IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing And Availability Saurabh Rajput, Swaroop Kotme, Ashish Singh, Prof.Saba Siraj B.E Computer Engineering, Institute of Knowledge-CollegeOf Engineering, pune [email protected], [email protected], [email protected]

Abstract The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed, from a customer’s point of view, relying upon a solo Service Provider (SP) for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability, can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets. Keywords: Cloud Computing, Security, Storage, Cost-effective, Cloud Service Provider, Customer.

1. Introduction Cloud computing becomes the boom invention of today’s internet world. Through in this technology users can consume services at any time as per their needs. Before cloud computing, user previously have to buy individual or costly software, hardware resources but now it become easy to access the services on demand over the network. It facilitates the user to access shared resources, common infrastructure or database resources, for as long as they need, without thinking about the cost and maintenance of resources. It also provides facilities for consumer to develop and manage their own applications over the cloud, which enhance the concept of virtualization of resources. Through virtualization the resources are managed itself. The best example of cloud computing is Google docs where any document can be accessed using a browser and it can be shared on thousands of computer through Internet. In cloud computing, subscribers have to pay the service providers for this storage service. This service does not only provides flexibility and scalability for the data storage, it also provide customers with the benefit of paying only for the amount of data they need to store for a particular period of time, without any concerns for efficient storage mechanisms and maintainability issues with large amounts of data storage. In addition to these benefits, customers can easily access their data from any geographical region where the Cloud Service Provider’s network or Internet can be accessed

Saurabh Rajput, IJRIT

746

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

2. Existing system The cloud is a term for a group of servers offering a service. So if your storing your data in the cloud, it means you have signed up for a service that allows you to remotely store and retrieve your data. You don't have to worry about the maintaining of hardware/software. The major issue regarding cloud computing is that, the data will be stored on a physical server somewhere. And you never know, the person at the other end, used your data for any malicious purposes or not. Though you do have to trust for third party to secure your data. 3.

Problem statement

Privacy preservation and data integrity are two of the most critical security issues related to user data. In conventional paradigm, the organizations had the physical possession of their data and hence have an ease of implementing better data security policies. But in case of cloud computing, the data is stored on an autonomous business party that provides data storage as a subscription service. The users have to trust the cloud Service Provider (SP) with security of their data. In, the author discussed the criticality of the privacy issues in cloud computing, and pointed out that obtaining information from a third party is much easier than from the creator himself. Following the pattern of paradigm shift, the security policies also evolved from the conventional cryptographic schemes applied in centralized and distributed data storage, for enabling the data privacy.

3. Proposed system As we seen above, the major issue in cloud computing is security of your data, from any unauthorized person. The main two motives of our system is make it secure and to ensure the availability. As we are dividing data into multiple chunks (or parts), and stored it on different servers, which have different physical locations. So no one can get the meaningful data unless the authenticated one. As we stored data with their backups so we can get the it from backup server if the actual server is suffering from any network issue.

4. System Requirement A) Hardware Components B) Software Requirement Table 1: Hardware Components Hardware

Specification

System

Pentium IV 2.4 GHz & onwards.

Hard Disk Monitor Mouse RAM

40 GB 15 VGA Color USB 2 GB

A) Software Requirement: Table 2: Software Requirements

Software

Specification

Operating System

Windows XPSP2 & onwards.

Language

Asp.net & C#.net.

Saurabh Rajput, IJRIT

747

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

Front End

visual studio 2010

Back End (Data Base) Browser

Sql server 2008 Any.

5. Non-Functional Requirements 6.1 Performance requirements 1. Number of Users that can simultaneously

use application:

Large no of people can use the various systems simultaneously. Distribution of data on various systems will increase efficiency of the whole system and hence increasing its performance.

2. Amount of information to be handled : A large no. of information can be handled simultaneously with great efficiency and security. Efficiency can be increased if data’s are distributed on various systems and less no. of systems are required to retrieve the data.

6.1.2 Safety requirements The database may get crashed at any of the failure of the server. Therefore it is required to take the database backup. Safety can be achieved by distributing the data on various systems so that information can be retrieved by authenticated person.

6.1.3 Security Requirements When security requirements are considered at all during the system life cycle, they tend to be general lists of security features such as password protection, firewalls, virus detection tools, and the like. For security purpose, user must enter the correct user name and password so that no one can misuse anyone’s crucial data. After entering correct username and password, user can access the uploaded information.

