VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 156
A NETWORK SYSTEM AND SECURITY ANALYSIS FOR SECURE CLOUD STORAGELalita Kumari1
1Research Scholar, Mansarovar Global University, Bhopal, M.P Shivshankar Prajapati2
2Assistant Professor, Department of Computer Science and Engineering, Mansarovar Global University, Bhopal, M.P
Abstract- Users' freedom to use whatever they want and pay with whatever they like is a crucial aspect of cloud computing from a business perspective. Customers could access its cloud services whenever and wherever they needed to. Consumers can thus buy any IT services they desire without having to worry about how simple it will be to administer them.
A new information storage computing architecture, referred to as an Internet generation, uses the remote server. The difficulty of material security at the locations of resource providers must be addressed with cloud technology. Therefore, this research suggests developing construction for knowledge stockpiling protection with a variation of operations, in which knowledge is scrambled and divided into numerous cypher frames and distributed across a large number of provider places, rather than relying on a single provider for knowledge storing. This support was implemented in order to offer the increased security, scalability, or reliability that the new structure proposed. In order to increase security in the cloud environment, this research provided an encoded model.
Keywords: Network System, Security Analysis, Secure Cloud Storage, Cypher Frames, Internet Generation.
1 INTRODUCTION
Computer technologies have evolved tremendously and evolved progressively during the last century. For instance, the web has progressively expanded the velocity of its offerings by replacing ancient computer paradigms (Shankar, A., et al, 2021). Owing to its difficulty of both procedure and high expense, these ancient commercial proposals have increasingly been acknowledged as obsolete. Aside from that, the sheer number and variety of equipment and programming required to run them are unsettling (Chen, J., et al, 2018). By managing hardware and software transfers from consumers to skilled Service Suppliers, the newest era of clouds providers spanned the divide in computer technologies and abolished conventional systems limitations. Cloud storage is a current computer paradigm that proposes a new economic strategy for institutions to use in the lack of explicit capital. With clouds technology, all databases and software applications are turned into large data towers, making information delivery and administration ineffective (Ibrahim, I. M.et al, 2021). The traditional storing solution has fewer advantages and advantages than cloud storing, notably in terms of cost, flexibility, mobility, and applicability.
Internet storage is defined as a service
that manages and preserves information on the internet (Tian, Z., et al, 2019). That application may be found on the web. The visitor has the authority to save and retrieve documents from any website that uses the network. If the submitted documents are held on an outside computer by the provider business, the user can receive data digitally. Clouds storing solutions may be made available for businesses to use quickly and simply, but they are likely to be pricey. Because data retrieval through internet stores is slower than physically-backed, customers' information must still be backed up if cloud storing solutions are used (Wang, X.
V, et al, 2017). With clouds storing, breaking information into tiny pieces and storing these in several places keeps the information safe; as such result, if information portions in one information facility or a disc are damaged, the data may have restarted using the left chunks.
Information privacy is limited in clouds computers since data is stored at open in- service provider facilities (Xu, B, et al, 2017). Clouds technology makes the advantages more appealing than ever, but it equally brings with it a slew of new safety concerns for consumers' information. The primary security issue is that the whereabouts of the users' information are not monitored (Qi, Q, et
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 157
al, 2019). It is risky to rely on a singleservice provider as information storage in internet technology.
Cloud computing is the rescue of computing services over the Internet.
Cloud services authorize individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud computing realizes computing as a utility. It provides a pool of resources which can be allocated to users dynamically according to their requirement. Thus both the users and providers are benefited: providers can reuse their resources and users acquire and release resources according to their requirement. The cloud provide on demand self-service in which user can provision the resource (network, storage, computing) whenever required without human interaction. Computing facilities are available over the internet which can be easily accessed by the devices like mobile phones, laptops, PDAs anywhere and at any time. Cloud computing related technologies include grid computing, utility computing, virtualization and autonomic computing. Cloud computing is similar to Grid computing in a aspect that here also resources are coordinated to achieve common computational objective but it is one step ahead that it leverage virtualization technology for better resource utilization and dynamic resource provisioning. Cloud computing acts as a realization of utility computing which include on-demand resource provisioning and utility based pricing scheme. Cloud computing relates to autonomic computing in a way that it support autonomic resource provisioning but its objective it to reduce cost neither to reduce system complexity. Cloud environment is up-and-coming and demanding as a new technology which is an internet based development.
