IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Protection of Identity Information In Cloud Computing Without Trusted Third Party Amol Chhallare, Kalpesh Chaudhari, Varsha Kadam, Prof. Nitin Shivale B.E computer engineering, Institute of Knowledge College of engineering, Pune [email protected], [email protected], [email protected]

Abstract Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (Sps). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts. Keywords: active bundle; computing predicates; cloud computing; identity management system; multi-party computing; privacy; security

1. Introduction The growing popularity, continuing development and maturation of cloud computing services is an undeniable reality. Information stored locally on a computer can be stored in the cloud, including word processing documents, spreadsheets, presentations, audio, photos, videos, records, financial information, appointment calendars, etc. A cloud service provider (SP) is a third party that maintains information about, or on behalf of, another entity. Trusting a third party requires taking the risk of assuming that the trusted third party will act as it is expected (which may not be true all the time). Whenever some entity stores or processes information in the cloud, privacy or confidentiality questions may arise. Privacy in cloud computing can be defined as the ability of an entity to control what information it reveals about itself to the cloud (or to the cloud SP), and the ability to control who can access that information. 2. Problem statement In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. There's a good chance you've already used some form of cloud computing. If you have an e-mail account with a Amol Chhallare,

IJRIT

608

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

Web-based e-mail service like Hotmail, Yahoo! Mail or Gmail, then you've had some experience with cloud computing. Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn't exist on your computer -- it's on the service's computer cloud.

3. System Requirement A) Hardware Components B) Software Requirements A)

Hardware Components Table 1: Hardware Components

B)

No.

Description

1

PC with minimum 40 gig hard disk and 256 MB RAM

2

Client Machine with minimum 40 GB Hard Disk, 128 MB RAM

No.

Description

1

Windows 2007/XP

2.

SQL Server

3.

JAVA

4.

J2EE

5

Cloud

6

RMI

Software Requirements Table 2: Software Requirements

3.1 Java Development Kit (JDK) The Java Development Kit (JDK) is a Sun product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java SDK. On 17 November, 2006, it was released under the GNU General Public License (GPL). The primary components of the JDK are a selection of programming tools, including: Amol Chhallare,

IJRIT

609

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

Javac– The compiler, which converts source code into Java byte code Jar – The archiver, which packages related class libraries into a single JAR file Javadoc – The documentation generator, which automatically generates documentation from source code comments Jdb – The debugger The JDK also comes with a complete Java Runtime Environment, usually called a private runtime. It consists of a Java Virtual Machine and all of the class libraries that will be present in the production environment, as well as additional libraries only useful to developers, such as the internationalization libraries and the IDL libraries. Also included are wide selections of example programs demonstrating the use of almost all portions of the Java API.

3.1.1 Ambiguity between a JDK and an SDK The JDK is a subset of what is loosely defined as a SDK in the general sense. In the descriptions which accompany their recent releases for Java SE, EE, and ME, Sun acknowledge that under their terminology, the JDK forms the subset of the SDK which is responsible for the writing and running of Java programs. The remainder of the SDK is composed of extra software, such as Application Servers, Debuggers, and Documentation.

3.2Hadoop The Hadoop platform was designed to solve problems where you have a lot of data — perhaps a mixture of complex and structured data — and it doesn’t fit nicely into tables. It’s for situations where you want to run analytics that are deep and computationally extensive, like clustering and targeting. That’s exactly what Google was doing when it was indexing the web and examining user behavior to improve performance algorithms. Hadoop applies to a bunch of markets. In finance, if you want to do accurate portfolio evaluation and risk analysis, you can build sophisticated models that are hard to jam into a database engine. But Hadoop can handle it. In online retail, if you want to deliver better search answers to your customers so they’re more likely to buy the thing you show them, that sort of problem is well addressed by the platform Google built. Those are just a few examples.

