SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. III (Mar – Apr. 2015), PP 63-66
www.iosrjournals.org
DOI: 10.9790/0661-17236366 www.iosrjournals.org 63 | Page
Secure Data Storage in Cloud Using Encryption and
Steganography
Akhil S Killawala1
, Kaustubh R Kulkarni2
, Nishant D Gohel3
,
1,2,3 Dept. of Computer EngineeringK J Somaiya College Of Engineering,Mumbai-77,Maharashtra,India
Abstract: In this project, we focus on cloud data storage security, which has always been an important aspect
of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible
scheme combining cryptography and steganography. Encryption module encrypts the files before they are
uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a
watermark within an html file to uniquely identify it’s owner. The image steganography embeds the watermark
within an image file.
Index Terms: Secure Storage, Cloud, Encryption, Text Steganography, Image Steganography.
I. Introduction
Cloud computing has been envisioned as the next generation architecture of IT enterprise. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud
computing moves the application software and databases to the large data centers, where the management of the
data and services may not be fully trustworthy. This unique attribute, however, poses many new security
challenges.
In this project, we focus on cloud data storage security, which has always been an important aspect of
quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible
scheme combining cryptography and steganography Encryption module encrypts the files before they are
uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a
watermark within an html file to uniquely identify it’s owner . The image steganography embeds the watermark
within an image file. The project also has authentication and access control features, for example, blocking a
particular suspicious IP address. All malicious attempts to access the system are logged for future reference.
Mobile alerts module has also been incorporated on an experimental level to simulate an attacker so that, thus
alerted , the owner can take appropriate steps like blocking that IP address etc.
II. Existing System
From the perspective of data security, which has always been an important aspect of quality of service,
Cloud Computing inevitably poses new challenging security threats for number of reasons. Firstly, traditional
cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’
loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be
conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in
the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying
correctness of data storage in the cloud becomes even more challenging. Secondly, Cloud Computing is not just a
third party data warehouse. The data stored in the cloud may be frequently updated by the users, including
insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data
update is hence of paramount importance. These techniques, while can be useful to ensure the storage correctness
without having users possessing data, cannot address all the security threats in cloud data storage, since they are
all focusing on single server scenario and most of them do not consider dynamic data operations. As an
complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness
across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations.
As a result, their applicability in cloud data storage can be drastically limited.
III. Problem Definition
Cloud computing moves the application software and databases to the large data centers, where the
management of the data and services may not be fully trustworthy.
This unique attribute poses many new security challenges which have not been well understood. In this
article, we focus on cloud data storage security, which has always been an important aspect of quality of service.
We have to ensure the correctness of users' data in the cloud as well.
Secure Data Storage in Cloud Using Encryption and Steganography
DOI: 10.9790/0661-17236366 www.iosrjournals.org 64 | Page
IV. Proposed System
In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data
support to ensure the correctness of users’ data in the cloud.
Compared to many of its predecessors, which only provide binary results about the storage state across
the distributed servers, the challenge-response protocol in our work further provides the localization of data
error.
The proposed scheme is highly efficient and resilient against Byzantine failure, malicious data
modification attack and server colluding attacks
To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme
combining cryptography and steganography.
Encryption module encrypts the files before they are uploaded and decryption module decrypts them
when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify
it’s owner . The image steganography embeds the watermark within an image file. The project also has
authentication and access control features, for example, blocking a particular suspicious IP address. All
malicious attempts to access the system are logged.
V. Modules
Fig 1: Interaction Of Modules
Client Module:
In this module, the client sends the query to the server. Based on the query the server sends the
corresponding file to the client. Before this process, the client authorization step is involved.In the server side, it
checks the client name and its password for security process. If it is satisfied and then received the queries form
the client and search the corresponding files in the database. Finally, find that file and send to the client. If the
server finds the intruder means, it set the alternative Path to those intruder.
System Module:
Representative network architecture for cloud data storage is illustrated in Figure 1. Three different
network entities can be identified as follows:
• User:
• Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both
individual consumers and organizations.
• Cloud Service Provider (CSP):
• A CSP, who has significant resources and expertise in building and managing distributed cloud storage
servers, owns and operates live Cloud Computing systems,.
• Third Party Auditor (TPA):
An optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk
of cloud storage services on behalf of the users upon request.
Secure Data Storage in Cloud Using Encryption and Steganography
DOI: 10.9790/0661-17236366 www.iosrjournals.org 65 | Page
Cloud data storage Module:
Cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running
