SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
484
Multi-Cloud Secure Data storage using Cryptographic
Techniques
Manoj V. Bramhe, Dr. Milind V. Sarode, Dr. Meenakshi S. Arya
Phd Research Scholar, Professor and Head, Associate Prof. & Head
Department of Computer Science & Engineering, Department of Computer Engineering ,
G.H. Raisoni College of Engineering, Nagpur
Government Polytechnic,
Yavatmal
G.H. Raisoni College of Engineering, Nagpur
manoj_bramhe@yahoo.com
Abstract: Cloud computing is becoming popular paradigm for storage and computing purpose for big and small organizations.
Even though cloud supports pay-as-you-go model with saving on infrastructure, hardware and software cost of organizations it
has disadvantages like various vulnerabilities and threats to user’s information . File access mechanism is an technique to
guarantee the file safety in the cloud. On the other hand, due to file farm out and untrusted cloud servers the file access
mechanism develops security concerns in cloud storage systems. Malicious system administrator at cloud storage is becoming
most difficult attack to stop as he has full access to the user data. In proposed system, we have implemented secure cloud
storage for multi-cloud environment where instead of keeping user's data in single cloud environment it can be fragmented into
different chunks and these chunks can be encrypted and stored in multiple cloud along with metadata which can be used during
access of the files.
Keywords: Multi-Clouds, Cryptography, FTP
1. INTRODUCTION
Cloud computing provides on-demand and pay -per-usage
access to scalable resources over the Internet. It saves
operational and infrastructure based expenses for
organizations.
Cloud computing as defined by NIST model is classified
into three types of services as Software-as-a-Service ,
Platform-as-a-Service, and Infrastructure -as-a-Service.
Cloud models has four categories as Private, Public,
Hybrid and Community depending upon the nature of
storage services. Public cloud is maintained by third party
service provider which distributes their resources among
clients and charge them as per their usage . Private cloud is
used by big organizations for storing security critical
information at private hosting place . Hybrid cloud uses
both public and private cloud resources for data storage
where general information is stored in public cloud
whereas critical information is maintained in private cloud.
Community cloud is used for specific purpose like
education, insurance, healthcare services. Organizations
hesitate to put their critical information on public cloud
storage as most of them either maintains users data in plain
text format or they may used encryption techniques on
their own transparent to the user. This encryption
algorithm and security keys are maintained by cloud
system administrators who can use them for malicious
activity so there is need of system where data must be
uploaded on cloud in secured manner and user must
maintain critical security information with them.
Our proposed system will provide multi-cloud
based secured storage where user will split the data into
multiple parts, storing each one of them on various private/
public cloud hence none of the entity will ever get
complete set of the data at any time , improving trust and
reliability of cloud services. Security of data in our system
is improved as user will encrypt the data before uploading
and will have all security related information stored in
local application server thus removing the possibilities of
system administrator attacks.
2. RELATED WORK
Research was carried on cloud storage system and
various defense methodologies were proposed for handling
cloud threats and vulnerabilities. NIST has discussed cloud
security issues and challenges in their draft of cloud
computing synopsis and recommendations [1]. Cloud
security alliance has provided detailed guidance for focus
areas in cloud as mentioned in [2]. They have discussed
various security domains like identity management,
encryption & key management, application level security
for data security out of which encryption and identity
management is widely by researchers.
Most of the cloud storage research is carried out
for single cloud environment which stores complete set of
data at one place thus creating vulnerabilities like system
administrator attack, data integrity issues, data losses due
to vendor lock-in problems so further solution was
provided for multi-cloud environment as mentioned in [4]
where performance is improved by distributing trust, and
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
485
security among various clouds. They have discussed many
multi-cloud based systems like RACS, DepSky, HAIL
with their advantages and disadvantages. Distributed file
system (DFS) is used by all such systems to share and store
users files in distributed network. Authors have discussed
popular DFS in [5] and [6]. Paval Bozh in [7] had
discussed reliability and performance improvement in DFS
by distributing data and metadata parts of file separately on
the server. RACS system discussed in [8] is based on
creating redundant array of cloud storage which focused
only on the economic failures and of the data. Our system
is similar to DepSky model[10] where confidentiality,
integrity cloud outage whereas HAIL system [9] works for
maintaining integrity and availability parameters for
maintaining security and privacy will be implemented.
