Providing Data Security in Cloud Computing Using Secure ... this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing Using Secure Visual Cryptography

Download Providing Data Security in Cloud Computing Using Secure ...  this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing Using Secure Visual Cryptography

Post on 03-May-2018




4 download

Embed Size (px)


<ul><li><p>IJSRD - International Journal for Scientific Research &amp; Development| Vol. 5, Issue 01, 2017 | ISSN (online): 2321-0613 </p><p>All rights reserved by 373 </p><p>Providing Data Security in Cloud Computing Using Secure Visual </p><p>Cryptography </p><p>A.Naveen Kumar1 T.Harivaishnavi2 S.Santhiya3 S.Kalaiselvi4 1Assistant Professor 2,3,4BE Student </p><p>1,2,3,4Department of Computer Science &amp; Engineering 1,2,3,4The Kavery Engineering College</p><p>Abstract Cloud computing is the model for enabling the </p><p>ubiquitous convenient, on demand network access to a </p><p>shared pool off configurable computing resources (e.g.: </p><p>networks, server, storage application and services) that can </p><p>be provide rapidly provisioned and released with minimal </p><p>management effort or service provider interaction. Security </p><p>in the biggest challenges in the cloud computing. Because </p><p>the data are should in the service provider server. To provide </p><p>the security for the data, have to encrypt the data. In this </p><p>paper, encrypted the data using visual cryptography </p><p>techniques. To generate the key for encryption by RSA </p><p>algorithm. It provides secure way to encrypt the data. </p><p>Key words: Cloud Computing, Cryptography </p><p>I. INTRODUCTION </p><p>In cloud storage against corruptions to protect outsourced </p><p>data in adding fault tolerance to cloud storage together with </p><p>data integrity checking and failure reparation becomes </p><p>critical. While providing fault tolerance. Recently </p><p>regenerating codes have gained popularity due to their lower </p><p>repair bandwidth. We propose a third party auditing scheme </p><p>for checking de- duplication and regenerating-code-based </p><p>cloud storage. To solve the regeneration problem of failed </p><p>authenticators in the absence of data owners, we introduce a </p><p>web service, which is free to regenerate the authenticators, </p><p>into the traditional third party auditing system model. </p><p>Moreover, to regenerate using partial keys we design a </p><p>novel third party verifiable authenticator, to generate by a </p><p>couple of keys and to regenerated using partial keys. Thus, </p><p>our Scheme can completely release data owners from online </p><p>burden. Cloud computing, to put it simply, means Internet </p><p>Computing. Hence the term cloud computing for </p><p>computation done through the Internet it also commonly </p><p>visualized as cloud. With Cloud Computing users can access </p><p>database resources via the Internet from anywhere, for when </p><p>they need, without worrying about any maintenance or </p><p>management of actual resources. Besides, databases in cloud </p><p>are very dynamic and scalable. Cloud computing is a model </p><p>to share pool of configurable computing resources for </p><p>enabling convenient, on-demand network access. </p><p>II. EXISTING SYSTEM </p><p> In this paper we are application which increase the security provided by visual cryptography and provides </p><p>third party authority. </p><p> Third party authority scheme for checking and regenerating code based cloud storage. </p><p> In this system a user upload files to the cloud using cloud services, the TPA provides security to both the </p><p>cloud as well as the data being uploaded. </p><p>A. Disadvantages for Existing System </p><p> Information are not fully secure in cloud storage. </p><p> The system that will eliminate issues like de-duplication. </p><p> Data authentication and security using visual cryptography. </p><p>III. PROPOSED SYSTEM </p><p> In our proposed system, introduce the security system based on visual cryptography. </p><p> It also the encryption keys are generated by TPA using RSA algorithm. </p><p> The visual cryptography is providing the secure data to cloud storage. </p><p> But visual cryptography using the RSA algorithm is double security provide by the public key using encrypt </p><p>from the user information of secure data. </p><p>A. Advantages of Proposed System: </p><p> The data are security provided by the cloud data storage. </p><p> The visual cryptography using from cryptographic techniques. </p><p> RSA algorithm provided by double security in the user data. </p><p>IV. IMPLEMENTATION </p><p>A. Module Description: </p><p> Cloud setup. </p><p> User interface design. </p><p> Key management or key generation. </p><p> Encryption using visual cryptography. </p><p>B. Cloud Setup: </p><p> Cloud setup module is using the cloud sim tool. </p><p> Cloud sim is a framework for modelling and simulation of cloud computing infrastructure </p><p>service. </p><p> Cloud sim support for modelling and simulation of large scale cloud computing data centres. </p><p>V. USER INTERFACE DESIGN </p></li><li><p>Providing Data Security in Cloud Computing Using Secure Visual Cryptography </p><p> (IJSRD/Vol. 5/Issue 01/2017/098) </p><p> All rights reserved by 374 </p><p> Fig. 1: </p><p>The login form are created by html coding with java script. </p><p>A. Key Management or Key Generation: </p><p>1) Importance of Key Management: </p><p> Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the </p><p>generation, exchange, storage, use, and replacement of </p><p>keys. </p><p> Key management concerns the keys at user level, either between the users or systems. This is contrast to key </p><p>scheduling. </p><p> Successful key management is critical to a security of the cryptosystem. </p><p> In practice it is arguably the most difficult aspect of a cryptography because it involves the system policy, </p><p>user training, organizational and departmental </p><p>interactions, and coordination between all of these </p><p>elements. </p><p>VI. RSA ALGORITHM </p><p>RSA algorithm is one of the first practical public key </p><p>encryption cryptosystems and is widely used for secure data </p><p>transmission. In such a cryptosystem, the encryption key is </p><p>public and differs from the decryption key which is secret. </p><p>In RSA, this asymmetry is based on the practical difficulty </p><p>of factoring the product of two large prime numbers, the </p><p>factoring problem. RSA is made of the initial letters of the </p><p>names of Ron Rivest, Adi Shamir, and Leonard Adleman, </p><p>who first publicly described the algorithm in 1977. Clifford </p><p>Cocks, an English mathematician has developed an </p><p>equivalent system in 1973, but it was not declassified until </p><p>in 1997. A user of RSA creates and then publishes a public </p><p>key based on two large prime numbers, along with an </p><p>auxiliary value. The prime numbers must be secret in </p><p>anyone can use the public key to encrypt a message, but </p><p>with currently published methods, if the public key is large </p><p>enough, only someone with knowledge of the prime </p><p>numbers can feasibly to decode with the message in </p><p>breaking RSA encryption is known as the RSA problem </p><p>whether it is as hard as the factoring problem remains an </p><p>open question data is split into number of parts and each part </p><p>will be stored at different servers. The data will be stored in </p><p>database initially, as the user upload a file. A hash key is </p><p>generated at the user and also at database. The database </p><p>check whether is already exist a copy of user data, if it is </p><p>exist then only hash key will be generated but the data will </p><p>not be uploaded to avoid the de-duplication(data </p><p>duplication). Then the TPA checks the data authentication </p><p>also provide security to data. As the data is uploaded on the </p><p>server load balancing take place at each server. </p><p>VII. ENCRYPTION USING VISUAL CRYPTOGRAPHY </p><p>Visual Cryptography is a cryptographic technique is visual </p><p>Information (Image, text, etc) gets encrypted in such a way </p><p>that the decryption can be performed by the human visual </p><p>system without aid of the computers. It is also used to </p><p>protect image based secret in information. The technique </p><p>random sequence is used to divide the sequence of divide an </p><p>image into a n number of shares. The shares are sent through </p><p>different communication channels from sender to receiver so </p><p>that probability of getting sufficient shares by the intruder </p><p>minimizes. </p><p>A. Advantage of Visual Cryptography: </p><p> Encryption doesnt require any NP hard problem dependency. </p><p> Decryption algorithm is not required. So the unknown person unknown to cryptography can decrypt the </p><p>message. </p><p> We can send the cipher text through FAX or E-MAIL. </p><p> Infinite Computation in Power cant predict the message. </p></li><li><p>Providing Data Security in Cloud Computing Using Secure Visual Cryptography </p><p> (IJSRD/Vol. 5/Issue 01/2017/098) </p><p> All rights reserved by 375 </p><p>VIII. CONCLUSION </p><p>In this project data are should be secure in cloud. to provide </p><p>the security for the data is have to encrypted the data using </p><p>visual cryptography techniques. To generate the key for </p><p>encryption by RSA algorithm. It provides secure way to </p><p>encrypt the data. </p><p>REFERENCES </p><p>[1] Q. Zheng and S. Xu, Secure and Efficient Proof of Storage with De duplication, in Proc. ACM Conference </p><p>on Data and Application Security and Privacy </p><p>(CODASPY),2016 </p><p>[2] B. Chen, R. Curtmola, G. Ateniese, and R. Burns, Remote Data Checking for Network Coding-based </p><p>Distributed storage Systems, in Proc. ACM Cloud </p><p>Computing Security Workshop (CCSW),2015. pp. 31</p><p>42. </p><p>[3] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hot, LT Codes based Secure and Reliable Cloud Storage </p><p>Service, in Proc.IEEE International Conference on </p><p>Computer Communications (INFOCOM),2014. </p><p>[4] S. D. C. di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi,and P. Samarati, Efficient and Private Access </p><p>to Outsourced Data, in Proc. IEEE International </p><p>Conference on Distributed Computing Systems </p><p>(ICDCS), 2013, pp.710719. </p><p>[5] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.Yau,Dynami Audit Services for Integrity </p><p>Verification of Outsourced Storage in Clouds, in Proc. </p><p>ACM Symposium on Applied Computing (SAC), 2015, </p><p>pp. 15501557. </p><p>[6] S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure,Scalable, and Fine-grained Data Access Control </p><p>in Cloud Computing, in Proc. IEEE International </p><p>Conference on Computer Communications </p><p>INFOCOM), 2014, pp. 534542. </p></li></ul>


View more >