Cloud environment includes public cloud, Private cloud, Community Cloud, Hybrid Cloud. Cloud service can be grouped into three categories:
Software as a service (SaaS)- SaaS refers to the software available on the internet. It includes youtube, facebook, google applications.
Platform as a service (PaaS)- an operating system, hardware, and network are provided, and the
customer installs or develops its own software applications. It include
Infrastructure as a service (IaaS)- provides just the hardware and network; the customer installs or develops its own operating systems, software and applications. Examples of IaaS providers include Amazon EC2, GoGrid, FlexiScale. Now the cloud environment revolves around three functional units:
Cloud service provider- It is an entity, which manages Cloud Storage Server (CSS), has significant storage space to preserve the clients’ data and high computation power.
Client/owner- It is an entity, which has large data files to be stored in the cloud and relies on the cloud for data maintenance and computation; it can either be individual consumer or organizations.
User- It is a unit, which is registered with the owner and uses the data of owner stored on the cloud. The user can be an owner itself as well.
Cloud computing shares characteristics of other computing technologies hence present unique benefits over other technologies but at the same time new security issues arises.
According to a survey from IDCI in 2009, 74% IT managers and CIOs believed that the primary challenge that hinders them from using cloud computing services is cloud computing security. Another survey carried out by Garter in 2009, more than 70% CTOs believed that the primary reason not to use cloud computing services is that there are data security and privacy concerns. As a result security issues act as a major hindrance in the implementation of cloud computing.
Cloud data storage is
build of thousands of cloud storage devices clusters by network, distributed file system and other storage middleware to provide storage. CDS however offer services to assure integrity of data. But don’t provide solution to data integrity problem. So the users itself have to adopt some data security technique in cloud environment. The data security in cloud environment is major issues which hinder the organizations and industries in acquiring cloud services.
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 158
2 EXISTING SYSTEM, ANALYSIS, ANDPROPOSED SYSTEM
The frameworks improvemen life cycle (SDLC), or programming improvement life cycle to frameworks engineering, data frameworks & programming engineering, will be those procedure about making alternately adjusting systems, & the models & methodologies individuals use to create these frameworks. For programming building the SDLC idea underpins a significant number sorts for product improvemen methodologies.
These methodologies manifestation those structure to arranging & controlling the making of a data framework the product improvemen procedure.
Cloud stockpiling is, no doubt generally received because of the Notoriety of cloud registering. However, later reports show that information reduction camwood happen in cloud stockpiling suppliers (CSPs). Thus, the issue of checking the integument of the information Previously, cloud storage, which we alluded on Similarly as secure cloud capacity (SCS), need pulled in a considerable measure for consideration.
On the different hand, systems administration coding, which might have been recommended should move forward those organize capacity, likewise confronts the issue from claiming integument checking. A middle of the road switch might eagerness contaminate code words, which brings about deciphering disappointments at those endpoints. Checking the integument for code expressions is alluded should as those secure system coding issue. Diverse specialists have mulled over secure cloud stockpiling & secure organize coding freely.
Cloud stockpiling is, no doubt generally received because of the Notoriety of cloud registering. However, later reports show that information reduction camwood happen in cloud stockpiling suppliers (CSPs). Thus, the issue of checking the integument of the information Previously, cloud storage, which we alluded on Similarly as secure cloud capacity (SCS), need pulled in a considerable measure for consideration.
On the different hand, systems administration coding, which might have been recommended should move forward those organize capacity, likewise
confronts the issue from claiming integument checking. A middle of the road switch might eagerness contaminate code words, which brings about deciphering disappointments at those endpoints. Checking the integument for code expressions is alluded should as those secure system coding issue. Diverse specialists have mulled over secure cloud stockpiling & secure organize coding freely.
3 SOFTWARE REQUIREMENT SPECIFICATION
(i) A product necessities determination (SRS) – An necessities detail to a programming framework is a complete depiction of the conduct technique of a framework to be created. It incorporates a situated for use cases that depict every last one of cooperation’s the clients will need for that product. Furthermore to utilize cases, those SRS Additionally holds non-functional prerequisites.
Nonfunctional prerequisites need aid necessities which force imperatives on the plan alternately usage (such Concerning illustration execution building requirements, nature standards, or plan constraints).