in a simultaneous, the user interacts with the cloud servers via CSP to access or retrieve his data. In some cases,
the user may need to perform block level operations on his data.. users should be equipped with security means
so that they can make continuous correctness assurance of their stored data even without the existence of local
copies. In case that users do not necessarily have the time, feasibility or resources to monitor their data, they can
delegate the tasks to an optional trusted TPA of their respective choices. In our model, we assume that the point-
to-point communication channels between each cloud server and the user is authenticated and reliable, which
can be achieved in practice with little overhead.
Cloud Authentication Server:
The Authentication Server (AS) functions as any AS would with a few additional behaviors added to
the typical client-authentication protocol. The first addition is the sending of the client authentication
information to the masquerading router. The AS in this model also functions as a ticketing authority, controlling
permissions on the application network. The other optional function that should be supported by the AS is the
updating of client lists, causing a reduction in authentication time or even the removal of the client as a valid
client depending upon the request
Unauthorized data modification and corruption module:
One of the key issues is to effectively detect any unauthorized data modification and corruption,
possibly due to server compromise and/or random Byzantine failures. Besides, in the distributed case when such
inconsistencies are successfully detected, to find which server the data error lies in is also of great significance
Adversary Module:
Security threats faced by cloud data storage can come from two different sources. On the one hand, a
CSP can be self-interested, untrusted and possibly malicious. Not only does it desire to move data that has not
been or is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to
hide a data loss incident due to management errors, Byzantine failures and so on.
On the other hand, there may also exist an economically motivated adversary, who has the capability to
compromise a number of cloud data storage servers in different time intervals and subsequently is able to
modify or delete users’ data while remaining undetected by CSPs for a certain period. Specifically, we consider
two types of adversary with different levels of capability in this paper:
Weak Adversary: The adversary is interested in corrupting the user’s data files stored on individual
servers. Once a server is comprised, an adversary can pollute the original data files by modifying or introducing
its own fraudulent data to prevent the original data from being retrieved by the user.
Strong Adversary: This is the worst case scenario, in which we assume that the adversary can
compromise all the storage servers so that he can intentionally modify the data files as long as they are internally
consistent. In fact, this is equivalent to the case where all servers are colluding together to hide a data loss or
corruption incident.
Encryption Module: Provides only essential encryption using Rijndael algorithm.
Text Steganography Module:
Hides watermark as binary data within an HTML file by considering order of attributes within tags to denote a 1
or a 0.
Image Steganography Module:
It uses LSB steganography. In RGB color model Red is represented by one byte, Blue by one byte and Green by
One byte. The mechanism replaces 4 LSBs of every byte with watermark information to be propagated through
the image.
.
VI. System Requirements
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive: 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
Secure Data Storage in Cloud Using Encryption and Steganography
DOI: 10.9790/0661-17236366 www.iosrjournals.org 66 | Page
Software Requirements:
• Operating system : - Windows XP.
• Coding Language :-JAVA,Swing,RMI,J2me(WirelessToolkit)
• Tool Used: - Eclipse 4.3
VII. Conclusion
• Cloud computing extend beyond a single company or enterprise.
• To ensure the correctness of users’ data in cloud data storage, we proposed an effective and flexible
distributed scheme with explicit dynamic data support, including block update, delete, and append.
• We believe that data storage security in Cloud Computing, an area full of challenges and of paramount
importance, is still in its infancy now, and many research problems are yet to be identified
Acknowledgment
We wish to express true sense of gratitude towards our guides Prof. Deepak Sharma and Prof. Sheetal
Pereira for their constant encouragement and valuable guidance and for providing all the necessary facilities,
which were indispensable in the completion of this project. We would like to thank our Head of Department
Prof. Bharathi H N & all staff members who extended their kind support during the accomplishment of the
project. Finally, we express my sincere thanks to all those who helped us directly & indirectly in many ways in
completion of this project.
References
[1]. Patidar Shyam,Rane Dheeraj,Jain Pritesh,A Survey Paper on Cloud Computing, Second International Conference on Advanced
Computing & Communication Technologies (ACCT),7-8 Jan 2012
[2]. Wojciech Mazurczyk, Krzysztof Szczypiorski, Is Cloud Computing Steganography-proof?,Third International Conference on
Multimedia Information Networking and Security,2011
[3]. Krešimir Popović, Željko Hocenski, Cloud computing security issues and challenges, MIPRO 2010, May 24-28, 2010, Opatija,
Croatia
[4]. Atallah M. Al-Shatnawi,A New Method in Image Steganography with Improved Image Quality, Applied Mathematical Sciences, Vol.
6 no. 79, 3907 – 3915, 2012
[5]. Souvik Roy, P.Venkateswaran, A Text based Steganography Technique with Indian Root, International Conference on Computational
Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
[6]. Rafat, K.F. , Enhanced text steganography in SMS, Computer, Control and Communication, 2009. IC4 2009. 2nd International
Conference on , 17-18 Feb. 2009
[7]. Shirali-Shahreza, M. , Shirali-Shahreza, M.H., Text Steganography in SMS, Convergence Information Technology, 2007.
International Conference on , 21-23 Nov. 2007
[8]. Andreas Westfeld, F5—A Steganographic Algorithm,Information Hiding - 14th International Conference, IH 2012, Berkeley, CA,
USA, May 15-18, 2012
[9]. Cong Wang; Qian Wang; Kui Ren; Wenjing Lou, "Ensuring data storage security in Cloud Computing," Quality of Service, 2009.
IWQoS. 17th International Workshop on , vol., no., pp.1,9, 13-15 July 2009

