You are on page 1of 4

International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com


Volume 3, Issue 2, March April 2014 ISSN 2278-6856


Volume 3, Issue 2 March April 2014 Page 251


Abstract: Cloud computing is new way of economical and
efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This
can lead to data loss due to different causes like hacking,
server failure etc. If an attacker chooses to attack a specific
client, then he can aim at a fixed cloud provider, try to have
access to the clients information. This makes an easy job of
the attackers, both inside and outside attackers get the benefit
of using data mining to a great extent. Inside attackers refer
to malicious employees at a cloud provider. Thus single data
mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the
secure replication approach that encrypt and replicate the
data in distributed data mart storage system. This approach
involves the encryption, replication and storage of data.

Keywords: computing, cloud storage, replication, security,
data mart.

1. INTRODUCTION
Cloud computing is technology that provides the different
services at very low cost. The different client stores data
on Cloud storage. Cloud computing provides storage for
storing the information and provides the security of that
information. Cloud service models are infrastructure as a
service, platform as a service and software as a service.
Cloud services are provided by different famous
organizations like Google, Amazon and Microsoft etc. By
using these services the client avoid the cost of buying
extra resources. Cloud services provide the high
computation capacity at low cost. The various data
analysis techniques which are used for extracting valuable
information from a large volume of data. These different
techniques are used by Cloud service provider like Google
uses the technique for identifying the user behavior on the
basis of search behavior. In previous trend data to store
on a single cloud the attacker applies an attack on it and
accesses the information which is stored by the client on
Cloud storage. If the client is an organization related to
healthcare, shopping etc then there is big loss of
information access by attackers, so distributed
environment handles such kind of problem. The
distributed data mart storage is service which is provided
by cloud service provider. In Distributed Cloud storage,
the information is stored from different kind of devices
they only pay for storage as per usage.

Figure 1 Cloud storage system

The previous figure indicates cloud storage stores the
information from different devices and these devices can
access the information on demand at any time. Here
purposes a secure approach that replicates the clients
data and store on different data mart. Before replication,
full copy of encrypted information stores on data
warehouse for increasing the availability of information.
It will increase the reliability and privacy of data.

A. Cloud storage
Cloud storage is a network of online storage, generally
managed by third parties. On cloud the data is stored in
virtualized pools of storage. Hosting companies operate
large data centres and lease their storage. And companies,
organizations and institutes who require their data to be
hosted buy or lease storage capacity from hosting
companies.
In the background, the storage operator virtualizes the
resources as per the requirements of the customer and
exposes them as storage pools. The customers can store
files or data objects over the cloud storage. The resource
may physically span across multiple servers and data may
be stored at different places on the cloud. One needs to
pay only for the amount of storage that data consumes.
The advantage of using cloud storage over dedicated
storage is that the storage is delivered on demand.
Secure Replication management in
cloud storage

Subeg Singh
1
, Richa Sapra
2


1
Lovely Professional University, Department of Computer Science
and Engineering, J alandhar-Phagwara Road,
Punjab, India

2
School of Computer Science and Engineering, Lovely Professional
University, J alandhar-Phagwara Road,
Punjab, India
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March April 2014 ISSN 2278-6856


Volume 3, Issue 2 March April 2014 Page 252


B. Distributed storage
For avoiding the disadvantage of storing all data of a
client to the single data mart, data can be split into
chunks and distributed among multiple data marts. In a
distributed environment, an attacker chooses a specific
client but the distribution of data into multiple data marts,
this makes attacker job more difficult. In purposed
system, the distributed environment represents by
different data marts that placed on different places.
Different data marts store the clients information after
encryption, replication. Data warehouse also stores the
full copy of clients information for increasing the
availability of information. If any data mart lost the part
of clients information due to hardware and software
failure then it can copy of information from backup data
warehouse.

