Você está na página 1de 9

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

An Efficient and Secure Architecture For Data Storage In


Multi Cloud.
Mr. Gajendrasingh Chandel, Mr.Rajkumar R. Yadav
Assistant Professor, Student M.tech 2nd Year
Computer Science & Engineering, SSSIST, Sehor
ABSTRACT
In proposed system we are implementing the concept of multiple cloud storage along with
enhanced security using EMSE techniques. Where storing complete file on single cloud system will
encrypt the file then split the file in different chunks and store it on different cloud and the Meta
data required for decrypting and rearranging a file will be stored in metadata management
server. The basic plan is to use many clouds at constant time to mitigate the risks of malicious
knowledge manipulation, disclosure, and method molding. This design changed targets the
confidentiality of knowledge and process logic. The proposed system, file get distributed at three
different location. First location i.e. cloud server is our application and next two more FTP where
2nd and 3rd file is store. In proposed system, we design setting page where this will be further
used by application to upload and download file from created table. Develop a web interface to
upload and download files in cloud storage. The different file uploading links are open. The user
can choose the link which we want to upload on cloud. In Proposed system, we are splits the file in
different portions then encode and store it on different cloud. Meta data necessary for decrypting
and moving a file will be stored in metadata management server. File can club with another file. In
this data are merging in the form of chunks of files are collected at one place which is already
stored in different cloud server. The rearranging a files and decrypt the file using decryption
technique and data stream will convert into original files.
I. INTRODUCTION
Cloud computing is growing technology in recent years. As on before the development of the cloud
computing generally the enterprises used to store the data in the internal storage of the organization
itself. The data stored will be very confidential and even it has some security measures and it is protected
from the unauthorized user. But in the cloud computing environment the storage of data is somewhere
from the client workplace and the data storage and security measures will be in the service provider of
the cloud computing environment. Generally the data is stored after it is encrypted. This is for the
security of the clients or users data. The explosion in cloud computing over the past few years has led to
a situation that is common to many innovations and new technologies. This dissertation will attempt to
clarify the mis-conceptions regarding the topic by offering a comprehensive definition of cloud
computing and the business benefits it can bring. Security challenges are the biggest obstacles when
considering the adoption of cloud services. This triggered a lot of research activities, resulting in a
quantity of proposals targeting the various cloud security threats. Alongside with these security issues
the cloud paradigm comes with a new set of unique features which open the path towards novel security
approaches, techniques and architectures. A survey is provided security merits by making use of multiple
clouds simultaneously. Various architectures are introduced and discussed according to their security
and privacy capabilities and prospects.
Cloud computing offers dynamically scalable resources provisioned as a service over the Internet. The
third-party users, on-demand base, self-service for users, pay as per use and seamlessly scalable
1 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317
computing resources and services offered by the cloud paradigm promise to reduce capital as well as
operational expenditures for hardware and software.
Usually the monolithic system tracks across various PCs means splitting the file into distinct client and
server modules. In such schemes, the client module controls the user interface and the server provided
back-end handling, such as record entrance, printing, and so on.
As computers are proliferated, low cost, and became connected by more bandwidth networks, splitting
software applications into multiple components became more convenient, with each and every
component running on a different computer and performing a specialized function. Traditionally, having
a monolithic system run across multiple computers has splitting the system into separate client and
server components. In such systems, the client component handles the user interface and the server
provided back processing, such as database authorization, displaying data, and so on.
This approach simplified the development, management, administration, and often improved
performance and robustness, since failure in one computer did not necessarily disable the entire system.
In proposed system we are implementing the concept of multiple cloud storage along with enhanced
security using EMSE techniques. Where storing complete file on single cloud system will encrypt the file
then split the file in different chunks and store it on different cloud and the Meta data required for
decrypting and rearranging a file will be stored in metadata management server. The basic plan is to use
many clouds at constant time to mitigate the risks of malicious knowledge manipulation, disclosure, and
method molding. This design changed targets the confidentiality of knowledge and process logic. It
provides a solution to the subsequent question.