3.2.1 Apache Hadoop It is an open-sourcesoftware framework that supports data-intensivedistributed applications, licensed under the Apache v2 license. It supports the running of applications on large clusters of commodity hardware. Hadoop was derived from Google's MapReduce and Google File System (GFS) papers. The Hadoop framework transparently provides both reliability and data motion to applications. Hadoop implements a computational paradigm named MapReduce, where the application is divided into many small fragments of work, each of which may be executed or re-executed on any node in the cluster. In addition, it provides a distributed file system that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster. Both map/reduce and the distributed file system are designed so that node failures are automatically handled by the framework. It enables applications to work with thousands of computation-independent computers and petabytes of data. The entire Apache Hadoop “platform” is now commonly considered to consist of the Hadoop kernel, MapReduce and Hadoop Distributed File System (HDFS), as well as a number of related projects – including Apache Hive, Apache HBase, and others. Hadoop is written in the Java programming language and is an Apache top-level project being built and used by a global community of contributors. Hadoop and its related projects (Hive, HBase, Zookeeper, and so on) have many contributors from across the ecosystem. Though Java code is most common, any programming language can be used with "streaming" to implement the "map" and "reduce" parts of the system.

3.3 RMI RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network. RMI is the Java version of what is

Figure 1. RMI Amol Chhallare,

IJRIT

610

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

generally known as a remote procedure call (RPC), but with the ability to pass one or more objects along with the request. The object can include information that will change the service that is performed in the remote computer. Sun Microsystems, the inventors of Java, calls this "moving behavior." For example, when a user at a remote computer fills out an expense account, the Java program interacting with the user could communicate, using RMI, with a Java program in another computer that always had the latest policy about expense reporting. In reply, that program would send back an object and associated method information that would enable the remote computer program to screen the user's expense account data in a way that was consistent with the latest policy. The user and the company both would save time by catching mistakes early. Whenever the company policy changed, it would require a change to a program in only one computer. Sun calls its object parameter-passing mechanism object serialization. An RMI request is a request to invoke the method of a remote object. The request has the same syntax as a request to invoke an object method in the same (local) computer. In general, RMI is designed to preserve the object model and its advantages across a network. RMI is implemented as three layers:  A stub program in the client side of the client/server relationship, and a corresponding skeleton at the server end. The stub appears to the calling program to be the program being called for a service. (Sun uses the term proxy as a synonym for stub.)  A Remote Reference Layer that can behave differently depending on the parameters passed by the calling program. For example, this layer can determine whether the request is to call a single remote service or multiple remote programs as in a multicast.  A Transport Connection Layer, which sets up and manages the request. A single request travels down through the layers on one computer and up through the layers at the other end. RMI is supplied as part of Sun Microsystems’s Java Development Kit (JDK).

3.4NetBeans It is an integrated development environment (IDE) for developing primarily with Java, but also with other languages, in particular PHP, C/C++, and HTML5. It is also an application platform framework for Java desktop applications and others. The NetBeans IDE is written in Java and can run on Windows, OS X, Linux, Solaris and other platforms supporting a compatible JVM. The NetBeans Platform allows applications to be developed from a set of modular software components called modules. Applications based on the NetBeans Platform (including the NetBeans IDE itself) can be extended by third party developers.[2] NetBeans IDE 6.0 introduced support for developing IDE modules and rich client applications based on the NetBeans platform, a Java Swing GUI builder (formerly known as "Project Matisse"), improved CVS support, WebLogic 9 and JBoss 4 support, and many editor enhancements. NetBeans 6 is available in official repositories of major Linux distributions. NetBeans IDE 6.5, released in November 2008, extended the existing Java EE features (including Java Persistence support, EJB 3 and JAX-WS). Additionally, the NetBeans Enterprise Pack supports development of Java EE 5 enterprise applications, including SOA visual design tools, XML schema tools, web services orchestration (for BPEL), and UML modeling. The NetBeans IDE Bundle for C/C++ supports C/C++ and FORTRAN development. NetBeans IDE 6.8 is the first IDE to provide complete support of Java EE 6 and the GlassFish Enterprise Server v3. Developers hosting their open-source projects on kenai.com additionally benefit from instant messaging and issue tracking integration and navigation right in the IDE, support for web application development with PHP 5.3 and the Symfony framework, and improved code completion, lay outing, hints and navigation in JavaFX projects. NetBeans IDE 6.9, released in June 2010, added support for OSGi, Spring Framework 3.0, Java EE dependency injection (JSR-299), Zend Framework for PHP, and easier code navigation (such as "Is Overridden/Implemented" annotations), formatting, hints, and refactoring across several languages. NetBeans IDE 7.0 was released in April 2011. On August 1, 2011, the NetBeans Team released NetBeans IDE 7.0.1, which has full support for the official release of the Java SE 7 platform.[7] Framework for simplifying the development of Java Swing desktop applications. The NetBeans IDE bundle for Java SE contains what is needed to start developing NetBeans plugins and NetBeans Platform based applications; no additional SDK is required. Applications can install modules dynamically. Any application can include the Update Center module to allow users of the application to download digitally signed upgrades and new features directly into the running application. Amol Chhallare,