Authors have discussed multi cloud based system in [14]
and [15] mainly for cost effectiveness and failure
management.
3. PROPOSED METHODOLOGY
System Architecture:
Architecture of our proposed system is discussed below.
User application layer receives and transfer user
commands to API of our distributed file system which will
communicate to system modules through DFS methods.
Encryption module will be used for encryption and
decryption of the data for maintaining the security. De-
construction module is used for splitting of files during
writing data to multi-clouds whereas merging of files is
done during reading the data from the clouds. File
Transport module will be useful for writing and reading of
files to the multi-clouds. Users data will be written to
private / public clouds. System implementation is
discussed below in detail.
Figure 1: Proposed System Architecture
Implementation:
Our proposed system modules are explained in
this section. We have user registration & login module,
FTP setting module, File upload and download module,
encryption and decryption module & file splitting and
merging modules.
Step 1: Registration & Login Module
This module will be used for user registration and
login purpose. User has to perform one time registration to
the system by providing user credentials like username,
password and personal details. Random verification code
will be generated and forwarded to the registered mobile
number which will be used for user verification during
login to the system. This step will enhance user
authentication. Once sign in user can use various system
modules.
Step 2: FTP Management Module
This module will be used for managing FTP
services used for writing and reading the data to multiple
clouds. FTP service will be utilized by our distributed file
system for communicating with distributed network. Our
system divides and store user files among multiple clouds
.Normally three clouds are used for storage and recovery
purpose .First location used to store first part of our file is
our local application server which is also used as storage
server. Next two locations will be public clouds where
second and third parts of the file will be stored. This
module is used by the user application as FTP client for
connecting , writing and reading various files to storage
server.
Step 3: Upload and Download Module
Upload:
This module will be used by the end user to write
users data into multiple clouds using web interface. User
can choose any types of file from local storage. All the
files uploaded by the user will be listed in user specific
directory along with file details .File upload function will
be used to upload file and server map function will be used
to get server path for uploading data.
Download:
This module will be used by the end user for reading
the required file from cloud storage. User will select file
already uploaded using directory listing . System has
mapping table where file parts stored are mapped with
respective cloud storages. System will get first path from
mapping table to get first part of the file stored on local
storage Using FTP details and server path stored in
mapping table system will get 2nd and 3rd parts of the file
stored in public cloud storage . Merge function of the
system combines all the parts of file in temporary buffer
and stored it.
Step 4: File Encryption and Decryption Module
This module will be used for file security purpose.
Symmetric cryptographic techniques will be used for
securing files where encryption is used during upload
process and decryption is used during download process.
Users can perform encryption on complete file before
splitting into parts or perform encryption after splitting the
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
486
file . System will provide randomly generated security key
to the user which will be used for encryption and
decryption. Using the key, encrypted file parts will be
generated and uploaded to the
cloud storage.
Download process uses decryption module to
decrypt the merged parts of the user file using the security
key provided by the user. Once user credentials and
security key are matched then process is executed
successfully to download the requested file .
Step 5: File Split and Merge Module
This module will be used for splitting the user file
into various parts during upload process and merging the
parts to generate original file during the download process.
Meta data of all the files is stored on local application
server which not only saves network transmission time but
also provides greater level of security
Cloud Based File System / PaaS
Developer Interface / SaaS
Proprietary
File System
Proprietary
File System
Proprietary
File System
Cloud A Cloud B Cloud C
Web Server
Figure 1 : Multi-Cloud Secured Storage System
4. SECURITY ANALYSIS
This section deals with analyzing security of our
proposed system using various cryptographic techniques
.Proposed system provides security to user's data by
splitting it into multiple chunks and putting those chunks
in various clouds. Confidentiality of the data is maintained
using encryption techniques where symmetric or
asymmetric techniques can be used
 Cryptographic Techniques:
Security of data is most important aspect for any
cloud service provider. Most of the public cloud provider
stores data in plain format or some of them may use
encryption / decryption using keys stored on cloud
premises. Hence there is a need of system where
cryptographic techniques are in the control of the user so
that data stored on cloud premises is safe from malicious
inside attacker.
