International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March – April 2014 ISSN 2278-6856
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 251
Abstract: Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less secure because data remain under a single data mart. This can lead to data loss due to different causes like hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud provider, try to have access to the clients information. This makes an easy job of the attackers, both inside and outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat concerning data mining on cloud, so in this paper present the secure replication approach that encrypt and replicate the data in distributed data mart storage system. This approach involves the encryption, replication and storage of data.
Keywords: computing, cloud storage, replication, security, data mart.
1. INTRODUCTION Cloud computing is technology that provides the different services at very low cost. The different client stores data on Cloud storage. Cloud computing provides storage for storing the information and provides the security of that information. Cloud service models are infrastructure as a service, platform as a service and software as a service. Cloud services are provided by different famous organizations like Google, Amazon and Microsoft etc. By using these services the client avoid the cost of buying extra resources. Cloud services provide the high computation capacity at low cost. The various data analysis techniques which are used for extracting valuable information from a large volume of data. These different techniques are used by Cloud service provider like Google uses the technique for identifying the user behavior on the basis of search behavior. In previous trend data to store on a single cloud the attacker applies an attack on it and accesses the information which is stored by the client on Cloud storage. If the client is an organization related to healthcare, shopping etc then there is big loss of information access by attackers, so distributed environment handles such kind of problem. The distributed data mart storage is service which is provided by cloud service provider. In Distributed Cloud storage, the information is stored from different kind of devices they only pay for storage as per usage.
Figure 1 Cloud storage system
The previous figure indicates cloud storage stores the information from different devices and these devices can access the information on demand at any time. Here purposes a secure approach that replicates the clients data and store on different data mart. Before replication, full copy of encrypted information stores on data warehouse for increasing the availability of information. It will increase the reliability and privacy of data.
A. Cloud storage Cloud storage is a network of online storage, generally managed by third parties. On cloud the data is stored in virtualized pools of storage. Hosting companies operate large data centres and lease their storage. And companies, organizations and institutes who require their data to be hosted buy or lease storage capacity from hosting companies. In the background, the storage operator virtualizes the resources as per the requirements of the customer and exposes them as storage pools. The customers can store files or data objects over the cloud storage. The resource may physically span across multiple servers and data may be stored at different places on the cloud. One needs to pay only for the amount of storage that data consumes. The advantage of using cloud storage over dedicated storage is that the storage is delivered on demand. Secure Replication management in cloud storage
Subeg Singh 1 , Richa Sapra 2
1 Lovely Professional University, Department of Computer Science and Engineering, J alandhar-Phagwara Road, Punjab, India
2 School of Computer Science and Engineering, Lovely Professional University, J alandhar-Phagwara Road, Punjab, India International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 252
B. Distributed storage For avoiding the disadvantage of storing all data of a client to the single data mart, data can be split into chunks and distributed among multiple data marts. In a distributed environment, an attacker chooses a specific client but the distribution of data into multiple data marts, this makes attacker job more difficult. In purposed system, the distributed environment represents by different data marts that placed on different places. Different data marts store the clients information after encryption, replication. Data warehouse also stores the full copy of clients information for increasing the availability of information. If any data mart lost the part of clients information due to hardware and software failure then it can copy of information from backup data warehouse.