Figure: Design of Multi cloud Storage Environment

II. ASSUMPTION AND OBJECTIVES OF DATA SECURITY ON MULTICLOUD STORAGE ENVIRONMENT


The assumptions and development of data security on cloud are as follows
Setting up and configuring different cloud server in order to having storage cloud access
Using cloud server API develop file accessing method in different cloud.
Developing encryption technique before storing it on cloud.
2 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

Develop a file management classes in dot net.


Develop a web interface to upload and download files in cloud storage.

Cloud Server Setting Module


The proposed system, file get distributed at three different location. First location i.e. cloud server is our
application and next two more FTP where 2nd and 3rd file is store. In proposed system, we design setting
page where this will be further used by application to upload and download file from created table.
Upload And Download Module
Develop a web interface to upload and download files in cloud storage. The different file uploading links
are open. The user can choose the link which we want to upload on cloud. User can upload the file on
cloud such as doc file, video, mp3, etc. Homepage will show list of file uploaded by user from user specific
directory. In proposed system, we use data list to show file list .File class to get folder and file details like
file name, file size. Upload file by using file uploaded control we can let the user select file to be upload.
File Encryption Module
Setting up and configuring different cloud server in order to having storage cloud access. Each clouds its
own server. Using encryption technique like AES for file decryption before storing it on multi cloud
environment. In proposed system, we use combination of AES algorithm and SHA-1 algorithm for
encryption and splitting of File.
File Splitting And Merging Module
In Proposed system, we are splits the file in different portions then encode and store it on different cloud.
Meta data necessary for decrypting and moving a file will be stored in metadata management server. File
can club with another file. The basic plan is to use many clouds at constant time to mitigate the risks of
malicious knowledge manipulation, disclosure, and method meddling. This design changed targets the
confidentiality of knowledge and process logic. It provides a solution to the subsequent question:
however will a cloud user avoid absolutely revealing the information or process logic to the cloud
provider. The information shouldn't solely be protected whereas within the persistent storage, however
particularly once it's processed.
The idea of this design is that the applying logic must be divided into fine-grained components and these
components area unit distributed to distinct cloud. In coding technique, the user encrypts the
information together with his public key and uploads the cipher texts to the Cloud. The cloud will
severally figure on the encrypted knowledge to get encrypted result that solely the user will decode. The
user (or a little trusty non-public cloud) manages the keys and performs the coding and coding
operations, whereas the huge computation on encrypted knowledge is finished by AN untrusted public
cloud.
III. THE DATA ENCRYPTION ON MULTICLOUD ENVIRONMENT
In proposed methodology Encryption is the conversion of data into a form, called a cipher text that
cannot be easily understood by unauthorized people. The only way to get meaning out of the cipher text
is to use AES and the same key to transform it back into the plaintext.
3 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317

Figure: Data Encryption on Multi Cloud Environment


IV. THE DATA MERGING ON MULTICLOUD ENVIRONMENT
In this data are merging in the form of chunks of files are collected at one place which is already stored in
different cloud server. The rearranging a files and decrypt the file using decryption technique and data
stream will convert into original files.

Figure: Data Merging on Multi cloud Environment


4 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853,
4853 Impact Factor 1.317
V. EXPERIMENTAL
IMENTAL RESULT AND ANALYSIS
This section provides result and analysis of our experiment. Different size of data files are used to
evaluate performance. The results are taken out on the single cloud and multi cloud environment.
Following table show the result of our experiment on different file size with calculated average value of
time.
Table: Experimental Result in Cloud Environment

Sr.
No.

