Your SlideShare is downloading. ×
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply



Published on

Published in: Technology, Business

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 41 SECURE DATA SHARING THROUGH CLOUD COMPUTING *Midya Azad Ismail, **Klinsega Jeberson *Technical College /Kirkuk, Foundation of Technical Education, Ministry of Higher Education and Scientific Research, Republic of Iraq **Deptt. of Comp. Science & IT. SSET, SHIATS-DU Allahabad (U.P.) INDIA-211007 ABSTRACT As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high- performance computing and storage infrastructure through web services. We consider the problem of building a secure cloud storage service where the registered user could store their data and can share them with other registered user. But due to security reasons the uploaded file is encrypted. The advantages of this task are that even the person who administrates is not able to read the content of uploaded file. For encrypting and decrypting the Base64 algorithm is used. This process make our application more secure. Another security technique is the usage of J2ME technology to implement the application. When the user registers himself the One Time Password (OTP) will be accessed only through given mobile number using the mobile device then after entering the OTP to the user login interface another window will appear asking about security code which is also will be access using the mobile device for every user login that is the security code will be arbitrary given to the user and he has no control on it. This is the another program which is integrated with our application. It makes application more secure. Keywords: Cloud Computing; Security; Encryption; J2ME Technology. 1. INTRODUCTION Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade – factors such as hardware INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME: Journal Impact Factor (2014): 8.5328 (Calculated by GISI) IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 42 commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models[4]. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies[4]. Our work attempts to overcome these security threats. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to the data only on successful authentication. Cloud computing is a complex infrastructure of software, hardware, processing, and storage, all of which are available as a service. It is comprised fundamentally of applications running remotely (popularly referred to as “in the cloud”) which is made available to all its users. This technology offers access to a large number of sophisticated supercomputers and their resultant processing power, connected at numerous locations around the world, thus offering speed in the tens of trillions of computations per second [2]. Cloud promises tangible cost savings and speed to customers. Using the technology of cloud, a company can rapidly deploy applications where expansion and contraction of the core technology components can be attained with the high and low of the business life cycle. This can be achieved with the help of cloud enablers, such as virtualization and grid computing, that allow applications to be dynamically deployed onto the most suitable infrastructure at run time. It’s worth noting that while this might appear alluring, there remain issues of reliability, portability, privacy and security. 2. CLOUD COMPUTING Cloud computing , or the cloud ,as shown in figure (2.1) is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network (typically the Internet).cloud computing is a jargon term without a commonly accepted unequivocal scientific or technical definition. In science, cloud computing is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time. The phrase is also, more commonly used to refer to network-based services which appear to be provided by real server hardware, which in fact are served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up (or down) on the fly without affecting the end user - arguably, rather like a cloud. Figure 2.1: Cloud System
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 43 The popularity of the term can be attributed to its use in marketing to sell hosted services in the sense of application service provisioning that run client server software on a remote location. 2.1 Cloud Storage Cloud Storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage .The data storage process can be time-consuming and costly[11]. This includes maintaining data servers, storage disks, firewalls, backup copies and disaster- recovery provisions. My Cloud Storage reduces these burdens, allowing you to store, retrieve, share, and analyze your data, day after day, without worrying about maintenance, scaling up or down or hardware and firmware u upgrades[2]. Cloud storage is shown in figure (2.8). Figure 2.8: Cloud Storage System 3. PROPOSED WORK Here the proposed design is a three layered architecture that will ensure the accountability and track the usage of owner’s data. This architecture is developed to bring trust between end user and the owner regarding the usage of data. We propose a framework which involves securing of files through file encryption. The file present on the device will be encrypted using password based Base64 algorithm. Every uploaded file has a unique key which should be known by the user who want to download it and he also