More Related Content

What's hot

Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsNexgen Technology
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 

What's hot (18)

Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
L01246974
L01246974L01246974
L01246974
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
L04302088092
L04302088092L04302088092
L04302088092
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
C04932125
C04932125C04932125
C04932125
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 

Viewers also liked

Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction IOSR Journals
 
Finite Element Analysis of Copper Deformed By Conventional Forward Extrusion
Finite Element Analysis of Copper Deformed By Conventional Forward ExtrusionFinite Element Analysis of Copper Deformed By Conventional Forward Extrusion
Finite Element Analysis of Copper Deformed By Conventional Forward ExtrusionIOSR Journals
 
Touchpad Monitored Car
Touchpad Monitored Car Touchpad Monitored Car
Touchpad Monitored Car IOSR Journals
 
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...IOSR Journals
 

Viewers also liked (20)

D017651519
D017651519D017651519
D017651519
 
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
 
C013141723
C013141723C013141723
C013141723
 
J013166067
J013166067J013166067
J013166067
 
A012140107
A012140107A012140107
A012140107
 
E0622730
E0622730E0622730
E0622730
 
Finite Element Analysis of Copper Deformed By Conventional Forward Extrusion
Finite Element Analysis of Copper Deformed By Conventional Forward ExtrusionFinite Element Analysis of Copper Deformed By Conventional Forward Extrusion
Finite Element Analysis of Copper Deformed By Conventional Forward Extrusion
 
G1303074851
G1303074851G1303074851
G1303074851
 
Touchpad Monitored Car
Touchpad Monitored Car Touchpad Monitored Car
Touchpad Monitored Car
 
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...
Design, Implementation and Control of a Humanoid Robot for Obstacle Avoidance...
 
