possible to get original data. But the question arises when data is broken or
falsified. So encryption of data is also not sufficient for data security [8].
III. PROPOSED WORK
Cloud computing provides many services to enterprises. Also it is possible to access and store
not only our business but also personal data on cloud. But with this benefits security of data is a
major concern in cloud computing. Though user authentication is provided to access data but it is not
sufficient for the security of data. To overcome this problem, it is necessary to develop a system
which will provide not only access rights, encryption of data but also data will be disjointly stored.
The aim of this work is to develop a system which will provide highest security to data
3.1 The implementation will consist of 4 modules User panel
When user login to system he will get activation code on his registered email-id. User should
provide this code to download, view files.
Encryption of file and Access Rights
Once the admin login to system admin will provide access rights to the user. And when he
will upload a file that file be he will provide AES encryption key for the file encryption. The user
who is having access right for any file that user can access file otherwise not.
File Store
After providing access rights and using AES algorithm for data encryption file will be break
into parts and that file will be store on different locations of server. so it makes more complex for
hacker to get the file.
File Access
Only authorized user can access file from server. To download a file user will get key on his
email-id. User has to provide that key then only user can download file.
48
IV. RESULTS
49
(a)
(b)
Fig. 5(a) (b): File Breaking and storing it on different locations
Figure 5. Shows after uploading file, file will be break into parts. This figure shows after
breaking a file, file parts are stored on different locations of server like server0, sever1. If file name
is AESencryption.pdf then on server location it will look like AESencryption_0 which is first part,
AESencryption_1 which is second part.
50
51
52
5.
6.
7.
8.
www.thebowditchgroup.com/17-cloud-computing-applications-small-business,Cloud
Computing Applications, 15 Sep 2013
Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud
Computing, vol.1.pp.647-651, 2012
Di Iu, Pingchang Bai, Hong Jiang, Using The User Space File System To Protect File
International Conference on Apperceiving Computing and Intelligence Analysis
(ICACIA),pp.350-353,2010.
V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, Data Confidentiality and Integrity
Verification Using User Authentication Scheme in Cloud IEEE International Conference
on Green High Performance Computing (ICGHPC), pp.1-5, 2013.
53