3
IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 01, 2017 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 373 Providing Data Security in Cloud Computing Using Secure Visual Cryptography A.Naveen Kumar 1 T.Harivaishnavi 2 S.Santhiya 3 S.Kalaiselvi 4 1 Assistant Professor 2,3,4 BE Student 1,2,3,4 Department of Computer Science & Engineering 1,2,3,4 The Kavery Engineering College AbstractCloud computing is the model for enabling the ubiquitous convenient, on demand network access to a shared pool off configurable computing resources (e.g.: networks, server, storage application and services) that can be provide rapidly provisioned and released with minimal management effort or service provider interaction. Security in the biggest challenges in the cloud computing. Because the data are should in the service provider server. To provide the security for the data, have to encrypt the data. In this paper, encrypted the data using visual cryptography techniques. To generate the key for encryption by RSA algorithm. It provides secure way to encrypt the data. Key words: Cloud Computing, Cryptography I. INTRODUCTION In cloud storage against corruptions to protect outsourced data in adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. While providing fault tolerance. Recently regenerating codes have gained popularity due to their lower repair bandwidth. We propose a third party auditing scheme for checking de- duplication and regenerating-code-based cloud storage. To solve the regeneration problem of failed authenticators in the absence of data owners, we introduce a web service, which is free to regenerate the authenticators, into the traditional third party auditing system model. Moreover, to regenerate using partial keys we design a novel third party verifiable authenticator, to generate by a couple of keys and to regenerated using partial keys. Thus, our Scheme can completely release data owners from online burden. Cloud computing, to put it simply, means Internet Computing. Hence the term cloud computing for computation done through the Internet it also commonly visualized as cloud. With Cloud Computing users can access database resources via the Internet from anywhere, for when they need, without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. Cloud computing is a model to share pool of configurable computing resources for enabling convenient, on-demand network access. II. EXISTING SYSTEM In this paper we are application which increase the security provided by visual cryptography and provides third party authority. Third party authority scheme for checking and regenerating code based cloud storage. In this system a user upload files to the cloud using cloud services, the TPA provides security to both the cloud as well as the data being uploaded. A. Disadvantages for Existing System Information are not fully secure in cloud storage. The system that will eliminate issues like de- duplication. Data authentication and security using visual cryptography. III. PROPOSED SYSTEM In our proposed system, introduce the security system based on visual cryptography. It also the encryption keys are generated by TPA using RSA algorithm. The visual cryptography is providing the secure data to cloud storage. But visual cryptography using the RSA algorithm is double security provide by the public key using encrypt from the user information of secure data. A. Advantages of Proposed System: The data are security provided by the cloud data storage. The visual cryptography using from cryptographic techniques. RSA algorithm provided by double security in the user data. IV. IMPLEMENTATION A. Module Description: Cloud setup. User interface design. Key management or key generation. Encryption using visual cryptography. B. Cloud Setup: Cloud setup module is using the cloud sim tool. Cloud sim is a framework for modelling and simulation of cloud computing infrastructure service. Cloud sim support for modelling and simulation of large scale cloud computing data centres. V. USER INTERFACE DESIGN

Providing Data Security in Cloud Computing Using Secure ... · In this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing

Embed Size (px)

Citation preview

Page 1: Providing Data Security in Cloud Computing Using Secure ... · In this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing

IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 01, 2017 | ISSN (online): 2321-0613

All rights reserved by www.ijsrd.com 373

Providing Data Security in Cloud Computing Using Secure Visual

Cryptography

A.Naveen Kumar1 T.Harivaishnavi2 S.Santhiya3 S.Kalaiselvi4 1Assistant Professor 2,3,4BE Student

1,2,3,4Department of Computer Science & Engineering 1,2,3,4The Kavery Engineering College

Abstract— Cloud computing is the model for enabling the

ubiquitous convenient, on demand network access to a

shared pool off configurable computing resources (e.g.:

networks, server, storage application and services) that can

be provide rapidly provisioned and released with minimal

management effort or service provider interaction. Security

in the biggest challenges in the cloud computing. Because

the data are should in the service provider server. To provide

the security for the data, have to encrypt the data. In this

paper, encrypted the data using visual cryptography

techniques. To generate the key for encryption by RSA

algorithm. It provides secure way to encrypt the data.