IJRIT

611

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

Reinstalling an upgrade or a new release does not force users to download the entire application again. The platform offers reusable services common to desktop applications, allowing developers to focus on the logic specific to their application. Among the features of the platform are:  User interface management (e.g. menus and toolbars)  User settings management  Storage management (saving and loading any kind of data)  Window management  Wizard framework (supports step-by-step dialogs)  NetBeans Visual Library  Integrated development tools NetBeans IDE is a free, open-source, cross-platform IDE with built-in-support for Java Programming Language.

4. Non-Functional Requirements 4.1

Performance Requirements

Server programs are supposed to serve multiple requests simultaneously on various TCP/IP connections. Client loads vary and so do requests per client. Taking that into consideration, the performance parameters of servers include the following: number and type of requests per second; latency time, measuring in milliseconds how long it takes to complete each new connection or request; throughput or the amount of data transmitted in response to a request measured in bytes per second. Finally, the server model, whether client-side or server-side, used to execute server programs establishes scalability. Scalability is a system property that refers to a system or network’s ability to manage increasing workloads well and the ability to expand gracefully. 4.2

Safety Requirements

The data handled in the Morphing Portal system is very vital. The server should always be confirmed to run properly and the data are saved to the database at consecutive intervals. Power is a significant feature and the power supply should be always taken care of. An Uninterrupted Power Supply is always recommended. 5.

System Architecture

System makes optimal use of resources to perform shopping and to handle complex banking transactions. The clouds are so efficient that they save the time and efforts.

Figure 2.System Architecture

5.1 Product Functions GUI interface authentication for client side and administrator side.  Administrator side  Add new products and product detail. Amol Chhallare,

IJRIT

612

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615







 Controls and maintains user activities.  Transaction management  Provide a layer wise security in whole system. User side  Register user access web application and browse products and views detail information.  User can add product to cart and pay shopping amount.  Users fill all personnel detail to system at the time of registration. IDM(Identity management)  IDM receives request from customer and for generation key send request to Cloud.  IDM also provide encryption of Active Bundles data by self-token generation.  After receiving a part from (Part 1) secrete key whole encryption of Active Bundle done. Cloud  Cloud receives request from IDM and generate multiple keys  Partition of selected key into two part  One for IDM  And One for Bank Server

5.2 General Constraint 1. Client must be register with to web application. 2. Authentication ids necessary for Client. The client needs to give the username and password. Also he is asked to enter the PII. 3. The client will do shopping and pay bill.

6. Literature Survey Numerous existing privacy laws impose the standards for the collection, maintenance, use, and disclosure of personally identifiable information (PII) that must be satisfied even bycloud SPs. (PII is commonly known as identity information.) Due to the nature of cloud computing, there is little or no information available in a cloud to point out where data are stored, how secure they are, who has access to them, or if they are transferred to another host (if that host can be trusted). A cloud cannot be used for storing and processing data and applications if it is unsecure. The major problem regarding privacy in cloud is how to secure PII from being used by unauthorized users, how to prevent attacks against privacy (such as identity theft) even when a cloud SP cannot be trusted, and how to maintain control over the disclosure of private information. Handing sensitive data to another company is a serious concern. Cloud computing can increase the risks of security breaches. Knowing who has user’s personal data, how they are being accessed, and the ability to maintain control over them prevents privacy breaches of PII, and can minimize the risk of identity theft and fraud. The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox. Other systems have unique applications that provide network access to clients. On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server. A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set of rules called protocols and uses a special kind of software called middleware. Middleware allows networked computers to communicate with each other. Most of the time, servers don't run at full capacity. That means there's unused processing power going to waste. It's possible to fool a physical server into thinking it's actually multiple servers, each running with its own independent operating system. The technique is called server virtualization. By maximizing the output of individual servers, server virtualization reduces the need for more physical machines. If a cloud computing company has a lot of clients, there's likely to be a high demand for a lot of storage space. Some companies require hundreds of digital storage devices. Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored. That's because these devices, like all computers, Amol Chhallare,