2. RELATED WORK
The cloud provider provides a secure and reliable access
to data owner. The purposed search technique is more
efficient than previous search techniques. Trust is the
main thing between the service provider and data owner,
but when the trust is breached then there is a big problem.
This paper suggests the technique where the trust from a
service provider is not required. The data owners also
have the responsibility of security of data. The tool is used
for security which decides the access right for other
persons. The data owner searches the data from encrypted
data bases the search is based on rank keyword. The
ranked keyword base search reduces the overhead of the
data owner because there is no need to go through from
each file. In this technique, the server site is only
responsible for the search operation all other
responsibilities are taken by the data owner [1]. The
responsibility of cloud provider is provides a security to
client. For the security issue in cloud storage systems, this
paper describes the concept of secure cloud storage
system; data security means how to save data in the cloud.
Cloud security storage system also connects control
interface. The authorized users can safely access the data
in the Cloud secure storage system. This system can give
data protection and multilevel storage in private
enterprise cloud. The developed secure-cloud storage
system is improved and perfect stage, and need go
through the process of improving. Cloud security storage
system is responsible for clients information. Sometimes
the clients information is very sensitive then the cloud
security storage system provides the security. The cloud
security storage system is mostly adopted by different
companies. Therefore, this project is supposed to create
good social and economic benefits [2]. The cloud
computing is computing technique and software services
are delivered to the clients according to the requirement.
Because of its greater level of flexibility, cloud technology
is mostly adopted by different organizations. The cloud
storage provides high flexibility to cloud user this also
leads risk of the security and privacy of users data. This
is a big problem for many clients of cloud. In this paper,
we first identify the data mining based privacy risks on
cloud data and also propose a distributed architecture to
reduce the risks. In this paper, proposed a distributed
structure to eliminate mining based privacy threat on
cloud data. This paper purposes an approach which
includes categorization, fragmentation and distribution,
secure data mining by maintaining privacy levels,
splitting data into in to different small chunks and storing
these chunks of data to appropriate cloud providers
according to the clients requirement. It will increase the
private level of data. The purposed system basically has a
two major components one is cloud data distributor and
other is cloud provider. The cloud data distributor plays a
role as an intermediate between the data owner and cloud
provider. Cloud data distributor receives the files from the
data owner and split into small parts and fits into
different chunks and then distribute among various cloud
provider for storing purpose. But in this paper, the data
owner overhead is increased because if data owner wants
to analyze all data then the entire data from distributing
cloud storage. This paper also suggests future work to
improve our system by reducing such overhead. [3]. The
data integrity protection in code base cloud storage. A
major limitation of the previous schemes (like PDP etc.)
is that they are designed for a single server. If the server
is controlled, then these schemes can only provide
detection of corrupted data, but cannot recover the
original data. So this paper purposes the design of
efficient data checking schemes in a multi server setting.
By striping redundant data across multiple servers, the
original files can be recovered. This paper provides the
additional feature to clients from recent approaches. This
approach is responsible for recover the original data. The
provide protection data in cloud storage against
corruptions, and provide integrity protection and recovery
for cloud storage is difficult task. By striping data across
multiple servers we provide the facility to data owners.
The erasure codes technique is using during failure
recovery. In this paper implement a practical data
integrity protection (DIP) scheme for a specific
regenerating code. It works under the simple assumption
of thin-cloud storage and allows different parameters to
be fine for the security.

3. MATERIAL AND METHODOLOGIES

3.1Working of Proposed Architecture
The process is carried out as follows:-

Step1: Client sends data to cloud provider for storing.
Step2: cloud provides receive data and perform
encryption.
Step3: full copy of encrypted data stores on data
warehouse.
Step4: After backup, performing replication and divide
the data in parts according to the availability of data
marts (in our system use three data marts S1, S2, S3)
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March April 2014 ISSN 2278-6856


Volume 3, Issue 2 March April 2014 Page 253


Step5: Storing the different part of information on
different data mart.
Step6: Repeat Steps as per storing request.

A. Proposed Architecture

Fig.2 Secure replication system architecture

B. Recovery of Lost Information

1) Software failure
In case of software failure data mart loss the information
of particular client duo to different causes like network
down, file outage etc. Data mart takes the copy from
backup warehouse. It increases the availability of
information. Data mart S1 loss the information P1, then it
can take information S1 from backup warehouse and
reconfigure it. If data mart S2 and S3 lost the information
then they can also able to recover the information from
backup ware house.

