providing data security in cloud computing using secure ... · in this system a user upload files...
Post on 03-May-2018
217 Views
Preview:
TRANSCRIPT
IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 01, 2017 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 373
Providing Data Security in Cloud Computing Using Secure Visual
Cryptography
A.Naveen Kumar1 T.Harivaishnavi2 S.Santhiya3 S.Kalaiselvi4 1Assistant Professor 2,3,4BE Student
1,2,3,4Department of Computer Science & Engineering 1,2,3,4The Kavery Engineering College
Abstract— Cloud computing is the model for enabling the
ubiquitous convenient, on demand network access to a
shared pool off configurable computing resources (e.g.:
networks, server, storage application and services) that can
be provide rapidly provisioned and released with minimal
management effort or service provider interaction. Security
in the biggest challenges in the cloud computing. Because
the data are should in the service provider server. To provide
the security for the data, have to encrypt the data. In this
paper, encrypted the data using visual cryptography
techniques. To generate the key for encryption by RSA
algorithm. It provides secure way to encrypt the data.
Key words: Cloud Computing, Cryptography
I. INTRODUCTION
In cloud storage against corruptions to protect outsourced
data in adding fault tolerance to cloud storage together with
data integrity checking and failure reparation becomes
critical. While providing fault tolerance. Recently
regenerating codes have gained popularity due to their lower
repair bandwidth. We propose a third party auditing scheme
for checking de- duplication and regenerating-code-based
cloud storage. To solve the regeneration problem of failed
authenticators in the absence of data owners, we introduce a
web service, which is free to regenerate the authenticators,
into the traditional third party auditing system model.
Moreover, to regenerate using partial keys we design a
novel third party verifiable authenticator, to generate by a
couple of keys and to regenerated using partial keys. Thus,
our Scheme can completely release data owners from online
burden. Cloud computing, to put it simply, means Internet
Computing. Hence the term cloud computing for
computation done through the Internet it also commonly
visualized as cloud. With Cloud Computing users can access
database resources via the Internet from anywhere, for when
they need, without worrying about any maintenance or
management of actual resources. Besides, databases in cloud
are very dynamic and scalable. Cloud computing is a model
to share pool of configurable computing resources for
enabling convenient, on-demand network access.
II. EXISTING SYSTEM
In this paper we are application which increase the
security provided by visual cryptography and provides
third party authority.
Third party authority scheme for checking and
regenerating code based cloud storage.
In this system a user upload files to the cloud using
cloud services, the TPA provides security to both the
cloud as well as the data being uploaded.
A. Disadvantages for Existing System
Information are not fully secure in cloud storage.
The system that will eliminate issues like de-
duplication.
Data authentication and security using visual
cryptography.
III. PROPOSED SYSTEM
In our proposed system, introduce the security system
based on visual cryptography.
It also the encryption keys are generated by TPA using
RSA algorithm.
The visual cryptography is providing the secure data to
cloud storage.
But visual cryptography using the RSA algorithm is
double security provide by the public key using encrypt
from the user information of secure data.
A. Advantages of Proposed System:
The data are security provided by the cloud data
storage.
The visual cryptography using from cryptographic
techniques.
RSA algorithm provided by double security in the user
data.
IV. IMPLEMENTATION
A. Module Description:
Cloud setup.
User interface design.
Key management or key generation.
Encryption using visual cryptography.
B. Cloud Setup:
Cloud setup module is using the cloud sim tool.
Cloud sim is a framework for modelling and
simulation of cloud computing infrastructure
service.
Cloud sim support for modelling and simulation of
large scale cloud computing data centres.
V. USER INTERFACE DESIGN
Providing Data Security in Cloud Computing Using Secure Visual Cryptography
(IJSRD/Vol. 5/Issue 01/2017/098)
All rights reserved by www.ijsrd.com 374
Fig. 1:
The login form are created by html coding with java script.
A. Key Management or Key Generation:
1) Importance of Key Management:
Key management is the management of cryptographic
keys in a cryptosystem. This includes dealing with the
generation, exchange, storage, use, and replacement of
keys.
Key management concerns the keys at user level, either
between the users or systems. This is contrast to key
scheduling.
