• Tidak ada hasil yang ditemukan

View of A NETWORK SYSTEM AND SECURITY ANALYSIS FOR SECURE CLOUD STORAGE

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of A NETWORK SYSTEM AND SECURITY ANALYSIS FOR SECURE CLOUD STORAGE"

Copied!
8
0
0

Teks penuh

(1)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 156

A NETWORK SYSTEM AND SECURITY ANALYSIS FOR SECURE CLOUD STORAGE

Lalita Kumari1

1Research Scholar, Mansarovar Global University, Bhopal, M.P Shivshankar Prajapati2

2Assistant Professor, Department of Computer Science and Engineering, Mansarovar Global University, Bhopal, M.P

Abstract- Users' freedom to use whatever they want and pay with whatever they like is a crucial aspect of cloud computing from a business perspective. Customers could access its cloud services whenever and wherever they needed to. Consumers can thus buy any IT services they desire without having to worry about how simple it will be to administer them.

A new information storage computing architecture, referred to as an Internet generation, uses the remote server. The difficulty of material security at the locations of resource providers must be addressed with cloud technology. Therefore, this research suggests developing construction for knowledge stockpiling protection with a variation of operations, in which knowledge is scrambled and divided into numerous cypher frames and distributed across a large number of provider places, rather than relying on a single provider for knowledge storing. This support was implemented in order to offer the increased security, scalability, or reliability that the new structure proposed. In order to increase security in the cloud environment, this research provided an encoded model.

Keywords: Network System, Security Analysis, Secure Cloud Storage, Cypher Frames, Internet Generation.

1 INTRODUCTION

Computer technologies have evolved tremendously and evolved progressively during the last century. For instance, the web has progressively expanded the velocity of its offerings by replacing ancient computer paradigms (Shankar, A., et al, 2021). Owing to its difficulty of both procedure and high expense, these ancient commercial proposals have increasingly been acknowledged as obsolete. Aside from that, the sheer number and variety of equipment and programming required to run them are unsettling (Chen, J., et al, 2018). By managing hardware and software transfers from consumers to skilled Service Suppliers, the newest era of clouds providers spanned the divide in computer technologies and abolished conventional systems limitations. Cloud storage is a current computer paradigm that proposes a new economic strategy for institutions to use in the lack of explicit capital. With clouds technology, all databases and software applications are turned into large data towers, making information delivery and administration ineffective (Ibrahim, I. M.et al, 2021). The traditional storing solution has fewer advantages and advantages than cloud storing, notably in terms of cost, flexibility, mobility, and applicability.

Internet storage is defined as a service

that manages and preserves information on the internet (Tian, Z., et al, 2019). That application may be found on the web. The visitor has the authority to save and retrieve documents from any website that uses the network. If the submitted documents are held on an outside computer by the provider business, the user can receive data digitally. Clouds storing solutions may be made available for businesses to use quickly and simply, but they are likely to be pricey. Because data retrieval through internet stores is slower than physically-backed, customers' information must still be backed up if cloud storing solutions are used (Wang, X.

V, et al, 2017). With clouds storing, breaking information into tiny pieces and storing these in several places keeps the information safe; as such result, if information portions in one information facility or a disc are damaged, the data may have restarted using the left chunks.

Information privacy is limited in clouds computers since data is stored at open in- service provider facilities (Xu, B, et al, 2017). Clouds technology makes the advantages more appealing than ever, but it equally brings with it a slew of new safety concerns for consumers' information. The primary security issue is that the whereabouts of the users' information are not monitored (Qi, Q, et

(2)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 157

al, 2019). It is risky to rely on a single

service provider as information storage in internet technology.

Cloud computing is the rescue of computing services over the Internet.

Cloud services authorize individuals and businesses to use software and hardware that are managed by third parties at remote locations. Cloud computing realizes computing as a utility. It provides a pool of resources which can be allocated to users dynamically according to their requirement. Thus both the users and providers are benefited: providers can reuse their resources and users acquire and release resources according to their requirement. The cloud provide on demand self-service in which user can provision the resource (network, storage, computing) whenever required without human interaction. Computing facilities are available over the internet which can be easily accessed by the devices like mobile phones, laptops, PDAs anywhere and at any time. Cloud computing related technologies include grid computing, utility computing, virtualization and autonomic computing. Cloud computing is similar to Grid computing in a aspect that here also resources are coordinated to achieve common computational objective but it is one step ahead that it leverage virtualization technology for better resource utilization and dynamic resource provisioning. Cloud computing acts as a realization of utility computing which include on-demand resource provisioning and utility based pricing scheme. Cloud computing relates to autonomic computing in a way that it support autonomic resource provisioning but its objective it to reduce cost neither to reduce system complexity. Cloud environment is up-and-coming and demanding as a new technology which is an internet based development.