Cryptographic techniques are most popular for
security of data has been classified as symmetric or private
key cryptography and Asymmetric or public key
cryptography. Symmetric algorithms are simple and easy
to implement with less complexity . Some of the popular
symmetric algorithms are DES, 3DES, AES, RC5,
BlowFish Etc. Asymmetric cryptography is mathematically
more complex than symmetric but provide more security.
RSA is most popular asymmetric key algorithm.
We have tested our system for various symmetric
key algorithms and results are discussed in next section.
Here we discussed AES, Advanced encryption standard
algorithm
AES is symmetric key block cipher uses 128 bit
data size. It allows variable round and keys. It supports 10
round for 128 bit key, 12 rounds for 192 bit key and 14
rounds for 256 bit key. Each round uses 128 bit round key
extracted from original key by key generator program. It is
stronger and around six times faster than 3DES. It is
iterative cipher using substitution & permutation network.
Each round in AES consists of four processes as
Byte substitution, Shift Rows, Mix Columns and Add
RoundKey
 Security:
In general, AES is most secured symmetric key
algorithm. It is widely accepted and used in both hardware
and software implementation. AES does not have any
cryptanalytic attacks but has some side channel attacks
detected against specific versions of AES hence
programmer must take care during its implementation
5. RESULTS AND. DISCUSSIONS
We have developed system for implementing the
concept using asp.net. Our system has web interface which
is used by end user for communication with the system.
Registration module is used for user registration and
regular signup. We have developed a multi-cloud system in
which user split his file, perform encryption using
symmetric key and will upload the file to multiple clouds.
During downloading user will specify his file, system will
read various encrypted parts from multi clouds , merge
them and perform decryption to generate original file for
the user.
Our system is using cryptographic techniques for
securing the users data. We have chosen symmetric key
cryptographic technique for our system as it is simple, easy
to implement as compared to asymmetric techniques.
We have tested our system for various symmetric
cryptographic algorithms like DES, 3DES, AES, Blowfish
and RC4. We have tested the system in cloud environment
with following configuration. We have Xen (5.6 XCP)
server and the client with VMware system with N- Para-
virtual machine. The cloud server has Core i5 (4.8GHz)
with 8GB of RAM and 500GB-HDD. The client machine
has Core i3 (2.4GHz) with 2GB of RAM . We have tested
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
487
our system for encryption and decryption using various
symmetric algorithms for varying file size from 500 kb to
3500 kb. We came to the conclusion that AES algorithm is
fastest among all other algorithms tested hence we will be
using AES symmetric key algorithm for security of our
system data.
Following figure shows results of comparison of various
cryptographic algorithms for varying file
size.
Figure 3 : Encryption with Symmetric Key
6. CONCLUSION
Cloud based storage systems are most popular
among organizations due to their "pay-as-you-go" model.
Big organizations are using private / public / hybrid cloud
infrastructure for storage but still most of them are not
deploying their critical data on cloud due to security
concerns.
Our proposed system implementation is based on
multiple clouds where data is fragmented and distributed
among various available clouds partially so that adversary
will never get complete data thus removing threats related
to single cloud system. Security is enhanced in our system
by using AES symmetric cipher used for encryption during
writing data to the cloud and for decryption during reading
data from the cloud. We have tested our system on local
and public cloud environment for various symmetric key
algorithm. Our system is secure and reliable.
REFERENCES
[1] Lee Badger, Tim Grance, Robert Patt-Corner, Jeff
Voas DRAFT Cloud Computing Synopsis and
Recommendations, NIST Special Publication 800-146,
May 2011
[2] Cloud Security Alliance (CSA). “Security Guidance
for Critical Areas of Focus in Cloud Computing
V2.1,” (Released December 17, 2009),
http://www.cloudsecurityalliance.org/guidance/csagui
de.v2.1.pdf
[3] Zhifeng Xiao and Yang Xiao, “Security and Privacy in
Cloud Computing”, IEEE Communications Surveys &
Tutorials, March 2012
[4] MohammedA. AlZain, Eric Pardede, Ben Soh, James
A. Thom, “Cloud Computing Security: From Single to
Multi-Clouds”, IEEE 45th Hawaii International
Conference on System Sciences, 2012
[5] Tran Doan Thanh, Subaji Mohan, EunmiChoil,
SangBum Kim, Pilsung Kim “A Taxonomy and
Survey on Distributed File Systems,” IEEE Fourth
International Conference on Networked Computing
and Advanced Information Management, 2008
[6] Satyanarayanan, M., "A Survey of Distributed
FileSystems," Technical Report CMU- CS-89- 116,
Departmentof Computer Science,
CarnegieMellonUniversity, 1989
[7] PavalBzoch, Jiri Safarik, “Security and reliability of
distributed file systems,” 6th
IEEE international con.
on intelligent data acquisition and advanced
computing systems, Sep 2011.