should know the name of the person who upload that file. i. Fist Layer – New User Registration • Any person could register himself for using the cloud service. • He / She must give the basic information along with a mobile number. ii. Second Layer – Mobile Based Authentication • The One Time Password (OTP) will automatically generated by the user at the time of registration. • By using the Mobile Device Simulator the user can get the OTP. • After entering the OTP another window will appear asking about the Security Key which the user can get by using the Mobile Device Simulator. iii. Third layer- Upload & Encrypt • After login the user can upload the files on cloud server for sharing. • At the time of uploading the files will be encrypted by using the Base64 Algorithm. • Only after download the user can read the particular file.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 44 3.1 Flow Chart Figure 3.1: Flow Chart for Login Use 4. RESULT AND DISCUSSION 4.1 Result Proposed Model has shown the best provided service when it is compare to some of the existing Cloud Storage Websites.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 45 4.1 Discussion - The project is executed with high security, without login the user cannot access any kind of service. - The logged in user can not download a file directly he can do that only after giving the owner name and the key of that file. - The system has been developed by using JSP with integration with J2ME. It provides a lot of facility for designing a good user interface as well as server side programming. - The data has implemented by using MySql. - Here we also use Servlets for implementing different logics.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 46 5. SUMMARY AND CONCLUSION I have tried my level best for creating a secure system by implementing two types of password for user login that is OTP and secure code. the first one is get by entering the user mobile number into the mobile device then after enter that password to the user login interface another page is appear asking about the second password (I called it secure code) .The secure code is changed arbitrary by the system for every user access and it cannot be changed by the user. When user upload a file it will be uploaded with a unique key that made automatically by the system and to enable any user to download any file from the cloud he must have the security key and the user name of that file. I am also proving unlimited storage to a user as well as there is no registration cost. The uploaded data is encrypted using the base64 algorithm this mean that even the person who administrates the server is not able to read the content of uploaded file. REFERENCES 1. Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE 571B, TERM SURVEY PAPER, (2012). 2. Debajyoti Mukhopadhyay, Gitesh Sonawane et.el, "Enhanced Security for Cloud Storage using File Encryption", Department of Information Technology Maharashtra Institute of Technology Pune 411038, India, (2012). 3. Deepanchakaravarthi Purushothamanand, Dr.Sunitha Abburu, "An Approach for Data Storage Security in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, ISSN (Online): 1694-0814, (2012). 4. Eugene Gorelik, "Cloud Computing Models", Working Paper CISL# 2013-01 (2013). 5. Issa M. Khalil et.el, "Cloud Computing Security: A Survey", computers ISSN 2073-431X, (2014). 6. Jijo.S. Nair, BholaNath Roy, "Data Security in Cloud", International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005. 7. Mahima Joshi, Yudhveer Singh Moudgil, "SECURE CLOUD STORAGE", International Journal of Computer Science & Communication Networks, Vol 1(2), 171-175, ISSN: 2249-5789, (2011). 8. Mariana Raykova et . el, "Privacy Enhanced Access Control for Outsourced Data Sharing", Columbia University, Department of Computer Science, New York, NY 10027-7003, USA. 9. MdMasoomRabbani, "Enhancing Accountability for Distributed Data Sharing in the Cloud", International Journal of Engineering and Technology (IJET), Vol 5 No 3, ISSN: 0975-4024, (2013). 10. Mohit Marwahal, Rajeev Bedi, "Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814, (2013). 11. PENG Yong, ZHAO Wei, XIE Feng, DAI Zhong-hua, GAO Yang, CHEN Dong-qing "Secure cloud storage based on cryptographic techniques", the journal of china universities of posts and telecommunications, 19(Suppl.2): 182-189 (2012). 12. Rich Maggiani, “Cloud Computing Is Changing How We Communicate”, In IEEE 978-1- 4244-4358-1/09, (2009). 13. Sai Vamsy et. el, "Data Synchronization Using Cloud Storage", International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, ISSN: 2277 128X ,(2012). 14. Saurabh Kumar Garg and Rajkumar Buyya, "Green Cloud computing and Environmental Sustainability", (2011).
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 47 15. Simarjeet Kaur, "Cryptography and Encryption In Cloud Computing", VSRD International Journal of Computer Science & Information Technology Vol. 2 (3), 242-249, (2012). 16. Talasila Sasidhar, Pavan Kumar Illa, Subrahmanyam Kodukula, "A Generalized Cloud Storage Architecture with Backup Technology for any Cloud Storage Providers". 17. INTERNATIONAL JOURNAL OF COMPUTER APPLICATION, ISSUE 2, VOLUME 2, ISSN: 2250-1797, (2012). Websites 18. 19. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ENCRYPTION, ESSENTIAL GUIDE TO BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS ARTICLE PUBLISHED ON 10 JUL 2006.