Cloud environment includes public cloud, Private cloud, Community Cloud, Hybrid Cloud. Cloud service can be grouped into three categories:

 Software as a service (SaaS)- SaaS refers to the software available on the internet. It includes youtube, facebook, google applications.

 Platform as a service (PaaS)- an operating system, hardware, and network are provided, and the

customer installs or develops its own software applications. It include

 Infrastructure as a service (IaaS)- provides just the hardware and network; the customer installs or develops its own operating systems, software and applications. Examples of IaaS providers include Amazon EC2, GoGrid, FlexiScale. Now the cloud environment revolves around three functional units:

 Cloud service provider- It is an entity, which manages Cloud Storage Server (CSS), has significant storage space to preserve the clients’ data and high computation power.

 Client/owner- It is an entity, which has large data files to be stored in the cloud and relies on the cloud for data maintenance and computation; it can either be individual consumer or organizations.

 User- It is a unit, which is registered with the owner and uses the data of owner stored on the cloud. The user can be an owner itself as well.

Cloud computing shares characteristics of other computing technologies hence present unique benefits over other technologies but at the same time new security issues arises.

According to a survey from IDCI in 2009, 74% IT managers and CIOs believed that the primary challenge that hinders them from using cloud computing services is cloud computing security. Another survey carried out by Garter in 2009, more than 70% CTOs believed that the primary reason not to use cloud computing services is that there are data security and privacy concerns. As a result security issues act as a major hindrance in the implementation of cloud computing.

Cloud data storage is

build of thousands of cloud storage devices clusters by network, distributed file system and other storage middleware to provide storage. CDS however offer services to assure integrity of data. But don’t provide solution to data integrity problem. So the users itself have to adopt some data security technique in cloud environment. The data security in cloud environment is major issues which hinder the organizations and industries in acquiring cloud services.

(3)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 158

2 EXISTING SYSTEM, ANALYSIS, AND

PROPOSED SYSTEM

The frameworks improvemen life cycle (SDLC), or programming improvement life cycle to frameworks engineering, data frameworks & programming engineering, will be those procedure about making alternately adjusting systems, & the models & methodologies individuals use to create these frameworks. For programming building the SDLC idea underpins a significant number sorts for product improvemen methodologies.

These methodologies manifestation those structure to arranging & controlling the making of a data framework the product improvemen procedure.

Cloud stockpiling is, no doubt generally received because of the Notoriety of cloud registering. However, later reports show that information reduction camwood happen in cloud stockpiling suppliers (CSPs). Thus, the issue of checking the integument of the information Previously, cloud storage, which we alluded on Similarly as secure cloud capacity (SCS), need pulled in a considerable measure for consideration.

On the different hand, systems administration coding, which might have been recommended should move forward those organize capacity, likewise confronts the issue from claiming integument checking. A middle of the road switch might eagerness contaminate code words, which brings about deciphering disappointments at those endpoints. Checking the integument for code expressions is alluded should as those secure system coding issue. Diverse specialists have mulled over secure cloud stockpiling & secure organize coding freely.

Cloud stockpiling is, no doubt generally received because of the Notoriety of cloud registering. However, later reports show that information reduction camwood happen in cloud stockpiling suppliers (CSPs). Thus, the issue of checking the integument of the information Previously, cloud storage, which we alluded on Similarly as secure cloud capacity (SCS), need pulled in a considerable measure for consideration.

On the different hand, systems administration coding, which might have been recommended should move forward those organize capacity, likewise

confronts the issue from claiming integument checking. A middle of the road switch might eagerness contaminate code words, which brings about deciphering disappointments at those endpoints. Checking the integument for code expressions is alluded should as those secure system coding issue. Diverse specialists have mulled over secure cloud stockpiling & secure organize coding freely.

3 SOFTWARE REQUIREMENT SPECIFICATION

(i) A product necessities determination (SRS) – An necessities detail to a programming framework is a complete depiction of the conduct technique of a framework to be created. It incorporates a situated for use cases that depict every last one of cooperation’s the clients will need for that product. Furthermore to utilize cases, those SRS Additionally holds non-functional prerequisites.

Nonfunctional prerequisites need aid necessities which force imperatives on the plan alternately usage (such Concerning illustration execution building requirements, nature standards, or plan constraints).