(ii) Framework prerequisites specification- An organized gathering from claiming majority of the data that embodies those necessities of a framework. An benefits of the business analyst, Frequently titled framework analyst, is answerable for dissecting the business needs about their customers &
stakeholders on help recognize business issues & recommend results. Inside the frameworks advancement lifecycle domain, those ba normally performs An contact capacity the middle of the business side about an endeavor & those majority of the data engineering organization Branch alternately outer administration suppliers. Tasks need aid subject should three sorts for requirements:
(iii) Business prerequisites- describe to business terms the thing that must be conveyed or finished to provide quality.
(iv) Item prerequisites- describe properties of a framework alternately result (which Might a chance to be a standout amongst a few routes will finish a set of benefits of the business prerequisites).
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 159
(v) Transform necessities depictexercises- performed Eventually Tom's perusing the Creating association. For instance, methodology necessities Might detail. Preliminary examination analyze one task feasibility, those probability those framework will be advantageous of the association. Those primary destination of the possibility contemplate is on test the Technical, operational &
prudent possibility to including new modules & debugging of age running framework. Know framework is attainable if they need aid boundless assets &
limitless time. There are parts in the possibility contemplate bit of the preliminary investigation.
4 DESIGN AND COMPONENT DIAGRAM The bound together demonstrating dialect permits the programming architect will express a dissection model utilizing the demonstrating documentation that is legislated by a situated for syntactic
semantic & even minded tenets. A UML framework may be spoke to utilizing five diverse perspectives that depict the framework starting with uniquely separate viewpoint. Each perspective will be characterized Eventually Tom's perusing a situated of diagram, which will be Concerning illustration takes after.
In the bound together demonstrating Language, An part outline depicts how parts would wired together to structure bigger parts & alternately programming frameworks. They are used to delineate those structure from claiming subjectively mind boggling frameworks.
Segments need aid wired together Eventually Tom's perusing utilizing a gathering connector should join those needed interface for person part for the given interface about an additional part.
This illustrates the administration purchaser - administration supplier relationship the middle of the two segments.
Figure 1- Component diagram for cloud services
Figure 2- Component diagram for user
cloud services
start cloud services
stop cloud services
exit
user
register
login
upload file
generate vector
encode file
outsource file
audit
verify
download
logout
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 160
5 TEST CASES AND SCREEN SHOTSTest
Case Id Test Case Name Test Case
Desc. Test Steps Test
Case Status
Test Priorit Step Expected Actual y
01 Start cloud server To test whether the cloud server started or not
Not starts
cloud server Our data not stored in cloud server
Our data stored in Cloud server successfully
High High
02 Register User must
be registered to login into the system
If he leave any field empty
Field must be
enter Registration
Completed High High
03 Login Verifying the
User valid or not
If he enter Wrong Username or password
Displayed message like
“fail”
Login successfully
& Display the home page of login user
High High
04 Upload File Test whether upload a file or not
If user did not upload the file
We cannot stored the data in cloud server
Uploaded file saved on cloud server
High High
05 Generate vector Test whether the cloud server generate vector or not
to the
uploaded file
If user did not upload the file
file is not divided to number of blocks
File will be divided to number of blocks & All blocks are divided to fixed size.
(vector folder is available in Cloud User)
High High
06 Encode file Test whether the given file encode or not in the cloud stored files
If file is not
encoded Encode File is not stored in cloud server
Encoding process completed &
check vector folder for authenticatio n message
High High
07 Outsource file Test whether the file is outsource or not
If file is not
outsource If user not generated authentication message to cloud storage server
User send the
authenticatio n message to cloud storage server &
verify that authenticatio n message then after storing file &
authenticatio n message
Mediu
m Mediu
m
08 Audit Test whether
the file is audit or not
If any file is not audit
It is not prepare audit request & not generated query also
To prepare audit request
& audit query generated , click on verify for verification
Mediu m
Mediu m
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 161
09 Verify Test whether
the file is verify or not
If any file is
not verify It is not verify the file block is damaged or not
Verification
successfully High High
10 Download Test whether
the file is available or not in the cloud server
If the file is
not available Then no file it will shows to download
File
download &
stored D directory
High High
Figure 3- Click on start cloud services
Figure 4-Secure cloud storage started
Figure 5- Click on register button
Figure 6-After enter the details
Figure 7-Registration process will be completed
Figure 8-Then view the cloud storage services screen
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 162
Figure 9- Then go to user screen. Clickon login button
Figure 10- After enter the username &
password
Figure 11- Click on upload file
Figure 12- After uploading the file
6 CONCLUSION
We reveal a relationship between secure cloud storage & secure network coding for the first time. Based on the relationship, we propose a systematic way to construct a generic secure cloud storage protocol based on any secure network coding protocol. As a result, we obtain the first publicly verifiable secure cloud storage protocol which is secure without using the random oracle heuristic. Further, we enhance our generic construction to support user anonymity & third-party public auditing. We hope our open sourced prototype can make a step towards practical use of secure cloud storage protocols. Cloud computing is well known to have many potential benefits, but there are still a lot of real issues that need to be resolved, and data is moving to public or hybrid clouds. The study for data security predicts that it will have a comprehensive and integrated security solution to fulfil the demands of defence in depth. Separating sensitive data and controlling access are the main problems with data security. Future goals include creating a framework for data security and unified identity management that can be used by many cloud computing services or applications.