2) Hardware failure
The data mart is crashes or down also impact on the
availability of information. The purposed system also
removes that drawback. If any data mart is crashes or
down then clients request also able to extract the data
from backup warehouse. In Purposed scenario data mart
S1 is fail and not responding the user request. In this case
the part of information P1 is lost. The purposed system
allow user to extract the information from backup ware
house. The availability of data mart also affect on security
of information. In case of large no of data marts the data
divide in more parts and store different parts in different
data marts. Each data marts have very small part of
information. If any data mart is hacked by attacker then it
can take only small part of information.
4. RESULT AND DISCUSSIONS


Figure.3 Purposed system working architecture

In this system client send data to cloud provider for
storing it. The cloud provides receive data from client and
perform advance encryption on it. After performing
encryption full copy of data stores on data warehouse for
backup. After full backup, performing replication divide
the data in parts according to the availability of data
marts. In purposed system use three data marts (S1, S2,
S3) for increasing privacy and availability of clients data.
The clients data store on backup warehouse and then
divide the data in three parts P1, P2, P3 and store on
respective data marts S1, S2, S3. If any data mart lost the
part of clients data then it can reload from backup
warehouse. In this way replication of clients data on
different data mart increase the availability of information
as well as enhance the security of information. This
makes difficult job of the attackers, both inside and
outside attackers. The insider attacker refers as employee
that works under organization which is responsible
securing and storing the clients information. If any data
mart hack by an attacker then it can access the only part
of information, for full information there is need to apply
attacks on other data marts.
The data mart is crashes or down also impact on the
availability of information. The purposed system also
removes that drawback. If any data mart is crashes or
down then clients request also able to extract the data
from backup warehouse.
In this scenario data mart S1 is fail and not responding
the user request. In this case the part of information P1 is
lost. The purposed system allow user to extract the
information from backup ware house. The availability of
data mart also affect on security of information. In case of
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March April 2014 ISSN 2278-6856


Volume 3, Issue 2 March April 2014 Page 254


large no of data marts the data divide in more parts and
store different parts in different data marts. Each data
marts have very small part of information. If any data
mart is hacked by attacker then it can take only small part
of information.

5. Conclusion
In this paper, we have outlined the general principles of
new approach to perform secure replication on stored
information. This is a dominant technique which will
provide better results for security and availability of
information. We can use this secure replication technique
in order to build a secure and reliable distributed storage.
We expect the enhancement done in this technique will
increase the quality by different data mart host with cloud
provider and store information according to its sensitivity.
This new technique that we have developed can be
applicable in different cloud providers companies and
financial organizations etc.

REFERENCES
[1] Gupta Sarika, Sangita Rani Satapathy, Mehta Piyush
and Tripathy Anupam, A Secure and Searchable
Data Storage in Cloud Computing, 3rd IEEE
International Advance Computing Conference
(IACC), 2013, page 106-109.
[2] Liu Hao, Dezhi Han, The study and design on
secure-cloud storage system, In IEEE society, 2011,
page 5126-5129.
[3] Dev Himel, Sen Tanmoy, Basak Madhusudan and
Eunus Ali Mohammed, An Approach to Protect the
Privacy of Cloud Data from Data Mining Based
Attacks, SC Companion: High Performance
Computing, Networking Storage and Analysis, 2012,
page 1106-1115.
[4] Henry C. H. and Patrick P. C. Lee, Enabling Data
Integrity Protection in Regenerating-Coding-Based
Cloud Storage, 31st International Symposium on
Reliable Distributed Systems, 2012, page 51-60
[5] Taeho Jung, Xiang-Yang, Zhiguo Wan, Meng Wan,
Privacy Preserving Cloud Data Access With Multi-
Authorities, Proceedings IEEE INFOCOM, 2013,
page 2625-2633.
[6] Julian Jang-Jaccard, A vnish Manraj and Nepal
Surya, Portable Key Management Service for Cloud
Storage, 8th International Conference on
Collaborative Computing: Networking, Applications
and Worksharing, 2012, page 147-156.
[7] Gupta Arjun Kumar, Byung Gook Lee, HoonJae Lee
and Anu Kumari, Secure Storage and Access of
Data in Cloud Computing, In IEEE society, 2012,
page 336-339.
[8] Shakeel Ahlam Ansari Ahmed and Devadkar Kailas
Kisan, Secure Cloud Mining IEEE International
Conference on Computational Intelligence and
Computing Research, 2012.
[9] Slamanig Daniel, Hanser Christian, On Cloud
Storage and the Cloud of Clouds Approach, The 7th
International Conference for Internet Technology and
Secured Transactions, 2012, page 649-655.


AUTHOR

Subeg Singh received the M.Tech. degrees in
Computer Science and Engineering from
Lovely Professional University in 2012 and
2014, respectively. During 2012-2014, he
stayed in Research Laboratory of India to study advanced
data security and data replication techniques along with
its applications.

You might also like