(ii) Framework prerequisites specification- An organized gathering from claiming majority of the data that embodies those necessities of a framework. An benefits of the business analyst, Frequently titled framework analyst, is answerable for dissecting the business needs about their customers &

stakeholders on help recognize business issues & recommend results. Inside the frameworks advancement lifecycle domain, those ba normally performs An contact capacity the middle of the business side about an endeavor & those majority of the data engineering organization Branch alternately outer administration suppliers. Tasks need aid subject should three sorts for requirements:

(iii) Business prerequisites- describe to business terms the thing that must be conveyed or finished to provide quality.

(iv) Item prerequisites- describe properties of a framework alternately result (which Might a chance to be a standout amongst a few routes will finish a set of benefits of the business prerequisites).

(4)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 159

(v) Transform necessities depict

exercises- performed Eventually Tom's perusing the Creating association. For instance, methodology necessities Might detail. Preliminary examination analyze one task feasibility, those probability those framework will be advantageous of the association. Those primary destination of the possibility contemplate is on test the Technical, operational &

prudent possibility to including new modules & debugging of age running framework. Know framework is attainable if they need aid boundless assets &

limitless time. There are parts in the possibility contemplate bit of the preliminary investigation.

4 DESIGN AND COMPONENT DIAGRAM The bound together demonstrating dialect permits the programming architect will express a dissection model utilizing the demonstrating documentation that is legislated by a situated for syntactic

semantic & even minded tenets. A UML framework may be spoke to utilizing five diverse perspectives that depict the framework starting with uniquely separate viewpoint. Each perspective will be characterized Eventually Tom's perusing a situated of diagram, which will be Concerning illustration takes after.

In the bound together demonstrating Language, An part outline depicts how parts would wired together to structure bigger parts & alternately programming frameworks. They are used to delineate those structure from claiming subjectively mind boggling frameworks.

Segments need aid wired together Eventually Tom's perusing utilizing a gathering connector should join those needed interface for person part for the given interface about an additional part.

This illustrates the administration purchaser - administration supplier relationship the middle of the two segments.

Figure 1- Component diagram for cloud services

Figure 2- Component diagram for user

cloud services

start cloud services

stop cloud services

exit

user

register

login

upload file

generate vector

encode file

outsource file

audit

verify

download

logout

(5)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 160

5 TEST CASES AND SCREEN SHOTS

Test

Case Id Test Case Name Test Case

Desc. Test Steps Test

Case Status

Test Priorit Step Expected Actual y

01 Start cloud server To test whether the cloud server started or not

Not starts

cloud server Our data not stored in cloud server

Our data stored in Cloud server successfully

High High

02 Register User must

be registered to login into the system

If he leave any field empty

Field must be

enter Registration

Completed High High

03 Login Verifying the

User valid or not

If he enter Wrong Username or password

Displayed message like

“fail”

Login successfully

& Display the home page of login user

High High

04 Upload File Test whether upload a file or not

If user did not upload the file

We cannot stored the data in cloud server

Uploaded file saved on cloud server

High High

05 Generate vector Test whether the cloud server generate vector or not

to the

uploaded file

If user did not upload the file

file is not divided to number of blocks

File will be divided to number of blocks & All blocks are divided to fixed size.

(vector folder is available in Cloud User)

High High

06 Encode file Test whether the given file encode or not in the cloud stored files

If file is not

encoded Encode File is not stored in cloud server

Encoding process completed &

check vector folder for authenticatio n message

High High

07 Outsource file Test whether the file is outsource or not

If file is not

outsource If user not generated authentication message to cloud storage server

User send the

authenticatio n message to cloud storage server &

verify that authenticatio n message then after storing file &

authenticatio n message

Mediu

m Mediu

m

08 Audit Test whether

the file is audit or not

If any file is not audit

It is not prepare audit request & not generated query also

To prepare audit request

& audit query generated , click on verify for verification

Mediu m

Mediu m

(6)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 161

09 Verify Test whether

the file is verify or not

If any file is

not verify It is not verify the file block is damaged or not

Verification

successfully High High

10 Download Test whether

the file is available or not in the cloud server

If the file is

not available Then no file it will shows to download

File

download &

stored D directory

High High

Figure 3- Click on start cloud services

Figure 4-Secure cloud storage started

Figure 5- Click on register button

Figure 6-After enter the details

Figure 7-Registration process will be completed

Figure 8-Then view the cloud storage services screen

(7)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 162

Figure 9- Then go to user screen. Click

on login button

Figure 10- After enter the username &

password

Figure 11- Click on upload file

Figure 12- After uploading the file

6 CONCLUSION

We reveal a relationship between secure cloud storage & secure network coding for the first time. Based on the relationship, we propose a systematic way to construct a generic secure cloud storage protocol based on any secure network coding protocol. As a result, we obtain the first publicly verifiable secure cloud storage protocol which is secure without using the random oracle heuristic. Further, we enhance our generic construction to support user anonymity & third-party public auditing. We hope our open sourced prototype can make a step towards practical use of secure cloud storage protocols. Cloud computing is well known to have many potential benefits, but there are still a lot of real issues that need to be resolved, and data is moving to public or hybrid clouds. The study for data security predicts that it will have a comprehensive and integrated security solution to fulfil the demands of defence in depth. Separating sensitive data and controlling access are the main problems with data security. Future goals include creating a framework for data security and unified identity management that can be used by many cloud computing services or applications.