IJRIT

613

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

occasionally break down. A cloud computing system must make a copy of all its clients' information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy.

6. Objectives  

Registration to server Provides secure authentication schema—  Validation of Username and password    

Design shopping portal Browse product and view detail Provide Recharge facility Add selected product in cart and finally request for payment



Design IDM (Identity Management)  Handle client request and generate token  Cloud secret key for encryption of active bundles  Provide encrypted data to bank server  Design of Cloud  On request perspective generate multiple keys and partition of selected key  Design of Bank Server  Decrypt active bundle and data inside active bundle by two part of secret key, one from IDM and one from IDM.  Perform account transaction for particular user.

7. Workflow of System 7.1 Activity Diagram An activity diagram shows the flow from activity to activity. An is an ongoing non atomic execution within a state machine. Activities ultimately result in some action, which is made up of executable atomic computations that result in a change in state of the system or the return of a value. Actions encompass calling another operation, sending a signal, creating or destroying an object, or some pure computation, such as evaluating an expression. Graphically, an activity diagram is a collection of vertices and arcs.

Figure 3.Activity Diagram Amol Chhallare,

IJRIT

614

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 608-615

8.Conclusion With the immense growth in the popularity of cloud computing, privacy and security have become important concerns for both the public and private sectors. There is a strong need for an ef-_cient and e_ective privacypreserving system that is independent of TTP. There is a strong need for an e_cient and e_ective privacy-preserving system that is inde-pendent of TTP.We propose an approach for building IDM systems without using TTPs, using the active bundles scheme computing predicate over encrypted data and multiparty computing.

9. Future Scope We provide to user his own multiple security questions and answers for providing input data to create shamir key.

10. References 1) “Protection of Identity Information in Cloud Computing without Trusted Third Party” Anya Kim, Myong Kang Naval Research Laboratory Washington, DC, USA Mark Linderman Air Force Research Laboratory Rome, NY, USA 2) “Cloud Computing,”” NIST, accessed in Aug 2010. Online at :http://csrc.nist.gov/groups/SNS/cloud-computing/ 3) W. A. Alrodhan, and C.J. Mitchell. “Improving the Security of CardSpace” EURASIP Journal on Information security. vol. 2009, 2009, doi:10.1155/2009/167216 4) Open Cloud Manifesto, Spring 2009. Available at: http:// www.opencloudmanifesto.org/pencloudmanifesto1.html 5) R. Gellman, ““Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing”, World Privacy Forum, Feb. 2009. Online at: http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy _Report.pdf 6) L. Ben Othmane, and L. Lilien, ““Protecting Privacy in Sensitive Data Dissemination with Active Bundles,”” Proc. 7th Annual Conference on Privacy, Security & Trust (PST 2009), Saint John, New Brunswick, Canada, Aug 2009. 7) An Entity-centric Approach for Privacy and Identity Management in Cloud Computing Pelin Angin, Bharat Bhargava, Rohit Ranchal, Noopur Singh; Lotfi Ben Othmane, Leszek T. Lilien ; Mark Linderman. 8) Hassan Takabi, James B.D., Joshi, Gail-Joon, Ahn, “Security and Privacy Challenges in Cloud Computing Environments”, University of Pittsberg, October 2010. 9) J. Archer, A. Boehm, “Security Guidance for Critical Areas of Focus in Cloud Computing”, Cloud Security Alliance, December 2009 10) Axel Buecker, Koos Lodewijkx, Harold Moss, Kevin Skapinetz, Michael Waidner, “ Cloud Security Guidance”, a red paper, January 2011.