[8] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim
Weatherspoon, " RACS: A Case for Cloud Storage
Diversity", International conference for Internet
technology and Secured Transaction, December 2012
[9] Kevin D. Bowers, Ari Juels, Alina Oprea, "HAIL: A
High-Availability and Integrity Layer for Cloud
Storage", 16th ACM conference on Computer and
communications security, November 2009.
[10]Alysson Bessani Miguel Correia Bruno Quaresma
Fernando Andre Paulo Sousa, " DEPSKY: Dependable
and Secure Storage in a Cloud-of-Clouds", ACM
Transaction on Storage, Vol. 9,No. 4, Article 12.
November 2013
[11]DaliborPeric, Thomas Bocek, Fabio Victora Hecht,
David Hausheer, Burkhard Stiller, “ The design and
evaluation of a distributed reliable file system,” Int.
Conference of parallel and distributed computing,
application and technologies, 2009
[12]Hung-Chang Haiao, Hsueh –Yi Chung, HaiyingShen,
Yu-Chang Chao, “Load rebalancing for distributed file
systems in clouds,” IEEE transactions on parallel and
distributed systems, Vol. 24, No. 5, May 2013
[13]KhengKok Mar, “Secured virtual diffused file system
for the cloud,” 6th
International
[14]IEEE conference on internet technology and secured
transactions, UAE, December 2011
[15]Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian
Xing, Zhi Yang, Yafei Dai, “ CHARM: A Cost-
efficient multi cloud data hosting scheme with high
availability,” IEEE Transactions on Cloud Computing,
Vol. 3, Issue 3, July-September 2015
[16]Dan Dobre, Paolo Viotti, Marko Vukolic, " Hybris:
Robust Hybrid Cloud Storage", ACM Transactions
on Storage, Vol . 13, Issue 3, October 2017

More Related Content

What's hot

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Krushna Panda
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
thilaganga
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Kamal Spring
 

What's hot (20)

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 

Similar to Paper id 712019116

High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
CSITiaesprime
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
J018145862
J018145862J018145862
J018145862
IOSR Journals
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
 

Similar to Paper id 712019116 (20)

High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
J018145862
J018145862J018145862
J018145862
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

Paper id 712019116

  • 1. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 484 Multi-Cloud Secure Data storage using Cryptographic Techniques Manoj V. Bramhe, Dr. Milind V. Sarode, Dr. Meenakshi S. Arya Phd Research Scholar, Professor and Head, Associate Prof. & Head Department of Computer Science & Engineering, Department of Computer Engineering , G.H. Raisoni College of Engineering, Nagpur Government Polytechnic, Yavatmal G.H. Raisoni College of Engineering, Nagpur manoj_bramhe@yahoo.com Abstract: Cloud computing is becoming popular paradigm for storage and computing purpose for big and small organizations. Even though cloud supports pay-as-you-go model with saving on infrastructure, hardware and software cost of organizations it has disadvantages like various vulnerabilities and threats to user’s information . File access mechanism is an technique to guarantee the file safety in the cloud. On the other hand, due to file farm out and untrusted cloud servers the file access mechanism develops security concerns in cloud storage systems. Malicious system administrator at cloud storage is becoming most difficult attack to stop as he has full access to the user data. In proposed system, we have implemented secure cloud storage for multi-cloud environment where instead of keeping user's data in single cloud environment it can be fragmented into different chunks and these chunks can be encrypted and stored in multiple cloud along with metadata which can be used during access of the files. Keywords: Multi-Clouds, Cryptography, FTP 1. INTRODUCTION Cloud computing provides on-demand and pay -per-usage access to scalable resources over the Internet. It saves operational and infrastructure based expenses for organizations. Cloud computing as defined by NIST model is classified into three types of services as Software-as-a-Service , Platform-as-a-Service, and Infrastructure -as-a-Service. Cloud models has four categories as Private, Public, Hybrid and Community depending upon the nature of storage services. Public cloud is maintained by third party service provider which distributes their resources among clients and charge them as per their usage . Private cloud is used by big organizations for storing security critical information at private hosting place . Hybrid cloud uses both public and private cloud resources for data storage where general information is stored in public cloud whereas critical information is maintained in private cloud. Community cloud is used for specific purpose like education, insurance, healthcare services. Organizations hesitate to put their critical information on public cloud storage as most of them either maintains users data in plain