2. RELATED WORK The cloud provider provides a secure and reliable access to data owner. The purposed search technique is more efficient than previous search techniques. Trust is the main thing between the service provider and data owner, but when the trust is breached then there is a big problem. This paper suggests the technique where the trust from a service provider is not required. The data owners also have the responsibility of security of data. The tool is used for security which decides the access right for other persons. The data owner searches the data from encrypted data bases the search is based on rank keyword. The ranked keyword base search reduces the overhead of the data owner because there is no need to go through from each file. In this technique, the server site is only responsible for the search operation all other responsibilities are taken by the data owner [1]. The responsibility of cloud provider is provides a security to client. For the security issue in cloud storage systems, this paper describes the concept of secure cloud storage system; data security means how to save data in the cloud. Cloud security storage system also connects control interface. The authorized users can safely access the data in the Cloud secure storage system. This system can give data protection and multilevel storage in private enterprise cloud. The developed secure-cloud storage system is improved and perfect stage, and need go through the process of improving. Cloud security storage system is responsible for clients information. Sometimes the clients information is very sensitive then the cloud security storage system provides the security. The cloud security storage system is mostly adopted by different companies. Therefore, this project is supposed to create good social and economic benefits [2]. The cloud computing is computing technique and software services are delivered to the clients according to the requirement. Because of its greater level of flexibility, cloud technology is mostly adopted by different organizations. The cloud storage provides high flexibility to cloud user this also leads risk of the security and privacy of users data. This is a big problem for many clients of cloud. In this paper, we first identify the data mining based privacy risks on cloud data and also propose a distributed architecture to reduce the risks. In this paper, proposed a distributed structure to eliminate mining based privacy threat on cloud data. This paper purposes an approach which includes categorization, fragmentation and distribution, secure data mining by maintaining privacy levels, splitting data into in to different small chunks and storing these chunks of data to appropriate cloud providers according to the clients requirement. It will increase the private level of data. The purposed system basically has a two major components one is cloud data distributor and other is cloud provider. The cloud data distributor plays a role as an intermediate between the data owner and cloud provider. Cloud data distributor receives the files from the data owner and split into small parts and fits into different chunks and then distribute among various cloud provider for storing purpose. But in this paper, the data owner overhead is increased because if data owner wants to analyze all data then the entire data from distributing cloud storage. This paper also suggests future work to improve our system by reducing such overhead. [3]. The data integrity protection in code base cloud storage. A major limitation of the previous schemes (like PDP etc.) is that they are designed for a single server. If the server is controlled, then these schemes can only provide detection of corrupted data, but cannot recover the original data. So this paper purposes the design of efficient data checking schemes in a multi server setting. By striping redundant data across multiple servers, the original files can be recovered. This paper provides the additional feature to clients from recent approaches. This approach is responsible for recover the original data. The provide protection data in cloud storage against corruptions, and provide integrity protection and recovery for cloud storage is difficult task. By striping data across multiple servers we provide the facility to data owners. The erasure codes technique is using during failure recovery. In this paper implement a practical data integrity protection (DIP) scheme for a specific regenerating code. It works under the simple assumption of thin-cloud storage and allows different parameters to be fine for the security.
3. MATERIAL AND METHODOLOGIES
3.1Working of Proposed Architecture The process is carried out as follows:-
Step1: Client sends data to cloud provider for storing. Step2: cloud provides receive data and perform encryption. Step3: full copy of encrypted data stores on data warehouse. Step4: After backup, performing replication and divide the data in parts according to the availability of data marts (in our system use three data marts S1, S2, S3) International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 253
Step5: Storing the different part of information on different data mart. Step6: Repeat Steps as per storing request.
A. Proposed Architecture
Fig.2 Secure replication system architecture
B. Recovery of Lost Information
1) Software failure In case of software failure data mart loss the information of particular client duo to different causes like network down, file outage etc. Data mart takes the copy from backup warehouse. It increases the availability of information. Data mart S1 loss the information P1, then it can take information S1 from backup warehouse and reconfigure it. If data mart S2 and S3 lost the information then they can also able to recover the information from backup ware house.