6.1.4 Software quality Attributes: The quality of our system is maintained in such a way that it provides: Quality will be accessed only in terms of the following metrics: Functionality: You can point out the errors in the .net source code as it has to be compiled into .cs file. Code and design quality:

• •

It is very important. Reviews give you a chance to suggest better ways of doing it, whatever it is, and to discuss potential issues with the way the code has been written. Code Standardization: To ensure that your basic coding standards have been meet, reviews will catch the issues that need human eyes to find. Effectiveness: It proves to be very effective as it provides checking for the following things: On demand service, recourse pooling, heterogeneous network access, data availability, security. Understandability: The tool does not require any additional knowledge .it is quite easy to understand.

Saurabh Rajput, IJRIT

748

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

• •

Maintainability: It is easy to maintain information about users using sql server. Portability: The software is easily transferred from one environment to another(this includes the organizational, hardware or software environment).

7. System Description Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer's point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block from a customer's point of view, relying upon a solo SP for his outsourced data is not very promising so cost effective and better privacy as well as ensuring data availability can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block.

8. Product Perspective In cloud computing while storing the data, the biggest danger is of loss of data. If server on which data is stored goes down, the data will be lost, to avoid data loss the data is divided and then stored on various servers, and same data pieces are kept on other servers, so that whenever one of the server goes down we can have that data piece from another server. And while storing data on cloud, if users data contains more pictures and if his data is less important the he should choose the single server system to store his data. Suppose user’s data is divided in 3 pieces a, b, c. His data will be stored on cloud1 and same 3 pieces on cloud2. If he chooses single server system whole data will be stored on single server.

9. Different Diagrams 9.1 Data Flow Diagrams 9.1.2 Level 1 DFD:

Description:

Saurabh Rajput, IJRIT

749

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

9.2 Use Case Diagram:

9.3 Activity Diagram:

Saurabh Rajput, IJRIT

750

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

9.4 Sequence Diagram:

Description User ->user registration request than it itself check for existence of Use And than user login to system authentication is done and upload a file and divide the data into data pieces and than searching the file to which you want to access . lastly logout process is done.

9.5 Class Diagram:

Saurabh Rajput, IJRIT

751

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 746- 752

10. Conclusion and Future Scope Conclusion: In this project, we proposed a secured cost-effective multi-cloud storage (SCMCS) in cloud computing, which seeks to provide each customer with a better cloud data storage decision, taking into consideration the user budget as well as providing him with the best quality of service (Security and availability of data) offered by available cloud service providers. By dividing and distributing customers data, our model has shown its ability of providing a customer with a secured storage under his affordable budget.

Future Scope: For the future work ,this research should be extended by adding the ensuring the availability system in this project which in result of availability of data in case of failure of data retrieving process. And even the backup data server can fails so there is no cured mention for this. So this drawback can be covered in next future work of this project task.

11. References [1] Yashaswi Singh, Farah Kandah, Weiyi Zhang “Secured cost effective multi-cloud data storage in cloud computing”, IEEE INFOCOM WORKSHOP ON CLOUD COMPUTING-Dartment of Computer Science, North Dakota State University, Fargo, ND 58105 ,2011 , NO.05 [2] Rafael Moreno-Vozmediano, Ruben S. Montero, and Ignacio M. Llorente, ,” Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications”, IEEEComputer Society, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, JUNE 2011, NO. 6. [3] P. S. Browne, “Dataprivacy and integrity: an overview”, In Proceeding of SIGFIDET ’71 Proceedings of the ACM SIGFIDET (now SIGMOD), 1971. [4] A. Cavoukian, “Privacy in clouds”, Identity in the Information Society, Dec 2008. [5] J. Du, W. Wei, X. Gu, T. Yu, “RunTest: assuring integrity of dataflowprocessing in cloud computing infrastructures”, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), ACM, New York, NY, USA, 293-304,2010. [6]S. H. Shin, K. Kobara, “Towards secure cloud storage”, Demo for CloudCom2010,VOL 02, Dec 2010. [8] N. Gruschka, M. Jensen, “Attack surfaces: A taxonomy for attacks on cloud services”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 5-10 July 2010. [9] R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing”, Prepared for the World Privacy Forum, online at http://www.worldprivacyforum.org/pdf/WPF Cloud Privacy Report.pdf,Feb 2009. [10] W. Itani, A. Kayssi, A. Chehab, “Privacy as a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures,” 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009.