1
2
3
4
5

File
Type

EXEL
DOC
HTML
JPG
PDF

Data
Size
(KB)

30
32
286
763
2125

AES
(MS)
Single
Cloud
7
22
110
65
464

Multiple
Cloud
8
6
97
10
169

DES
(MS)
Single
Cloud
46
96
140
762
1517

Multiple
Cloud
39
40
140
139
471

3DES
(MS)
Single
Cloud
30
31
102
110
489

Multiple
Cloud
25
29
102
21
193

Below Figure shows the experimental result graph respectively for AES, DES and 3DES

500
Response Time (MS)

450
400
350
300
250

Single Cloud

200
150

Multiple Cloud

100
50
0
30

32

286

763

2125

File Size in KB

Figure : Comparison of different size of the file using AES in cloud environment

5 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853,
4853 Impact Factor 1.317

500
Response Time (MS)

450
400
350
300
250

Single Cloud

200
150

Multiple Cloud

100
50
0
30

32

286

763

2125

File Size in KB

Figure : Comparison of different size of the file using DES in cloud environment

500
Response Time (MS)

450
400
350
300
250

Single Cloud

200
150

Multiple Cloud

100
50
0
30

32

286

763

2125

File Size in KB

Figure : Comparison on different size of the file using 3-DESin


3 DESin cloud environment
These experimental result shows that EMSE performs better than single cloud in terms of response time.
VI. CONCLUSION
By implementing the cloud based storage many security problems and safe storage issues of Business is
done. But on the other side many expert state that it is more risky to put the data over single cloud as it
increase the malicious user attack possibilities, so it is the responsibility of a good cloud service provider
to ensure secure storage of data on the cloud to his customer. We are trying to provide two way
securities to the data by encrypting the data and by storing data on the multiple
mul
servers. Also, the
6 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317
responsibility of storing the sensitive data about the user accounts is taken by different central server,
which will help in securing the data from attacks hence by designing the proposed system we are
extending the storage cloud security by distributing and encrypting the data. The performance of this
technique shows that it provide the better result for storing, uploading, encryption time.
VII. REFERENCES
[1]

Eman M.Mohamed, Hatem S. Abdelkader, Sherif EI-Etriby, Enhanced Data Security Model for
Cloud Computing, The 8th International Conference on informatics and Systems (INFOS2012),
Cairo, pp CC-12-CC17, May 2012.

[2]

J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono,N. Marnau, Security and Privacy-Enhancing Multicloud Architectures, IEEE Transaction on dependable and secure computing, VOL. 10, NO. 4, pp
212-224, March 2013.

[3]

Kan Yang, Ren, XiaohuaJia, Bo Zhang, and Ruitao Xie, DAC-MACS: Effective Data Access Control
for Multi-Authority Cloud Storage Systems, Information Forensic and Security, IEEE Transaction
on, Vol: 8, Issue: 11, pp 1790-1801, Aug 2013.

[4]

P. Mell and T. Grance, The NIST definition of cloud computing, National Institute of Standards
and Technology, NIST special publication, Computer Security Division, Sept 2011.

[5]

Jing-Jang Hwang and Hung-Kai Chuang A Business Model for Cloud Computing Based on a
Separate Encryption and Decryption Service, Information Science and Application (ICISA),
International Conference, Jeju Island, pp 1-7, April 2011.

[6]

J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, Security Prospects through
Cloud Computing by Adopting Multiple Clouds, Proc. IEEE Fourth Intl Conf. Cloud Computing
(CLOUD),Washington, DC , pp 565-572 ,July 2011.

[7]

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical Security Issues in Cloud


Computing In Proceeding of IEEE Intl Conf. Cloud Computing (CLOUD-II), Bangalore, pp 109118, Sept 2009.

[8]

Kan Yang, XiaohuaJia, Attributed-based Access Control for Multi-Authority Systems in Cloud
Storage, in Proceeding of IEEE 32nd International Conference on Distributed Computing
Systems , Macau , pp 536-545,18 21, June 2012.

[9]

Prakash G L, Dr. Manish Prateek, Dr. Inder Singh Data Encryption and Decryption Algorithms
using Key Rotations for Data Security in Cloud System Signal Propagation and Computer
Technology (ICSPCT), 2014 International Conference on, Ajmer, July 2014.

[10]

M. A. AlZain, B. Soh and E. Pardede, MCDB: Using Multi-Clouds to Ensure Security in Cloud
Computing, in Proceeding of 2011 Ninth IEEE International Conference on Dependable,
Autonomic and Secure Computing, Sydney, NSW, pp 784-791, Dec 2011.

