An Approach towards Shuffling of Data to Avoid Tampering in Cloud

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

An Approach towards Shuffling Of Data to Avoid Tampering In Cloud Dipak Khadse1, Sandeep Giratkar2, Mehul Balsaraf3,,Jyoti Gawande4, Monali Taywade5, Soniya Deshmukh6 123456Department

of Computer Sci. & Engg.,Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Cloud is a model which permits for on-request resource access. Apart from it, the cloud provides facilities for data storage which can be personal, confidential and business related. As the standard of technology increases, it also attracts various security threats towards itself. As cloud computing is a popular platform which is mainly used in IT industries the security plays an important role in securing the data stored in the cloud. To keep data secure we are proposing an approach by using Advance Encryption Technique (AES) and allows the admin to control the data shuffling life cycle within regular interval of time and also applying access control policies to perform various operation on the files present in cloud. Apart from it the concept of deduplication has been used to reduce memory storage. Key Words: Advance encryption technique, Shuffling, access control policies, de-duplication.

1.INTRODUCTION The history of cloud computing starts with the invention of first Ethernet adaptor card for IBM PC in the year 1982 which has fast connections that would enable cloud computing. In the year 1989, the first public dial-up Internet service was founded which we still use it and was founded by software tools and die. The term Cloud Computing was put forward by professor Ramnath Chellappa from the University of Texas in the year 1997[1]. Since then Amazon Web Services was launched in the year 2002 followed by Google apps in April 2008 and Microsoft Azure in November 2009. Nowadays cloud is emerging for all kinds of online activities. It is capable of satisfied different needs of customers of the cloud. Cloud computing offers many services in data storing, data accessing with congruous data management. Cloud computing started to grow its Popularity as to reduce down overhead of maintaining data, companies commenced relying on cloud platforms.

Š 2017, IRJET

|

Impact Factor value: 5.181

|

End users have benefits of cloud as they can access the data anytime and anywhere even on their mobile devices. Most common examples of such accommodations are Amazon cloud and Google engine [3]. To fluently achieve the provisioned services, cloud systems generally enhance the services by caching, replicating and/or archiving a huge volume of user data in its storage network. Despite these enhancements can upgrade the comprehensive conduct, they also provoke a huge danger to reveal the user data publicly, as the cloud-wide storage networks are commonly not protected that is they are facilely under vigorous attacks and also struggle through software/hardware faults [1]. There are many such incidents on attacks cloud servers, which were deadly and caused many troubles. One type of attack on cloud computing is a DDoS attack in Cloud, one such incident regarding this attack is a Security breach on Sony which has alerted the whole internet community. Attack has exposed 100 million account records. Attackers are not remained concentrated on this attack instead an additional attack occurred on Sony’s online entertainment that exposed additional 25 million users. Swapping across the servers and data swapping could be solutions for these threats. Data swapping implicatively insinuates transmuting the physical location of accessed data by swapping them between the numbers of involved servers. This will be done by a process which reallocates data by constant swapping between the many servers, so it will be infeasible to access the cloud confidential data by any illicit denotes.[3]. 2. Problems in existing system File security: - During supporting the text record secretly, the facts stored must not be let to be chan ged even by the controlling person. The data created must be kept secured from attacks of file confidently. The way to store the file in the cloud must not be tracked. Data Duplication: - Duplication means which stores same data multiple times, which results in wastage of space in

ISO 9001:2008 Certified Journal

|

Page 1797


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.