A013150107
A013150107A013150107
A013150107
 
B018140813
B018140813B018140813
B018140813
 
L017368189
L017368189L017368189
L017368189
 
H017645560
H017645560H017645560
H017645560
 
D017532629
D017532629D017532629
D017532629
 
B1803031217
B1803031217B1803031217
B1803031217
 
M010427686
M010427686M010427686
M010427686
 
N01212101114
N01212101114N01212101114
N01212101114
 
H011117484
H011117484H011117484
H011117484
 
B012321623
B012321623B012321623
B012321623
 

Similar to J017236366

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 

Similar to J017236366 (20)

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
R180203114117
R180203114117R180203114117
R180203114117
 
F017414853
F017414853F017414853
F017414853
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

J017236366

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. III (Mar – Apr. 2015), PP 63-66 www.iosrjournals.org DOI: 10.9790/0661-17236366 www.iosrjournals.org 63 | Page Secure Data Storage in Cloud Using Encryption and Steganography Akhil S Killawala1 , Kaustubh R Kulkarni2 , Nishant D Gohel3 , 1,2,3 Dept. of Computer EngineeringK J Somaiya College Of Engineering,Mumbai-77,Maharashtra,India Abstract: In this project, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme combining cryptography and steganography. Encryption module encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify it’s owner. The image steganography embeds the watermark within an image file. Index Terms: Secure Storage, Cloud, Encryption, Text Steganography, Image Steganography. I. Introduction Cloud computing has been envisioned as the next generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges. In this project, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme combining cryptography and steganography Encryption module encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify it’s owner . The image steganography embeds the watermark within an image file. The project also has authentication and access control features, for example, blocking a particular suspicious IP address. All malicious attempts to access the system are logged for future reference. Mobile alerts module has also been incorporated on an experimental level to simulate an attacker so that, thus alerted , the owner can take appropriate steps like blocking that IP address etc. II. Existing System From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance. These techniques, while can be useful to ensure the storage correctness without having users possessing data, cannot address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As an complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. III. Problem Definition Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. We have to ensure the correctness of users' data in the cloud as well.
  • 2. Secure Data Storage in Cloud Using Encryption and Steganography DOI: 10.9790/0661-17236366 www.iosrjournals.org 64 | Page IV. Proposed System In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error. The proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack and server colluding attacks To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme combining cryptography and steganography. Encryption module encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify it’s owner . The image steganography embeds the watermark within an image file. The project also has authentication and access control features, for example, blocking a particular suspicious IP address. All malicious attempts to access the system are logged. V. Modules Fig 1: Interaction Of Modules Client Module: In this module, the client sends the query to the server. Based on the query the server sends the corresponding file to the client. Before this process, the client authorization step is involved.In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries form the client and search the corresponding files in the database. Finally, find that file and send to the client. If the server finds the intruder means, it set the alternative Path to those intruder. System Module: Representative network architecture for cloud data storage is illustrated in Figure 1. Three different network entities can be identified as follows: • User: • Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. • Cloud Service Provider (CSP): • A CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems,. • Third Party Auditor (TPA): An optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request.
  • 3. Secure Data Storage in Cloud Using Encryption and Steganography DOI: 10.9790/0661-17236366 www.iosrjournals.org 65 | Page Cloud data storage Module: Cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running in a simultaneous, the user interacts with the cloud servers via CSP to access or retrieve his data. In some cases, the user may need to perform block level operations on his data.. users should be equipped with security means so that they can make continuous correctness assurance of their stored data even without the existence of local copies. In case that users do not necessarily have the time, feasibility or resources to monitor their data, they can delegate the tasks to an optional trusted TPA of their respective choices. In our model, we assume that the point- to-point communication channels between each cloud server and the user is authenticated and reliable, which can be achieved in practice with little overhead. Cloud