Amol Chhallare,

IJRIT

615

Protection of Identity Information In Cloud Computing ...

SQL Server ..... The copies enable the central server to access backup machines to retrieve data that ... Making copies of data as a backup is called redundancy.

101KB Sizes 3 Downloads 315 Views

Recommend Documents

Cloud Computing Protection from Single toward Multi ...
digital signature to ensure data is not modified by Amazon S3. These technologies protectusers from Amazon data modification and fromhackers who may have ...

'Cloud' Hanging Over the Adoption of Cloud Computing in Australian ...
Dec 11, 2016 - of what the term cloud computing means and its benefits; the 23% of .... all wireless and wired systems that permit users in sharing resources.

'Cloud' Hanging Over the Adoption of Cloud Computing in Australian ...
Dec 11, 2016 - In Australia, cloud computing is increasingly becoming important especially with the new accessibility provided by the development of the ...

Leading Interoperability and Innovation in Cloud Computing ...
... of the apps below to open or edit this item. Constantino Vazquez - OpenNebula - Leading Interope ... ty and Innovation in Cloud Computing Management.pdf.

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing ...
service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not ...

Cloud Computing: From Beginning to End Information
Your Complete Guide to Cloud Computing and Migrating to the Cloud. ... of cloud technology and the steps required to quickly reap its benefits while at the same ...

Cloud computing - SeniorNet Wellington
Google Search. •. Google 'Cloud' listings showing 'most popular' blog links. •. FeedBurner which provides free email updates. •. Publications o Class Application Form 2010 o Events Diary o Information Booklet o Manuals Available o Newsletters o

Cloud Computing
called cloud computing, and it could change the entire computer industry. .... master schedules backup execution of the remaining in-progress tasks. Whenever the task is .... You wouldn't need a large hard drive because you'd store all your ...

Cloud Computing
There are three service models of cloud computing namely Infrastructure as a .... applications too, such as Google App Engine in combination with Google Docs.

On the Protection of Private Information in ... - Research at Google
protecting the privacy of training data for machine learning systems, and comment ... to protection from programs [22]. When we discuss .... the best results. They lead, in .... noise to sensitivity in private data analysis,” in Theory of. Cryptogr

Cloud Computing
[10]. VMware finds cloud computing as, “is best under- stood from the perspective of the consumer .... cations and other items among user's devices, like laptop,.

Implementation of Cloud Computing in remote Learning - IJRIT
Key words: Cloud computing, IaaS, SaaS, PaaS. 1. INTRODUCTION. Post-freedom time has seen India thrive surprisingly in the field of giving higher training.

Review on Various Application of Cloud computing in ... - IJRIT
phones, laptops, software, scientific instruments. Mobile ... components used in availing ICT services, such as virtual computers, traffic monitoring and redirecting, .... [10] Cloud computing and emerging IT platforms: Vision, hype, and reality for 

Cloud Computing Security - International Journal of Research in ...
The Security Access Control Service (SACS) will helpful toward CSP in Pakistan to implement cloud services with secure data trust. SACS includes Access Authorization, Security API, cloud connection Security modules and are described as under: Access

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

Implementation of Cloud Computing in remote Learning - IJRIT
the selection of cloud computing for remote learning, taking into account an ... Post-freedom time has seen India thrive surprisingly in the field of giving higher training. ..... Business Strategy for Cloud Providers: The Case for Potential Cloud ..

Review on Various Application of Cloud computing in ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ... Keywords: Cloud Computing, ICT, Wireless Sensor Actor Network, Agri – Cloud, Mobile Cloud. .... supports the 2.5G, 3G or 4 G technologies, distributed all over.

Cloud Computing Security - International Journal of Research in ...
sharing of resources which include software and infrastructure with the help of virtualization.In order to provide quality services ... Platform-as-a-service is higher level service than infrastructure service. Platform based services includes .... F