Key words: Cloud Computing, Cryptography

I. INTRODUCTION

In cloud storage against corruptions to protect outsourced

data in adding fault tolerance to cloud storage together with

data integrity checking and failure reparation becomes

critical. While providing fault tolerance. Recently

regenerating codes have gained popularity due to their lower

repair bandwidth. We propose a third party auditing scheme

for checking de- duplication and regenerating-code-based

cloud storage. To solve the regeneration problem of failed

authenticators in the absence of data owners, we introduce a

web service, which is free to regenerate the authenticators,

into the traditional third party auditing system model.

Moreover, to regenerate using partial keys we design a

novel third party verifiable authenticator, to generate by a

couple of keys and to regenerated using partial keys. Thus,

our Scheme can completely release data owners from online

burden. Cloud computing, to put it simply, means Internet

Computing. Hence the term cloud computing for

computation done through the Internet it also commonly

visualized as cloud. With Cloud Computing users can access

database resources via the Internet from anywhere, for when

they need, without worrying about any maintenance or

management of actual resources. Besides, databases in cloud

are very dynamic and scalable. Cloud computing is a model

to share pool of configurable computing resources for

enabling convenient, on-demand network access.

II. EXISTING SYSTEM

In this paper we are application which increase the

security provided by visual cryptography and provides

third party authority.

Third party authority scheme for checking and

regenerating code based cloud storage.

In this system a user upload files to the cloud using

cloud services, the TPA provides security to both the

cloud as well as the data being uploaded.

A. Disadvantages for Existing System

Information are not fully secure in cloud storage.

The system that will eliminate issues like de-

duplication.

Data authentication and security using visual

cryptography.

III. PROPOSED SYSTEM

In our proposed system, introduce the security system

based on visual cryptography.

It also the encryption keys are generated by TPA using

RSA algorithm.

The visual cryptography is providing the secure data to

cloud storage.

But visual cryptography using the RSA algorithm is

double security provide by the public key using encrypt

from the user information of secure data.

A. Advantages of Proposed System:

The data are security provided by the cloud data

storage.

The visual cryptography using from cryptographic

techniques.

RSA algorithm provided by double security in the user

data.

IV. IMPLEMENTATION

A. Module Description:

Cloud setup.

User interface design.

Key management or key generation.

Encryption using visual cryptography.

B. Cloud Setup:

Cloud setup module is using the cloud sim tool.

Cloud sim is a framework for modelling and

simulation of cloud computing infrastructure

service.

Cloud sim support for modelling and simulation of

large scale cloud computing data centres.

V. USER INTERFACE DESIGN

Page 2: Providing Data Security in Cloud Computing Using Secure ... · In this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing

Providing Data Security in Cloud Computing Using Secure Visual Cryptography

(IJSRD/Vol. 5/Issue 01/2017/098)

All rights reserved by www.ijsrd.com 374

Fig. 1:

The login form are created by html coding with java script.

A. Key Management or Key Generation:

1) Importance of Key Management:

Key management is the management of cryptographic

keys in a cryptosystem. This includes dealing with the

generation, exchange, storage, use, and replacement of

keys.

Key management concerns the keys at user level, either

between the users or systems. This is contrast to key

scheduling.

Successful key management is critical to a security of

the cryptosystem.

In practice it is arguably the most difficult aspect of a

cryptography because it involves the system policy,

user training, organizational and departmental

interactions, and coordination between all of these

elements.

VI. RSA ALGORITHM

RSA algorithm is one of the first practical public key

encryption cryptosystems and is widely used for secure data

transmission. In such a cryptosystem, the encryption key is

public and differs from the decryption key which is secret.