Successful key management is critical to a security of
the cryptosystem.
In practice it is arguably the most difficult aspect of a
cryptography because it involves the system policy,
user training, organizational and departmental
interactions, and coordination between all of these
elements.
VI. RSA ALGORITHM
RSA algorithm is one of the first practical public key
encryption cryptosystems and is widely used for secure data
transmission. In such a cryptosystem, the encryption key is
public and differs from the decryption key which is secret.
In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers, the
factoring problem. RSA is made of the initial letters of the
names of Ron Rivest, Adi Shamir, and Leonard Adleman,
who first publicly described the algorithm in 1977. Clifford
Cocks, an English mathematician has developed an
equivalent system in 1973, but it was not declassified until
in 1997. A user of RSA creates and then publishes a public
key based on two large prime numbers, along with an
auxiliary value. The prime numbers must be secret in
anyone can use the public key to encrypt a message, but
with currently published methods, if the public key is large
enough, only someone with knowledge of the prime
numbers can feasibly to decode with the message in
breaking RSA encryption is known as the RSA problem
whether it is as hard as the factoring problem remains an
open question data is split into number of parts and each part
will be stored at different servers. The data will be stored in
database initially, as the user upload a file. A hash key is
generated at the user and also at database. The database
check whether is already exist a copy of user data, if it is
exist then only hash key will be generated but the data will
not be uploaded to avoid the de-duplication(data
duplication). Then the TPA checks the data authentication
also provide security to data. As the data is uploaded on the
server load balancing take place at each server.
VII. ENCRYPTION USING VISUAL CRYPTOGRAPHY
Visual Cryptography is a cryptographic technique is visual
Information (Image, text, etc) gets encrypted in such a way
that the decryption can be performed by the human visual
system without aid of the computers. It is also used to
protect image based secret in information. The technique
random sequence is used to divide the sequence of divide an
image into a n number of shares. The shares are sent through
different communication channels from sender to receiver so
that probability of getting sufficient shares by the intruder
minimizes.
A. Advantage of Visual Cryptography:
Encryption doesn’t require any NP hard problem
dependency.
Decryption algorithm is not required. So the unknown
person unknown to cryptography can decrypt the
message.
We can send the cipher text through FAX or E-MAIL.
Infinite Computation in Power can’t predict the
message.
Providing Data Security in Cloud Computing Using Secure Visual Cryptography
(IJSRD/Vol. 5/Issue 01/2017/098)
All rights reserved by www.ijsrd.com 375
VIII. CONCLUSION
In this project data are should be secure in cloud. to provide
the security for the data is have to encrypted the data using
visual cryptography techniques. To generate the key for
encryption by RSA algorithm. It provides secure way to
encrypt the data.
REFERENCES
[1] Q. Zheng and S. Xu, ―Secure and Efficient Proof of
Storage with De duplication,‖ in Proc. ACM Conference
on Data and Application Security and Privacy
(CODASPY),2016
[2] B. Chen, R. Curtmola, G. Ateniese, and R. Burns,
―Remote Data Checking for Network Coding-based
Distributed storage Systems,‖ in Proc. ACM Cloud
Computing Security Workshop (CCSW),2015. pp. 31–
42.
[3] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hot, ―LT
Codes based Secure and Reliable Cloud Storage
Service,‖ in Proc.IEEE International Conference on
Computer Communications (INFOCOM),2014.
[4] S. D. C. di Vimercati, S. Foresti, S. Paraboschi, G.
Pelosi,and P. Samarati, ―Efficient and Private Access
to Outsourced Data,‖ in Proc. IEEE International
Conference on Distributed Computing Systems
(ICDCS), 2013, pp.710–719.
[5] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.
S.Yau,―Dynami Audit Services for Integrity
Verification of Outsourced Storage in Clouds,‖ in Proc.
ACM Symposium on Applied Computing (SAC), 2015,
pp. 1550–1557.
[6] S. Yu, C. Wang, K. Ren, and W. Lou, ―Achieving
Secure,Scalable, and Fine-grained Data Access Control
in Cloud Computing,‖ in Proc. IEEE International
Conference on Computer Communications
INFOCOM), 2014, pp. 534–542.
top related