[11]

C. Selvakumar, G. JeevaRathanam, M.R.Sumalatha PDDS Improving Cloud Data Storage


Security Using Data Partitioning Technique Advanced Computing Conference (IACC) ,pp 7-11,
Ghaziabhad , Feb 2013.

7 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317
[12]

Akash Kumar Mandal, Mrs. Archana Tiwari, Performance Evaluation of Cryptographic


Algorithms: DES and AES, in Proceeding of Students Conference on Electrical, Electronics and
Computer Science, pp 1-5, Bhopal, March 2012.

[13]

Taeho Jung, Xiang-Yang Li, Zhiguo Wan,Meng Wan Privacy Preserving Cloud Data Access With
Multi-Authorities INFOCOM, 2013 Proceedings IEEE, Turin, pp 2625 2633 , April 2013.

[14]

ZHANG Wei, SUN Xinwei, Data Privacy Protection Using Multiple Cloud Storages Mechatronic
Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference
on, Shengyang, pp 1768-1772, Dec. 2013.

[15]

Ms. S. Vijaya Lekshmi, Mrs. M.P. Revathi, Implementing Secure Data Access Control for
Multiauthority Cloud Storage System Using Cipher text Policy-Attribute Based Encryption,
Information Communication and Embedded Systems (ICICES), 2014 International Conference on,
Chennai , pp 27-28 Feb. 2014.

[16]

Prashant Kumar , Lokesh Kumar, Security Threats to Cloud Computing, International Journal of
IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013.

[17]

Bupesh Mansukhani, Tanveer A. Zia, An empirical study of challenges in managing the security
in cloud computing In Proceedings of the 9th Australian Information Security Management
Conference, Edith Cowan University, Australia, pp 172-181 , December 2011 .

[18]

Elminaam, D S Abd; Kader H M Abdual and Hadhoud, M Mohamed, Evaluating the Performance
of Sysmmetric Encryption Algorithms, International Journal of Network Security, Vol. 10, No. 3,
pp 216-222, May 2010.

[19]

G.Devi, M.Pramod Kumar, A CRM Service Based on a Separate Encryption and Decryption using
Blowfish algorithm International Journal of Computer Trends and Technology- volume 3, Issue 4,
pp 592-596, Aug 2012.

[20]

Jawahar Thakur, Nagesh Kumar, AES, DES, .Blowfish: Symmetric key algorithm Simulation based
performance analysis, International Journal of Emerging Technology and Advanced Engineering
,Volume 1, Issue 2, pp 6-12, December 2011.

[21]

Sunil Sanka, Chittaranjan Hota, Muttukrishnan Rajarajan, Secure Data Access in Cloud
Computing IEEE 4th International Conference on Internet Multimedia Services Architecture and
Application (IMSAA), Banglore, pp 1-6, December 2010.

[22]

Balasaraswathi V.R.I, Manikandan , Enhanced Security for Multi-Cloud Storage using


Cryptographic Data Splitting with Dynamic Approach, Advanced Communication Control and
Computing Technologies (ICACCCT), 2014 International Conference on, Ramanathapuram ,pp
1190 1194, May 2014

[23]

Michael
Gregg
10
Security
Concerns
for
Cloud
Computing
http://viewer.media.bitpipe.com/1078177630_947/1268847180_5/WP_VI_10SecurityConcerns
cloudComputing.pdf, Accessed on Jan14.

[24]

Atul Kahate Cryptography and Network Security, Tata Mc-graw Hill, 3rd Edition 2008.

8 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317
[25]

Stallings, W; Cryptography and Network Security: Principals and Practices, Prentice Hall, 8th
Edition, 2009.

[26]

Secaascategory8encryptionimplementation,
https://cloudsecurityalliance.org/download/secaas-category-8guidance.

[27]

D.R. Stinson Cryptography Theory and Practice CRC Press, INC., 2002.

[28]

Panchaghare V.K, Eastern Economy Edition, Cryptography and Information Security, PHI
publication, 17/11/2008

9 | 2015, IJAFRC All Rights Reserved

Retrieved
2012,
from
encryption implementation-

www.ijafrc.org

Você também pode gostar