In RSA, this asymmetry is based on the practical difficulty

of factoring the product of two large prime numbers, the

factoring problem. RSA is made of the initial letters of the

names of Ron Rivest, Adi Shamir, and Leonard Adleman,

who first publicly described the algorithm in 1977. Clifford

Cocks, an English mathematician has developed an

equivalent system in 1973, but it was not declassified until

in 1997. A user of RSA creates and then publishes a public

key based on two large prime numbers, along with an

auxiliary value. The prime numbers must be secret in

anyone can use the public key to encrypt a message, but

with currently published methods, if the public key is large

enough, only someone with knowledge of the prime

numbers can feasibly to decode with the message in

breaking RSA encryption is known as the RSA problem

whether it is as hard as the factoring problem remains an

open question data is split into number of parts and each part

will be stored at different servers. The data will be stored in

database initially, as the user upload a file. A hash key is

generated at the user and also at database. The database

check whether is already exist a copy of user data, if it is

exist then only hash key will be generated but the data will

not be uploaded to avoid the de-duplication(data

duplication). Then the TPA checks the data authentication

also provide security to data. As the data is uploaded on the

server load balancing take place at each server.

VII. ENCRYPTION USING VISUAL CRYPTOGRAPHY

Visual Cryptography is a cryptographic technique is visual

Information (Image, text, etc) gets encrypted in such a way

that the decryption can be performed by the human visual

system without aid of the computers. It is also used to

protect image based secret in information. The technique

random sequence is used to divide the sequence of divide an

image into a n number of shares. The shares are sent through

different communication channels from sender to receiver so

that probability of getting sufficient shares by the intruder

minimizes.

A. Advantage of Visual Cryptography:

Encryption doesn’t require any NP hard problem

dependency.

Decryption algorithm is not required. So the unknown

person unknown to cryptography can decrypt the

message.

We can send the cipher text through FAX or E-MAIL.

Infinite Computation in Power can’t predict the

message.

Page 3: Providing Data Security in Cloud Computing Using Secure ... · In this system a user upload files to the cloud using cloud services, the TPA ... Providing Data Security in Cloud Computing

Providing Data Security in Cloud Computing Using Secure Visual Cryptography

(IJSRD/Vol. 5/Issue 01/2017/098)

All rights reserved by www.ijsrd.com 375

VIII. CONCLUSION

In this project data are should be secure in cloud. to provide

the security for the data is have to encrypted the data using

visual cryptography techniques. To generate the key for

encryption by RSA algorithm. It provides secure way to

encrypt the data.

REFERENCES

[1] Q. Zheng and S. Xu, ―Secure and Efficient Proof of

Storage with De duplication,‖ in Proc. ACM Conference

on Data and Application Security and Privacy

(CODASPY),2016

[2] B. Chen, R. Curtmola, G. Ateniese, and R. Burns,

―Remote Data Checking for Network Coding-based

Distributed storage Systems,‖ in Proc. ACM Cloud

Computing Security Workshop (CCSW),2015. pp. 31–

42.

[3] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hot, ―LT

Codes based Secure and Reliable Cloud Storage

Service,‖ in Proc.IEEE International Conference on

Computer Communications (INFOCOM),2014.

[4] S. D. C. di Vimercati, S. Foresti, S. Paraboschi, G.

Pelosi,and P. Samarati, ―Efficient and Private Access

to Outsourced Data,‖ in Proc. IEEE International

Conference on Distributed Computing Systems

(ICDCS), 2013, pp.710–719.

[5] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.

S.Yau,―Dynami Audit Services for Integrity

Verification of Outsourced Storage in Clouds,‖ in Proc.

ACM Symposium on Applied Computing (SAC), 2015,

pp. 1550–1557.

[6] S. Yu, C. Wang, K. Ren, and W. Lou, ―Achieving

Secure,Scalable, and Fine-grained Data Access Control

in Cloud Computing,‖ in Proc. IEEE International

Conference on Computer Communications

INFOCOM), 2014, pp. 534–542.