Escolar Documentos
Profissional Documentos
Cultura Documentos
1, March 2019 7
Abstract--- Present days many users store their significant DES algorithm was designed by Horst Feistel and
data in cloud. To ensure that the security of the cloud stored developed by IBM in the early 1970’s. This algorithm was
data users need to encrypt the important data. The point of submitted to the National Bureau of Standards (NBS). Initially
data security which has always been noteworthy aspect of it was found that this algorithm includes differential
quality, cloud computing cause a new security threats. In cryptanalysis.
cloud storage systems, the server that stores the client’s data
So this algorithm was slightly modified to strengthen
is not necessarily trusted. The existing system does not provide differential cryptanalysis at the same time it was weakened
security mechanisms for storing data in clouds. But the against Brute-Force attack which consists of an attacker
proposed system can provide security against collusion attack,
submitting many passwords or passphrases with the hope of
DDOS attack. Existing data auditing schemes have security eventually guessing correctly.
risks in processing of data. For achieving the efficiency of
cloud storage the proposed system provides flexible data Thus the attacker continuously checks for correct
segmentation with additional authorization process among the passwords and passphrases.
three participating parties of client, Server and a Third Party In order to prevent this problem we KGC in which the
Auditor (TPA). With the DES algorithm collusion attack can request sent from the client is forwarded to the user through
be resisted since this is a identity based data storage scheme. sms and once they grant permission for the client to view the
Keywords--- DDOS Attack, Collusion Attack, Third Party file, the password is sent to the client. Thus we protect the
Auditor, DES Algorithm. privacy of the user.
The document is continuously monitored and clients can
use just one attempt to view the file and once they provide
I. INTRODUCTION
wrong password that particular person is restricted to view the
Cloud computing uses a network of remote severs hosted file this way they will not be able to even guess the password.
on the Internet to store, manage and process data rather than a The password will be valid only upto a particular and each
local server or a personal computer. Cloud computing [2] time it is being changed by the user.
provides convenient, on-demand services from a shared pool
of configurable computing resources. In spite of the numerous Thus one client can view that particular document and
advantages, unpredictable security and privacy concerns [3], even if they share the password, the other person will not be
[4] become the most important problem that make it difficult able to use it.
to widespread adoption of data storage in public cloud This way the files uploaded by the user are secured by
infrastructure. modified DES algorithm.
In the existing system, anyone can easily receive the
document from the server which is completely insecure and II. EXISTING SYSTEM
lack of privacy. In order to overcome this problem we put The existing system [1] consists of Efficient Traceable
together Data Authorization Search System for Secure Cloud Storage. In this
system the user can upload a file with a password.
Encryption Standard algorithm with cloud storage
facilities. We include sms sent to the user through which the Authorized user may intentionally leak the secret key for
privacy has been protected. financial benefit. So that any client can request and open the
file without the knowledge of the user. Thus, tracing and
revoking the malicious user who abuses secret key needs to be
M. Jayasarathi, B.E, UG Student, Department of Computer Science and solved imminently.
Engineering, Sree Sakthi Engineering College Anna University, Chennai,
India. E-mail: jayasarathi06@gmail.com
S. Rajeshwari, B.E, UG Student, Department of Computer Science and III. BLOCK DIAGRAM OWNER-MODULE
Engineering, Sree Sakthi Engineering College Anna University, Chennai,
India. E-mail: roja0010@gmail.com Registration-Module
I. Shiny Mercy, B.E, UG Student, Department of Computer Science and In this module the cloud storage space is available that can
Engineering, Sree Sakthi Engineering College Anna University, Chennai, be purchased by any owner, at first they should be registered.
India. E-mail: Shinymercy1997@gmail.com
S.K.B. Rathika, M.E, Assistant Professor, Department of Computer
Science and Engineering Sree Sakthi Engineering College Anna University,
Chennai, India. E-mail: rathika.skb@gmail.com
DOI:10.9756/BIJSESC.9004
VI. CONCLUSION
The enforcement of access control and the support of
keyword search are important issues in secure cloud storage
system. In this work, proposed DES algorithm for securing
data. It supports flexible multiple keywords subset search, and
solves the privacy issues. Malicious user who sells secret key
for benefit can be traced. The performance analysis and
simulation show its efficiency in computation and storage
overhead. Experimental results indicate that the computation
overhead at user’s terminal is significantly reduced, which
greatly saves the energy for resource-constrained devices of
users.
VII. ACKNOWLEDGEMENT
It is a pleasure for us to acknowledge all those who
assisted and lead this project to a success.
REFERENCES
[1] Y. Yang, X. Liu, X. Zheng, C. Rong and W. Guo, “Efficient Traceable
Authorization Search Systemfor Secure Cloud Storage”, IEEE
Transactions on Cloud Computing, 2018.
[2] C. Wang, N. Cao, J. Li, K. Ren and W. Lou, “Secure ranked keyword
search over encrypted cloud data”, IEEE 30th International Conference
on Distributed Computing Systems (ICDCS), Pp. 253-262, 2010.