Authentication Server: The Authentication Server (AS) functions as any AS would with a few additional behaviors added to the typical client-authentication protocol. The first addition is the sending of the client authentication information to the masquerading router. The AS in this model also functions as a ticketing authority, controlling permissions on the application network. The other optional function that should be supported by the AS is the updating of client lists, causing a reduction in authentication time or even the removal of the client as a valid client depending upon the request Unauthorized data modification and corruption module: One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise and/or random Byzantine failures. Besides, in the distributed case when such inconsistencies are successfully detected, to find which server the data error lies in is also of great significance Adversary Module: Security threats faced by cloud data storage can come from two different sources. On the one hand, a CSP can be self-interested, untrusted and possibly malicious. Not only does it desire to move data that has not been or is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due to management errors, Byzantine failures and so on. On the other hand, there may also exist an economically motivated adversary, who has the capability to compromise a number of cloud data storage servers in different time intervals and subsequently is able to modify or delete users’ data while remaining undetected by CSPs for a certain period. Specifically, we consider two types of adversary with different levels of capability in this paper: Weak Adversary: The adversary is interested in corrupting the user’s data files stored on individual servers. Once a server is comprised, an adversary can pollute the original data files by modifying or introducing its own fraudulent data to prevent the original data from being retrieved by the user. Strong Adversary: This is the worst case scenario, in which we assume that the adversary can compromise all the storage servers so that he can intentionally modify the data files as long as they are internally consistent. In fact, this is equivalent to the case where all servers are colluding together to hide a data loss or corruption incident. Encryption Module: Provides only essential encryption using Rijndael algorithm. Text Steganography Module: Hides watermark as binary data within an HTML file by considering order of attributes within tags to denote a 1 or a 0. Image Steganography Module: It uses LSB steganography. In RGB color model Red is represented by one byte, Blue by one byte and Green by One byte. The mechanism replaces 4 LSBs of every byte with watermark information to be propagated through the image. . VI. System Requirements Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive: 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb.
  • 4. Secure Data Storage in Cloud Using Encryption and Steganography DOI: 10.9790/0661-17236366 www.iosrjournals.org 66 | Page Software Requirements: • Operating system : - Windows XP. • Coding Language :-JAVA,Swing,RMI,J2me(WirelessToolkit) • Tool Used: - Eclipse 4.3 VII. Conclusion • Cloud computing extend beyond a single company or enterprise. • To ensure the correctness of users’ data in cloud data storage, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. • We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified Acknowledgment We wish to express true sense of gratitude towards our guides Prof. Deepak Sharma and Prof. Sheetal Pereira for their constant encouragement and valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project. We would like to thank our Head of Department Prof. Bharathi H N & all staff members who extended their kind support during the accomplishment of the project. Finally, we express my sincere thanks to all those who helped us directly & indirectly in many ways in completion of this project. References [1]. Patidar Shyam,Rane Dheeraj,Jain Pritesh,A Survey Paper on Cloud Computing, Second International Conference on Advanced Computing & Communication Technologies (ACCT),7-8 Jan 2012 [2]. Wojciech Mazurczyk, Krzysztof Szczypiorski, Is Cloud Computing Steganography-proof?,Third International Conference on Multimedia Information Networking and Security,2011 [3]. Krešimir Popović, Željko Hocenski, Cloud computing security issues and challenges, MIPRO 2010, May 24-28, 2010, Opatija, Croatia [4]. Atallah M. Al-Shatnawi,A New Method in Image Steganography with Improved Image Quality, Applied Mathematical Sciences, Vol. 6 no. 79, 3907 – 3915, 2012 [5]. Souvik Roy, P.Venkateswaran, A Text based Steganography Technique with Indian Root, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013. [6]. Rafat, K.F. , Enhanced text steganography in SMS, Computer, Control and Communication, 2009. IC4 2009. 2nd International Conference on , 17-18 Feb. 2009 [7]. Shirali-Shahreza, M. , Shirali-Shahreza, M.H., Text Steganography in SMS, Convergence Information Technology, 2007. International Conference on , 21-23 Nov. 2007 [8]. Andreas Westfeld, F5—A Steganographic Algorithm,Information Hiding - 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012 [9]. Cong Wang; Qian Wang; Kui Ren; Wenjing Lou, "Ensuring data storage security in Cloud Computing," Quality of Service, 2009. IWQoS. 17th International Workshop on , vol., no., pp.1,9, 13-15 July 2009