You are on page 1of 25

A

Presentation on Topic
“Encrypted Cloud Service”
“BBDNITM(054)”
Presented To: Presented By:
BBDNITM 1. Abhinav Chowdhury (1605410006)
(CSE) 2. Kailash Chandra (1605410067)
3. Abhijeet Kumar Mishra (1605410005)
Department
4. Amar Nath Chaudhary (1605410019)
5. Abhishek Anand (1605410007)
Content
 Introduction
 Objective
 Existing System
 Proposed system
 System Modules
 Encryption Algorithms
 Literature survey
 Conclusion
 References
Introduction
As organizations and individuals adopt cloud technologies, many have become aware of the serious

concerns regarding security and privacy of accessing personal and confidential information over the
Internet .Database outsourcing to clouds provides users and companies with powerful capabilities to
store and process their data in third-party machines managed by a cloud service provider. However, the
privacy of the outsourced data is not guaranteed as users typically loose physical access control to their
data. In particular, the recent and continuing data breaches highlight the need for more secure cloud
storage systems.
While it is generally agreed that encryption is necessary, cloud providers often perform the encryption
and maintain the private keys instead of the data owners. That is, the cloud can read any data it desired,
providing no privacy to its users. The storage of private keys and encrypted data by the cloud provider is
also problematic in case of data breach. Hence, researchers have actively been exploring solutions for
secure storage on private and public clouds where private keys remain in the hands of data owners.
The most popular solution to protect outsourced data is to encrypt the data before outsourcing to the
cloud. This solution introduces the problem of how to evaluate user queries over the encrypted
Objective
The main objective in this process is a widely used technique for data privacy
protection is to encrypt data before outsourcing to the cloud servers.

The cloud server randomly traverses index and returns different results for the
keyword, and in the meantime, it maintains the accuracy for higher security.

 We present both efficient and secure searchable encryption scheme, which can
support top-K similarity search over encrypted data.

We present both efficient and secure searchable encryption scheme, which can
support top-K similarity search over encrypted data. In this scheme, the data
owner
can control the level of query unlink ability without sacrificing accuracy
Existing System
 Since security is a major concern in the cloud, it is of great importance for
our Smart-Frame to provide a solution to address that.
 Under traditional public key cryptography, each participating entity must
locate and verify the public keys of the receivers.
 This is especially burdensome for end user devices in our Smart-Frame,

which are usually assumed as limited in networking capacity.


Disadvantages of Existing
System
Less data security.

No user authentication for example-OTP

Less data capacity

Not Use Encryption Algorithms


Proposed System
We have proposed a system with following objectives.

To understand the security issues related with cloud storage.

 To provide high quality services to the users.

To provide high data security in cloud based environment using


encryption and decryption technique.
Advantages of Proposed
System
It provides secure communication services.

It provides confidentiality and privacy to the user.

 high data security in cloud based environment


using encryption and decryption technique.
System Architecture
Interface design-describes the structure and
organization of the user interface. Includes a
representation of screen layout, a definition of
the modes of interaction, and a description of
navigation mechanisms. Interface Control
mechanisms- to implement navigation options,
the designer selects form one of a number of
interaction mechanism;
a. Navigation menus
b. Graphic icons
c. Graphic images

 Aesthetic design-also called graphic design,


describes the “look and feel” of the WebApp.
Includes color schemes, geometric layout.
Text size, font and placement, the use of
graphics, and related aesthetic decisions.
MVC Architecture
Content design-defines the layout, structure,
and outline for all content that is presented as
part of the WebApp. Establishes the
relationships between content objects.
Navigation design-represents the navigational
flow between contents objects and for all
WebApp functions.
Architecture design-identifies the overall
hypermedia structure for the WebApp.
Architecture design is tied to the goals establish
for a WebApp , the content to be presented, the
users who will visit, and the navigation
philosophy that has been established.
Component design-develops the detailed
processing logic required to implement
functional components.
Database As Service
Database as a Service (DAS) is a database
management concept in which the data owner
stores her data in a cloud, and delegates the
responsibility of administering and managing
the data to the cloud.
 This paradigm alleviates the need of
installing data management software and
hardware, hiring administrative and data
management crew (personnel) at the company’s
site.
 Thus, the data owner can concentrate on her
core business logic rather than on the tedious
job of data management.
 Examples of DAS providers are: Amazon,
IBM and Google.
System Modules-1
1. Admin Modules
 Login
 User Details
 Add User
 Edit User
 Delete User
 View User Details
 Cloud Details
 View Details
 Hash Tag
 View Hash Tags
 Transaction Details
 Select User
 View log Details
 Sign Out
Admin Use Case Diagram
System Modules-2
2. User Modules
 Login
 Show Profile
 Upload a File
User has to select the file from the local system
File is break into blocks
Encryption and Rank Generation
For Each Block generate rank.
Check for the Presence of Rank for each block in Integrity Management
If present than make the link with exiting block else store the block in cloud

storage and insert a new record in Integrity Management.