text format or they may used encryption techniques on their own transparent to the user. This encryption algorithm and security keys are maintained by cloud system administrators who can use them for malicious activity so there is need of system where data must be uploaded on cloud in secured manner and user must maintain critical security information with them. Our proposed system will provide multi-cloud based secured storage where user will split the data into multiple parts, storing each one of them on various private/ public cloud hence none of the entity will ever get complete set of the data at any time , improving trust and reliability of cloud services. Security of data in our system is improved as user will encrypt the data before uploading and will have all security related information stored in local application server thus removing the possibilities of system administrator attacks. 2. RELATED WORK Research was carried on cloud storage system and various defense methodologies were proposed for handling cloud threats and vulnerabilities. NIST has discussed cloud security issues and challenges in their draft of cloud computing synopsis and recommendations [1]. Cloud security alliance has provided detailed guidance for focus areas in cloud as mentioned in [2]. They have discussed various security domains like identity management, encryption & key management, application level security for data security out of which encryption and identity management is widely by researchers. Most of the cloud storage research is carried out for single cloud environment which stores complete set of data at one place thus creating vulnerabilities like system administrator attack, data integrity issues, data losses due to vendor lock-in problems so further solution was provided for multi-cloud environment as mentioned in [4] where performance is improved by distributing trust, and
  • 2. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 485 security among various clouds. They have discussed many multi-cloud based systems like RACS, DepSky, HAIL with their advantages and disadvantages. Distributed file system (DFS) is used by all such systems to share and store users files in distributed network. Authors have discussed popular DFS in [5] and [6]. Paval Bozh in [7] had discussed reliability and performance improvement in DFS by distributing data and metadata parts of file separately on the server. RACS system discussed in [8] is based on creating redundant array of cloud storage which focused only on the economic failures and of the data. Our system is similar to DepSky model[10] where confidentiality, integrity cloud outage whereas HAIL system [9] works for maintaining integrity and availability parameters for maintaining security and privacy will be implemented. Authors have discussed multi cloud based system in [14] and [15] mainly for cost effectiveness and failure management. 3. PROPOSED METHODOLOGY System Architecture: Architecture of our proposed system is discussed below. User application layer receives and transfer user commands to API of our distributed file system which will communicate to system modules through DFS methods. Encryption module will be used for encryption and decryption of the data for maintaining the security. De- construction module is used for splitting of files during writing data to multi-clouds whereas merging of files is done during reading the data from the clouds. File Transport module will be useful for writing and reading of files to the multi-clouds. Users data will be written to private / public clouds. System implementation is discussed below in detail. Figure 1: Proposed System Architecture Implementation: Our proposed system modules are explained in this section. We have user registration & login module, FTP setting module, File upload and download module, encryption and decryption module & file splitting and merging modules. Step 1: Registration & Login Module This module will be used for user registration and login purpose. User has to perform one time registration to the system by providing user credentials like username, password and personal details. Random verification code will be generated and forwarded to the registered mobile number which will be used for user verification during login to the system. This step will enhance user authentication. Once sign in user can use various system modules. Step 2: FTP Management Module This module will be used for managing FTP services used for writing and reading the data to multiple clouds. FTP service will be utilized by our distributed file system for communicating with distributed network. Our system divides and store user files among multiple clouds .Normally three clouds are used for storage and recovery purpose .First location used to store first part of our file is our local application server which is also used as storage server. Next two locations will be public clouds where second and third parts of the file will be stored. This module is used by the user application as FTP client for connecting , writing and reading