REFERENCES

1. Y. News. (2013). Cloud computing users are losing data, symantec finds [Online].

Available:http://finance.yahoo.com/news/clou d-computing-users-losing-data

205500612.html

2. P. Hernande. (2013). Byod, data loss top list of cloud computing challenges [Online].

Available: http://www.datamation.com/

cloud-computing/byod-data-loss-top-list-of- cloud-computingchallenges.html

3. A. Juels & B. Kaliski Jr, “PORs: Proofs of retrievability for large files,” in Proc. ACM Conf.

Comput. Commun. Security, 2007, pp. 584–

597.

4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, & D. Song, “Provable data possession at untrusted stores,” in Proc.

ACM Conf. Comput. Commun. Security, 2007, pp. 598–609.

5. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, &

W. Lou, “Privacy preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.

6. N. Cai & R. W. Yeung, “Secure network coding,” in Proc. IEEE Int. Symp. Inf. Theory, 2002, p. 323.

7. C. Gkantsidis & P. R. Rodriguez, “Cooperative security for network coding file distribution,”

in Proc. IEEE Int. Conf. Comput. Commun., 2006, pp. 1–13.

(8)

VOLUME: 08, Issue 02, Paper id-IJIERM-VIII-II, April 2021 163

8. H. Shacham & B. Waters, “Compact proofs of retrievability,” in Proc. Int. Conf. Theory Appl.

Cryptol. Inf. Security, 2008, pp. 90–107.

9. J. Xu & E.-C. Chang, “Towards efficient proofs of retrievability,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2012, pp. 79–80.

10. K. Yang & X. Jia, “An efficient & secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.

11. R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung,

“Network information flow,” IEEE Trans. Inf.

Theory, vol. 46, no. 4, pp. 1204–1216, Jul.

2000.

12. S.-Y. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Trans. Inf. Theory, vol.

49, no. 2, pp. 371–381, Feb. 2003.

13. Q. Li, J. C. Lui, and D.-M. Chiu, “On the security and efficiency of content distribution via network coding,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 211–221, Mar./Apr. 2012.

14. S. Agrawal and D. Boneh, “Homomorphic macs: Mac-based integrity for network coding,”

in Proc. Int. Conf. Appl. Cryptography Netw.

Security, 2009, pp. 292–305.

15. F. Zhao, T. Kalker, M. M edard, and K. J.

Han, “Signatures for content distribution with network coding,” in Proc. IEEE Int. Symp. Inf.

Theory, 2007, pp. 556–560.

16. D. Charles, K. Jain, and K. Lauter,“Signatures for network coding,” Int. J. Inf. Coding Theory, vol. 1, no. 1, pp. 3–14, 2009.

17. M. A. Shah, R. Swaminathan, and M. Baker,

“Privacy-preserving audit and extraction of digital contents,” IACR Cryptol. ePrint Archive, vol. 2008, p. 186, 2008.

18. M. Yang and Y. Yang, “A hypergraph approach to linear network coding in multicast networks,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 968–982, Jul. 2010.

19. T. Hsin-Yi, M. Siebenhaar, A. Miede, H. Yu- Lun, and R. Steinmetz, "Threat as a Service?:

Virtualization's Impact on Cloud Security," IT Professional, vol. 14, pp. 32-37.

20. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing" Communications Surveys &

Tutorials, IEEE, vol. PP, pp. 1-17.

21. Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, pp. 7-18.

22. Amazon.com,(2008),"AmazonWeb Services(AWS)",

23. S. Sakr, A. Liu, D. M. Batista, and M. Alomari,

"A Survey of Large Scale Data Management Approaches in Cloud Environments,"

Communications Surveys & Tutorials, IEEE, vol. 13, pp. 311-336.

Referensi

Dokumen terkait

 The main contributors to the headline PPI annual inflation rate were as follows:  Food products, beverages and tobacco products increased by 3,1% year-on-year and contributed 1,0%;

Feature map aggregation In the deep convolutional network, the feature maps from single original input image encode the fine features.. In order to recover high quality missing area, a