2) Hardware failure The data mart is crashes or down also impact on the availability of information. The purposed system also removes that drawback. If any data mart is crashes or down then clients request also able to extract the data from backup warehouse. In Purposed scenario data mart S1 is fail and not responding the user request. In this case the part of information P1 is lost. The purposed system allow user to extract the information from backup ware house. The availability of data mart also affect on security of information. In case of large no of data marts the data divide in more parts and store different parts in different data marts. Each data marts have very small part of information. If any data mart is hacked by attacker then it can take only small part of information. 4. RESULT AND DISCUSSIONS
Figure.3 Purposed system working architecture
In this system client send data to cloud provider for storing it. The cloud provides receive data from client and perform advance encryption on it. After performing encryption full copy of data stores on data warehouse for backup. After full backup, performing replication divide the data in parts according to the availability of data marts. In purposed system use three data marts (S1, S2, S3) for increasing privacy and availability of clients data. The clients data store on backup warehouse and then divide the data in three parts P1, P2, P3 and store on respective data marts S1, S2, S3. If any data mart lost the part of clients data then it can reload from backup warehouse. In this way replication of clients data on different data mart increase the availability of information as well as enhance the security of information. This makes difficult job of the attackers, both inside and outside attackers. The insider attacker refers as employee that works under organization which is responsible securing and storing the clients information. If any data mart hack by an attacker then it can access the only part of information, for full information there is need to apply attacks on other data marts. The data mart is crashes or down also impact on the availability of information. The purposed system also removes that drawback. If any data mart is crashes or down then clients request also able to extract the data from backup warehouse. In this scenario data mart S1 is fail and not responding the user request. In this case the part of information P1 is lost. The purposed system allow user to extract the information from backup ware house. The availability of data mart also affect on security of information. In case of International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 3, Issue 2, March April 2014 ISSN 2278-6856
Volume 3, Issue 2 March April 2014 Page 254
large no of data marts the data divide in more parts and store different parts in different data marts. Each data marts have very small part of information. If any data mart is hacked by attacker then it can take only small part of information.
5. Conclusion In this paper, we have outlined the general principles of new approach to perform secure replication on stored information. This is a dominant technique which will provide better results for security and availability of information. We can use this secure replication technique in order to build a secure and reliable distributed storage. We expect the enhancement done in this technique will increase the quality by different data mart host with cloud provider and store information according to its sensitivity. This new technique that we have developed can be applicable in different cloud providers companies and financial organizations etc.
REFERENCES [1] Gupta Sarika, Sangita Rani Satapathy, Mehta Piyush and Tripathy Anupam, A Secure and Searchable Data Storage in Cloud Computing, 3rd IEEE International Advance Computing Conference (IACC), 2013, page 106-109. [2] Liu Hao, Dezhi Han, The study and design on secure-cloud storage system, In IEEE society, 2011, page 5126-5129. [3] Dev Himel, Sen Tanmoy, Basak Madhusudan and Eunus Ali Mohammed, An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks, SC Companion: High Performance Computing, Networking Storage and Analysis, 2012, page 1106-1115. [4] Henry C. H. and Patrick P. C. Lee, Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage, 31st International Symposium on Reliable Distributed Systems, 2012, page 51-60 [5] Taeho Jung, Xiang-Yang, Zhiguo Wan, Meng Wan, Privacy Preserving Cloud Data Access With Multi- Authorities, Proceedings IEEE INFOCOM, 2013, page 2625-2633. [6] Julian Jang-Jaccard, A vnish Manraj and Nepal Surya, Portable Key Management Service for Cloud Storage, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2012, page 147-156. [7] Gupta Arjun Kumar, Byung Gook Lee, HoonJae Lee and Anu Kumari, Secure Storage and Access of Data in Cloud Computing, In IEEE society, 2012, page 336-339. [8] Shakeel Ahlam Ansari Ahmed and Devadkar Kailas Kisan, Secure Cloud Mining IEEE International Conference on Computational Intelligence and Computing Research, 2012. [9] Slamanig Daniel, Hanser Christian, On Cloud Storage and the Cloud of Clouds Approach, The 7th International Conference for Internet Technology and Secured Transactions, 2012, page 649-655.
AUTHOR
Subeg Singh received the M.Tech. degrees in Computer Science and Engineering from Lovely Professional University in 2012 and 2014, respectively. During 2012-2014, he stayed in Research Laboratory of India to study advanced data security and data replication techniques along with its applications.