Dynamic Notification Based Cloud Storage System

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract—Building a secure storage data forwarding system with dynamic online alerts that serves multiple functions is challenging when the storage system is distributed and has no dominant authority. We propose an integrated encrypting, encoding, forwarding and online alert scheme with a decentralized scattered code such that a secure distributed and forward storage system is formulated.

The distributed data forwarded storage system not only supports secure and robust data storage and

retrieval, but also lets a user forward his data among storage servers to another user without retrieving the data back using Multiplicative Homomorphic Encryption scheme, which enriched Fully Chainable , ensured correctness and compactness of data communication in the streaming of private information over forwarded data. The main technical contribution is that the Online Alert methodology supports dynamic notification to the owner of data, when unauthorized files are rehabilitated or accessed by malicious hacker during online exchange of forward data over cloud, besides this we analyze and Report effective forms of defense and unsolicited request between cloud servers in the integrated encrypting, encoding, forwarding and Online Alert scheme without significant changes to its architecture and this scheme is very expedient during number of cloud servers request optimization which leads congestion control between cloud servers .

INTRODUCTION

A cloud storage system, consisting of distributed network storage servers, delivers increase of data availability, cost saving and hardware free storage service in a large data center of Enterprise Cloud Storage over public internet [Fig: 1]. Cloud computing entrusts remote services with a user's data, software and computationMoving data into the cloud offers great convenience to users since they don’t have to care about the complexities of direct hardware management.While these internet-based online services do provide huge amounts of storage space and customizable computing resources,

eliminating the responsibility of local machines for data maintenance at the same time. As a result, users are at the mercy of their cloud service providers for the availability and integrity of their data.Cloud computing extends this boundary to cover servers as well as the network infrastructure.  Local computers no longer have to doall the heavy lifting when it comes to running applications. Hardware and software demands on the user's side decreaseCloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information.

OUR CONTRIBUTION

Distributed networked storage systems aim to provide the storage service on the Internet. Current research on distributed networked storage systems focuses on efficiency and robustness of the storage systems. The Cloud leverage storage platform scales to support business storage needs of any size and use virtualization technology, which automatically increases capacity to support additional customers on the fly, and ensures performance is always at its best. Storing personal data, such as e-mails and photos , applications on the Internet has become a common practice but Placing sensitive data in the hands of third party’s cloud system seem, intuitively risky when data moves or forward over public networks. We ensured accuracy and solidity of data communication in the flowing of private information over forwarded data. The main technical contribution is by providing fully chainable ensured correctness and compactness with integrated encrypting, encoding methodology and sending online alert notification to the holder of the data when mischievous hacker attach during data forwarding between cloud servers

1.2 CLOUD COMPUTING ARCHITECTURE

Cloud architecture typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue. Elastic provisioning implies intelligence in the use of tight or loose coupling of cloud resources, services, middleware, and software components.

`.

A cloud computing architecture consists of a front end and a back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system [Fig1& 1.1& 3]

1.3 TYPES OF PUBLIC CLOUD COMPUTING:

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Software as a service (SaaS)

Infrastructure as a service (IaaS)

Infrastructure as a Service is a delivery model in which an institute outsources the equipment used to assist operations, including storage, hardware, servers and networking modules. The service supplier owns the equipment and is responsible for housing, running and maintaining it. The client usually pays on a per-use basis. [Fig: 1.2]

Platform as a service (PaaS)

Platform as a Service (PaaS) is a manner to lease hardware, operating systems, storage and network capacity over the Internet. The service provision model allows the client to rent virtualized servers and related services for running existing applications or developing and testing new ones.[Fig: 1.2]

Software as a service (SaaS)

Gartner defines software as a service (SaaS) as software that is preserved, delivered and managed remotely by one or more suppliers. The supplier delivers software based on one set of common code and data descriptions that is spent in a one-to-many model by all contracted customers at any time on a pay-for-use basis or as a subscription based on use metrics.[Fig: 1.2]

EXISTING SYSTEM DIFFICULTIES

Existing system doesn’t have the control of threshold limit and the Offline data verification cause delay in the security when hacker attack during online exchange of forward data over and Data cannot be forwarded between servers without retrieval of data from clientmachine.