various files to storage server. Step 3: Upload and Download Module Upload: This module will be used by the end user to write users data into multiple clouds using web interface. User can choose any types of file from local storage. All the files uploaded by the user will be listed in user specific directory along with file details .File upload function will be used to upload file and server map function will be used to get server path for uploading data. Download: This module will be used by the end user for reading the required file from cloud storage. User will select file already uploaded using directory listing . System has mapping table where file parts stored are mapped with respective cloud storages. System will get first path from mapping table to get first part of the file stored on local storage Using FTP details and server path stored in mapping table system will get 2nd and 3rd parts of the file stored in public cloud storage . Merge function of the system combines all the parts of file in temporary buffer and stored it. Step 4: File Encryption and Decryption Module This module will be used for file security purpose. Symmetric cryptographic techniques will be used for securing files where encryption is used during upload process and decryption is used during download process. Users can perform encryption on complete file before splitting into parts or perform encryption after splitting the
  • 3. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 486 file . System will provide randomly generated security key to the user which will be used for encryption and decryption. Using the key, encrypted file parts will be generated and uploaded to the cloud storage. Download process uses decryption module to decrypt the merged parts of the user file using the security key provided by the user. Once user credentials and security key are matched then process is executed successfully to download the requested file . Step 5: File Split and Merge Module This module will be used for splitting the user file into various parts during upload process and merging the parts to generate original file during the download process. Meta data of all the files is stored on local application server which not only saves network transmission time but also provides greater level of security Cloud Based File System / PaaS Developer Interface / SaaS Proprietary File System Proprietary File System Proprietary File System Cloud A Cloud B Cloud C Web Server Figure 1 : Multi-Cloud Secured Storage System 4. SECURITY ANALYSIS This section deals with analyzing security of our proposed system using various cryptographic techniques .Proposed system provides security to user's data by splitting it into multiple chunks and putting those chunks in various clouds. Confidentiality of the data is maintained using encryption techniques where symmetric or asymmetric techniques can be used  Cryptographic Techniques: Security of data is most important aspect for any cloud service provider. Most of the public cloud provider stores data in plain format or some of them may use encryption / decryption using keys stored on cloud premises. Hence there is a need of system where cryptographic techniques are in the control of the user so that data stored on cloud premises is safe from malicious inside attacker. Cryptographic techniques are most popular for security of data has been classified as symmetric or private key cryptography and Asymmetric or public key cryptography. Symmetric algorithms are simple and easy to implement with less complexity . Some of the popular symmetric algorithms are DES, 3DES, AES, RC5, BlowFish Etc. Asymmetric cryptography is mathematically more complex than symmetric but provide more security. RSA is most popular asymmetric key algorithm. We have tested our system for various symmetric key algorithms and results are discussed in next section. Here we discussed AES, Advanced encryption standard algorithm AES is symmetric key block cipher uses 128 bit data size. It allows variable round and keys. It supports 10 round for 128 bit key, 12 rounds for 192 bit key and 14 rounds for 256 bit key. Each round uses 128 bit round key extracted from original key by key generator program. It is stronger and around six times faster than 3DES. It is iterative cipher using substitution & permutation network. Each round in AES consists of four processes as Byte substitution, Shift Rows, Mix Columns and Add RoundKey  Security: In general, AES is most secured symmetric key algorithm. It is widely accepted and used in both hardware and software implementation. AES does not have any cryptanalytic attacks but has some side channel attacks detected against specific versions of AES hence programmer must take care during its implementation 5. RESULTS AND. DISCUSSIONS We have developed system for implementing the concept using asp.net. Our system has web interface which is used by end user for communication with the system. Registration module is used for user registration and regular signup. We have developed a multi-cloud system in which user split