 Insert a Transaction Record
 Show Upload Successful Message to user
User Use Case Diagram

USER
System Modules-3
 Download a File
View details of all the uploaded file
User has to select the file to download and initiate the
download process
Retrieve the Key.
Get the block storage details in cloud
Download all the blocks
Integrity Check
Generate the Hash key for all the files.
Compare the Hash key of the file with Hash Tags in Table.
If Hash Keys Comparison pass for all the file then merge the blocks and
download the file to the user system Else show Integrity Check file
message
to the user.
 Transaction
 Sign out
Flow Chart
Context Analysis Diagram
Technique and Algorithms
 The key generation algorithm.

 The encryption algorithm.

 The decryption algorithm.

 The Hash Key generation algorithm.


LITERATURE SURVEY
Cloud computing encompasses on demand reliable services provided over the Internet (typically
represented as a cloud) with easy access to virtually infinite computing, storage and networking resources.
Through very simple Web interfaces and at small incremental cost, users can outsource complex tasks, such
as data storage, system administration, or application deployment, to very large data centers operated by
cloud providers. Thus, the complexity of managing the software/hardware infrastructure gets shifted from
the users’ organization to the cloud provider. However, outsourcing sensitive data to a cloud provider, using
Database-as-a-Service (DaS), has a main problem: how to preserve the privacy of the outsourced data,
which may be violated by cloud employees for instance, while processing the user’s queries . The popular
solution is to encrypt the data before outsourcing it to the cloud. Then, the challenge is to answer user
queries over encrypted data. A naive solution is to retrieve the encrypted database from the cloud to the
client machine, decrypt it, and then evaluate the query over plaintext (non encrypted) data. This solution is
not practical, as it does not take advantage of the power provided by the cloud computing resources for
evaluating queries. In this thesis, we consider an important kind of queries, top-k queries, and address the
problem of privacy-preserving top-k query processing over encrypted data in the cloud.
The cloud service provider is assumed to be honest but curious. This model is well adapted to the
problem of query processing in the cloud as the cloud providers are not malicious attackers who can
change the protocols or user data, but they may be interested to learn more information about the users
by accessing their data. However, this may violate the privacy of users. Privacy preservation is one of the
main requirements to ensure data security in the cloud. Many users pay more attention to their privacy
protection when they access cloud data or use cloud services. In particular, they expect to hide their
identity while using the cloud. Some users also want their operations on the data and the information
retrieved from a cloud to be properly protected. Privacy preservation should ensure that all critical and
sensitive data must be masked or encrypted and that only authorized users have access to data in its
entirety. We focus on top-k queries, which have attracted much attention in several areas of information
technology such as sensor networks, data stream management systems, crowd sourcing, spatial data
analysis, temporal database, graph databases etc. A top-k query allows the user to specify a number k,
and the system returns the k tuple which are most relevant to the query. The relevance degree of tuple to
the query is determined by a scoring function. Given a database composed of lists of data items, each
data item has a local score in each list. The scoring function f is a function that calculates an overall score
for each data item. As a simple example of top-k query, consider a university that outsources the students
database to the cloud, with non-trusted nodes. The database is encrypted for privacy reasons. Then, an
interesting top-k query over the outsourced encrypted data is the following: return the k students that
have the worst averages in some given courses. There are several approaches for processing top-k queries
over plaintext (non-encrypted) data.
CONCLUSION
 A secure multi-keyword search scheme over encrypted cloud data that supports dynamic update
operations such as deletion and document insertion simultaneously.
 The cloud server runs through various paths on the index, and in the meantime the data user
receives different results but with the same high level of query accuracy.
 Keyword-based searching in many database and information retrieval applications is such a
widely used data operator, and its traditional processing methods can not be applied directly to
encrypted data . Thus, how to process such queries over encrypted data while ensuring data
privacy at the same time.
 Then, in order to improve the search efficiency, we design the group multi-keyword top-k search
scheme, which divides the dictionary into multiple groups and only needs to be stored in the
sense that you don't need to give the exact filename to download the file, if you give the
maximum number of repeated words, that time will also download the original file in decrypted
format.
 This helps keep the files in the cloud secure.
REFERENCES
 [1]J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, and R. Buyya, “Ensuring security and
privacy preservation for cloud data services,” ACM Computing Surveys, 2016.
[2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G.
Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud
computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
[3] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric
encryption: Improved definitions and efficient constructions,” in Proceedings of
the 13th ACM Conference on Computer and Communications Security. ACM,
2006, pp. 79–88.
[4] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key
encryption with keyword search,” in Advances in Cryptology- Eurocrypt 2004.
Springer, 2004, pp. 506–522.
 [5] E.-J. Goh et al., “Secure indexes.” IACR Cryptology ePrint Archive, vol.
2003, p. 216, 2003.
 [6] Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches
on remote encrypted data,” in Applied Cryptography and Network Security.
Springer, 2005, pp. 442–455.
 [7] Y. H. Hwang and P. J. Lee, “Public key encryption with conjunctive
keyword search and its extension to a multi-user system,” in Pairing-Based
Cryptography–Pairing. Springer, 2007, pp. 2–22.
 [8] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search
over encrypted data,” in Applied Cryptography and Network Security. Springer,
2004, pp. 31–45.
 [9] L. Ballard, S. Kamara, and F. Monrose, “Achieving efficient conjunctive
keyword searches over encrypted data,” in Information and Communications
Security. Springer, 2005, pp. 414–426.
 [10] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on
encrypted data,” in Theory of cryptography. Springer, 2007, pp. 535–554.
Thank you ..!!

You might also like