PROPOSED SYSTEM ARCHITECTURE

Building up secure storage data system over the Cloud and providing Secure Data Forwarding among cloud Storage Servers by Generating Online Alert scheme in the client server environment over cloud. Besides Multiplicative Homomorphic Encryption Algorithm encrypting the data as well as limiting the external access to the cloud servers by fixing the threshold limit of the client server request and ensuring symmetric privacy and correctness during the data retrieval from large data storage family for protecting the sensitive data from internet hackers during data forwarding over Cloud storage environment.

DATA FORWARDING AUTHENTICATION:

A critical element of cloud network scalability is the size of the forwarding data in network switches deployed in the data center. This factor impacts many elements of data center scalability. An entity, which has expertise and capabilities to identify the unauthorized access and expose the risk to the source servers during data forwarding of cloud storage services.

3.2 MOBILE ALERT:

Offline data verification cause delay in the security when hacker attack during online exchange of forward data over. An entity, which produces an alert to the cloud storage service provider or administrator who manages the cloud storage server during the unauthorized access.

MULTIPLICATIVE HOMOMORPHIC ENCRYPTION ALGORITHM

An encryption patternpermitting to compute a limited amount of sums and products over encrypted

Data with a security reduction .This scheme is able to assess each request with exponentiallymany operands and can be converted into an effectual fully-homomorphic encryption scheme

A technique for homomorphic encryption is by providing a ciphertext with component c, there exists a big group which is subset of small groupand it is summing up the elements of the small group yields the private key and homomorphically summing all elements to obtain a resulting ciphertext that is an encryption of the at least one bit, where the big group is subdivided into n chunks with each part having a multiplicity of different elements from the big group,

Send Request:

The requester have sent the message as cipher steam C, it formed the set of bit vector with is added with summing of secret format of message which if the multiplication of set big group who forms the encrypted data .

σas original Component

Yi=ci*bi multiplication of C components

Ciphertext pocket message

Summing of xi homomorphic

Encrypted data with additional yi σi values of big group

S small set, b subset of S of N elements

Receiver Message:

Encrypted data with additional yi σi values of big group

Obtaining the least one bit for dismantling the sum of Yi values

σas originaldecrypted Component

The receive decrypt the chipper message evaluation the yiσi; and homomorphically summing all xi to obtain a resulting ciphertext that is an encryption of the at least one bit, where the big group is partitioned into n parts with each part having a plurality of different elements from the big group, where the elements of the small group are one element from each part

Transmit the original message to receiver

Big group is partitioned into n parts

5. CONCLUSION

In this paper, we have investigated the problem of security during the data forwarding in cloud data storage system, which is essentially a distributed storage system. To ensure the accuracy and security of users data we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block, update, delete, append, forwarding, alert and notification. We rely to provide redundancy parity vectors and guarantee the data dependability by utilizing the Multiplicative Homomorphic token with distributed verification of erasure coded data. Our scheme achieves the integration of storage with secure forwarding and online alert notification to the service provider when unauthorized files are amended or accessed by malicious hacker during online exchange of forward data over cloud which is value added , besides this scheme is very beneficial for congestion control and optimization of number of request between cloud servers. We can almost guarantee the simultaneous identification of the misbehaving servers, whenever data corruption or unauthorized client has been detected during the data forwarding across the distributed servers. And we assure that our scheme is highly efficient and resilient to Scheming failure, malicious data modification attack, and even server colludingattacks when compare to resend findings and researches. However malicious can find the way to stop sending alert message to the owner of the cloud storage organizationduring unauthorised access of files,so end to end security is definitely a challenging job in the cloud storage environment .



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now