REFERENCES
1. Y. News. (2013). Cloud computing users are losing data, symantec finds [Online].
Available:http://finance.yahoo.com/news/clou d-computing-users-losing-data
205500612.html
2. P. Hernande. (2013). Byod, data loss top list of cloud computing challenges [Online].
Available: http://www.datamation.com/
cloud-computing/byod-data-loss-top-list-of- cloud-computingchallenges.html
3. A. Juels & B. Kaliski Jr, “PORs: Proofs of retrievability for large files,” in Proc. ACM Conf.
Comput. Commun. Security, 2007, pp. 584–
597.
4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, & D. Song, “Provable data possession at untrusted stores,” in Proc.
ACM Conf. Comput. Commun. Security, 2007, pp. 598–609.
5. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, &
W. Lou, “Privacy preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.
6. N. Cai & R. W. Yeung, “Secure network coding,” in Proc. IEEE Int. Symp. Inf. Theory, 2002, p. 323.
7. C. Gkantsidis & P. R. Rodriguez, “Cooperative security for network coding file distribution,”
in Proc. IEEE Int. Conf. Comput. Commun., 2006, pp. 1–13.
VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 163
8. H. Shacham & B. Waters, “Compact proofs of retrievability,” in Proc. Int. Conf. Theory Appl.
Cryptol. Inf. Security, 2008, pp. 90–107.
9. J. Xu & E.-C. Chang, “Towards efficient proofs of retrievability,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2012, pp. 79–80.
10. K. Yang & X. Jia, “An efficient & secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.
11. R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung,
“Network information flow,” IEEE Trans. Inf.
Theory, vol. 46, no. 4, pp. 1204–1216, Jul.
2000.
12. S.-Y. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Trans. Inf. Theory, vol.
49, no. 2, pp. 371–381, Feb. 2003.
13. Q. Li, J. C. Lui, and D.-M. Chiu, “On the security and efficiency of content distribution via network coding,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 211–221, Mar./Apr. 2012.
14. S. Agrawal and D. Boneh, “Homomorphic macs: Mac-based integrity for network coding,”
in Proc. Int. Conf. Appl. Cryptography Netw.
Security, 2009, pp. 292–305.
15. F. Zhao, T. Kalker, M. M edard, and K. J.
Han, “Signatures for content distribution with network coding,” in Proc. IEEE Int. Symp. Inf.
Theory, 2007, pp. 556–560.
16. D. Charles, K. Jain, and K. Lauter,“Signatures for network coding,” Int. J. Inf. Coding Theory, vol. 1, no. 1, pp. 3–14, 2009.
17. M. A. Shah, R. Swaminathan, and M. Baker,
“Privacy-preserving audit and extraction of digital contents,” IACR Cryptol. ePrint Archive, vol. 2008, p. 186, 2008.
18. M. Yang and Y. Yang, “A hypergraph approach to linear network coding in multicast networks,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 968–982, Jul. 2010.
19. T. Hsin-Yi, M. Siebenhaar, A. Miede, H. Yu- Lun, and R. Steinmetz, "Threat as a Service?:
Virtualization's Impact on Cloud Security," IT Professional, vol. 14, pp. 32-37.
20. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing" Communications Surveys &
Tutorials, IEEE, vol. PP, pp. 1-17.
21. Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, pp. 7-18.
22. Amazon.com,(2008),"AmazonWeb Services(AWS)",
23. S. Sakr, A. Liu, D. M. Batista, and M. Alomari,
"A Survey of Large Scale Data Management Approaches in Cloud Environments,"
Communications Surveys & Tutorials, IEEE, vol. 13, pp. 311-336.