his file, perform encryption using symmetric key and will upload the file to multiple clouds. During downloading user will specify his file, system will read various encrypted parts from multi clouds , merge them and perform decryption to generate original file for the user. Our system is using cryptographic techniques for securing the users data. We have chosen symmetric key cryptographic technique for our system as it is simple, easy to implement as compared to asymmetric techniques. We have tested our system for various symmetric cryptographic algorithms like DES, 3DES, AES, Blowfish and RC4. We have tested the system in cloud environment with following configuration. We have Xen (5.6 XCP) server and the client with VMware system with N- Para- virtual machine. The cloud server has Core i5 (4.8GHz) with 8GB of RAM and 500GB-HDD. The client machine has Core i3 (2.4GHz) with 2GB of RAM . We have tested
  • 4. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 487 our system for encryption and decryption using various symmetric algorithms for varying file size from 500 kb to 3500 kb. We came to the conclusion that AES algorithm is fastest among all other algorithms tested hence we will be using AES symmetric key algorithm for security of our system data. Following figure shows results of comparison of various cryptographic algorithms for varying file size. Figure 3 : Encryption with Symmetric Key 6. CONCLUSION Cloud based storage systems are most popular among organizations due to their "pay-as-you-go" model. Big organizations are using private / public / hybrid cloud infrastructure for storage but still most of them are not deploying their critical data on cloud due to security concerns. Our proposed system implementation is based on multiple clouds where data is fragmented and distributed among various available clouds partially so that adversary will never get complete data thus removing threats related to single cloud system. Security is enhanced in our system by using AES symmetric cipher used for encryption during writing data to the cloud and for decryption during reading data from the cloud. We have tested our system on local and public cloud environment for various symmetric key algorithm. Our system is secure and reliable. REFERENCES [1] Lee Badger, Tim Grance, Robert Patt-Corner, Jeff Voas DRAFT Cloud Computing Synopsis and Recommendations, NIST Special Publication 800-146, May 2011 [2] Cloud Security Alliance (CSA). “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” (Released December 17, 2009), http://www.cloudsecurityalliance.org/guidance/csagui de.v2.1.pdf [3] Zhifeng Xiao and Yang Xiao, “Security and Privacy in Cloud Computing”, IEEE Communications Surveys & Tutorials, March 2012 [4] MohammedA. AlZain, Eric Pardede, Ben Soh, James A. Thom, “Cloud Computing Security: From Single to Multi-Clouds”, IEEE 45th Hawaii International Conference on System Sciences, 2012 [5] Tran Doan Thanh, Subaji Mohan, EunmiChoil, SangBum Kim, Pilsung Kim “A Taxonomy and Survey on Distributed File Systems,” IEEE Fourth International Conference on Networked Computing and Advanced Information Management, 2008 [6] Satyanarayanan, M., "A Survey of Distributed FileSystems," Technical Report CMU- CS-89- 116, Departmentof Computer Science, CarnegieMellonUniversity, 1989 [7] PavalBzoch, Jiri Safarik, “Security and reliability of distributed file systems,” 6th IEEE international con. on intelligent data acquisition and advanced computing systems, Sep 2011. [8] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, " RACS: A Case for Cloud Storage Diversity", International conference for Internet technology and Secured Transaction, December 2012 [9] Kevin D. Bowers, Ari Juels, Alina Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage", 16th ACM conference on Computer and communications security, November 2009. [10]Alysson Bessani Miguel Correia Bruno Quaresma Fernando Andre Paulo Sousa, " DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds", ACM Transaction on Storage, Vol. 9,No. 4, Article 12. November 2013 [11]DaliborPeric, Thomas Bocek, Fabio Victora Hecht, David Hausheer, Burkhard Stiller, “ The design and evaluation of a distributed reliable file system,” Int. Conference of parallel and distributed computing, application and technologies, 2009 [12]Hung-Chang Haiao, Hsueh –Yi Chung, HaiyingShen, Yu-Chang Chao, “Load rebalancing for distributed file systems in clouds,” IEEE transactions on parallel and distributed systems, Vol. 24, No. 5, May 2013 [13]KhengKok Mar, “Secured virtual diffused file system for the cloud,” 6th International [14]IEEE conference on internet technology and secured transactions, UAE, December 2011 [15]Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian Xing, Zhi Yang, Yafei Dai, “ CHARM: A Cost- efficient multi cloud data hosting scheme with high availability,” IEEE Transactions on Cloud Computing, Vol. 3, Issue 3, July-September 2015 [16]Dan Dobre, Paolo Viotti, Marko Vukolic, " Hybris: Robust Hybrid Cloud Storage", ACM Transactions on Storage, Vol . 13, Issue 3, October 2017