Saurabh Rajput, IJRIT

752

A Secured Cost-effective Multi-Cloud Storage in ... - IJRIT

Cloud data storage redefines the security issues targeted on customer's ... Hardware. Specification. System. Pentium IV 2.4 GHz & onwards. Hard Disk. 40 GB.

871KB Sizes 5 Downloads 218 Views

Recommend Documents

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing ...
service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not ...

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
Abstract:- In recent years, cloud computing has become a major part of IT industry. It is envisioned as a next generation in It. every organizations and industries ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 100-105. Vinitha Varghese ... In this paper, we address the ... Since cloud computing environment is constructed based on open architectures ...

Study on Building a Building a Building a Secured Private ... - IJRIT
A private cloud is a layer of software and management built on top of existing ... disks, iSCSI, storage area networks [SANs], network-attached storage [NAS], etc.

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
using virtual infrastructure management (VIM) , a multi-cloud allows clients to easily ... These tools help cloud providers construct a distributed cloud storage ...

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
stored in the cloud. By using the corresponding private key, the embedded data and the key can be extracted successfully from the cloud. This scheme ensures ...

Study on Building a Building a Building a Secured Private ... - IJRIT
Cloud computing is one of the developing field which offers the market environment data storage and capacity with flexible and ... Confidentiality refers to only authorized users or systems having the permission and ability to access protected .....

Collateral secured loans in a monetary economy
Available online 20 May 2008. Abstract ... motivated by the fact that still to the day, collateral secured loans account for a high percentage ... a contract stipulating an amount of money, an interest rate, and the obligation to repay the loan— ..

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
(TPA) to verify the correctness of the dynamic data stored in cloud. Here the .... analyze the audits (verification) performed by the verifier (TPA) and get a better ...

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
Authentication Forwarding Mechanisms to scale the usability of the servers by ... the broad range of both internal and external threats for data integrity [11].

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Data Security Proofs in the Cloud Storage Data ... - IJRIT
Company, who desires to store their data in the cloud, buy or lease storage capacity from them ... Blob store, cloud by Apple. ... It's further complicated for the owner of the data whose devices like Personnel Digital Assist and mobile phones.

Data Security Proofs in the Cloud Storage Data ... - IJRIT
In cloud computing, data is moved to a remotely located cloud server. Cloud ... Data Integrity is very important among the other cloud storage issues. .... The next generation of cloud storage provides a new architecture to address the storage, ...

Trade in secured debt, adjustment in haircuts and ...
on international banking (section 2) and describe how this paper relates with ...... and T. S. Fuerst (1997) VAgency costs, net worth and business fluctuations:.

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... topology. 2. Congestion Control in MANET. To maintain and allocate network .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with honours fro

Various possibilities of Clone Detection in Software's: A Review - IJRIT
Software clone detection involves detection of duplicated code from two ..... Program slicing is a technique to decompose programs by analyzing their data and ...

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with ...

Load Balancing in Cloud Computing: A Survey - IJRIT
Cloud computing is a term, which involves virtualization, distributed computing, ... attractive, however, can also be at odds with traditional security models and controls. ... Virtualization means “something which isn't real”, but gives all the

Machine Learning In Chemoinformatics: A Novel Approach for ... - IJRIT
methods, high throughput docking, drug discovery, data analysis methods, etc[6] .... QSAR, protein-Ligand Models, Structure Based Models, Microarray Analysis,.

A Sophisticated Mechanism to Manage Access Controls in ... - IJRIT
This paper presents an access control model for the protection of shared data associated with multiple users in online social networks. Keywords: Online Social ...

A Sophisticated Mechanism to Manage Access Controls in ... - IJRIT
In recent years people go for online social networks (OSNs) to share their personal information using popular social ... Keywords: Online Social Network, Multiparty Access Control, Collaboration, OSN, Privacy. .... party, conflict resolution for diss

Load Balancing in Cloud Computing: A Survey - IJRIT
Keywords: Cloud computing, load balancing, datacenters, clients, distributed servers. 1. ... Hybrid Cloud (Combination of Public & Private Cloud). Fig. 2: Three ...