You are on page 1of 22

Department of Computer Science and Engineering

A Three-Layer Privacy Preserving Cloud Storage Scheme


based on Fog Computing

Presented By: Project Coordinator:

Name :- M. Ravi kumar Dr. Antonidoss


R.no :- 20254002 Associate Professor
M.Tech :- C.S.E-AI
Agenda
• Abstract
• Introduction
• Literature Review
• Objective
• Existing System
• Proposed System
• Module diagram
• Requirements
• Conclusion
• Reference
Abstract
● The computer technology has developed rapidly. Cloud computing has gradually matured
through so many people’s efforts.

● In current storage schema, user’s data is totally stored in cloud servers. In other words, users
lose their right of control on data and face privacy leakage risk.

● we propose a three-layer storage framework based on fog computing. The proposed


framework can both take full advantage of cloud storage and protect the privacy of data.

● Besides, Hash-Solomon code algorithm is designed to divide data into different parts. Then,
we can put a small part of data in local machine and fog server in order to protect the privacy.

● Moreover, based on computational intelligence, this algorithm can compute the distribution
proportion stored in cloud, fog, and local machine, respectively.
Introduction

● Since the 21st century, computer technology has developed rapidly. Cloud computing, an emerging
technology, was first proposed in SES 2006 (Search Engine Strategies 2006) by San Jose and defined by
NIST (National Institute of Standards and technology).

● With the rapid development of network bandwidth, the volume of user’s data is rising geometrically.
User’s requirement cannot be satisfied by the capacity of local machine any more. Therefore, people
try to find new methods to store their data. Pursuing more powerful storage capacity, a growing
number of users select cloud storage.

● However, cloud storage service still exists a lot of security problems. The privacy problem is particularly
significant among those security issues

● In order to protect user’s privacy, we propose a TLS framework based on fog computing model.

● The TSL framework can give user a certain power of management and effectively protect user’s privacy.
Literature Review

Sno Name of the Title Author Name Year of publication Inferences

[1]

[2]
Literature Review

Sno Name of the Title Author Name Year of publication Inferences

[3]

[4]
Objective

● The main objective of this paper is to give a proper secure storage of user data to prevent data loss
and information leakage of the user.
Existing system
● Recent years witness the development of cloud computing technology. With the explosive growth of
unstructured data, cloud storage technology gets more attention and better development.

● However, in current storage schema, user’s data is totally stored in cloud servers. In other words,
users lose their right of control on data and face privacy leakage risk.

● Traditional privacy protection schemes are usually based on encryption technology, but these kinds of
methods cannot effectively resist attack from the inside of cloud server.
Disadvantages Of Existing System

• All of these solutions cannot solve the internal attack well, no matter how the algorithm improves.

• These encryption make search in cloud more difficult.

• Once the CSP is untrusted, all of these schemes are invalid.

• They cannot resist internal attacks or prevent the CSP from selling user’s data to earn illegal profit.
The private data will be decoded once malicious attackers get it no matter how advanced the
encryption technologies are because user’s data was integrally stored in cloud server.
Proposed System

● we propose a three-layer storage based on fog framework computing.

● The proposed framework can both take full advantage of cloud storage and protect the privacy of
data.

● Besides, Hash-Solomon code algorithm is designed to divide data into different parts. Then, we can
put a small part of data in local machine and fog server in order to protect the privacy.

● Moreover, based on computational intelligence, this algorithm can compute the distribution
proportion stored in cloud, fog, and local machine, respectively.

● The introduction of fog computing can relief the cloud computing layer, improving the work efficiency.
Advantages Of Proposed System

• Our scheme can provide a higher privacy protection

• By reasonable allocation of the data, our scheme can really protect the privacy of user’ data. The
Hash-Solomon code needs complex calculation, which can be assisted with the Computational
Intelligence (CI).
Module description
Our Project consists of the following modules :

• System Construction
• Data Fragmentation
• Block Generation
• Download Procedure
-> System Construction
• In the first module we develop the System Construction module, to evaluate and implement
a three-layer storage framework based on fog computing. For this purpose we develop User
and Cloud entities. In User entity, a user can upload a new File, Update uploaded File blocks and
a user can deduplicate other users File by using deduplicatable dynamic proof of storage.

• The security degree is an important metric to measure the quality of cloud storage system.
Furthermore, data security is the most important part in cloud storage security and it includes
three aspects: data privacy, data integrity and data availability.

• Our system model considers two types of entities: the cloud server and users. For each
file, original user is the user who uploaded the file to the cloud server, while subsequent user is
the user who proved the ownership of the file but did not actually upload the file to the cloud
server.
(cont..)
• In the Cloud entity, the cloud first check login authentication of users and then it gives
permission for deduplication process for authenticated users and users datas are stored in
blocks.

• The asymptotic performance of our scheme in comparison with related schemes, where n
denotes the number of blocks, b denotes the number of the challenged blocks, and |m|
denotes the size of one block. From the table, we observe that our scheme is the only one
satisfying the cross-user deduplication on the client-side and dynamic proof of storage
simultaneously. Furthermore, the asymptotic performance of our scheme is better than the
other schemes except which only provides weak security guarantee.
-> Data Fragmentation
• In this module, we develop the Data Fragmentation. Compromising a single file will require the effort
to penetrate only a single node. The amount of compromised data can be reduced by making
fragments of a data file and storing them on separate nodes. A successful intrusion on a single or few
nodes will only provide access to a portion of data that might not be of any significance.

• Moreover, if an attacker is uncertain about the locations of the fragments, the probability of finding
fragments on all of the nodes is very low. Therefore, we fragment the given Data file and upload in
the Cloud so that no attacker will obtain the data file. In cloud systems, the probability for an attacker
to obtain a considerable amount of data, reduces significantly. However, placing each fragment once
in the system will increase the data retrieval time.

• To improve the data retrieval time, fragments can be replicated in a manner that reduces retrieval
time to an extent.
-> Block Generation
• In this module, we develop the Block Generation process. In the update phase, users may modify,
insert, or delete some blocks of the files. Then, they update the corresponding parts of the encoded
files and the authenticated structures in the cloud server, even the original files were not uploaded by
themselves. Note that, users can update the files only if they have the ownerships of the files, which
means that the users should upload the files in the upload phase or pass the verification in the
Deduplication phase.

• Though we can create n-blocks in this module, we split the files into 3 Blocks. The Blocks for files are
divided equally accordingly and then the blocks are uploaded in the Cloud Server too.
-> Download Procedure
• When user wants to download his file from the cloud server, the procedure is implemented in this
module. Firstly, cloud server receives user’s request and then integrates the data in different
distributed servers. After integration, cloud server sends the 95% data to the fog server.

• Secondly, the fog server receives the data from the cloud server. Combining with the 4% data blocks
of fog server and the encoding information, we can recover 99% data. Then the fog server returns the
99% data to the user. Thirdly, the user receives the data from fog server. User can get the complete
data by repeating the above steps.
Module diagram
Requirements

Hardware Requirements :

• Processor : Pentium Dual Core


• Hard Disk : 250 GB
• Ram : 4 GB

Software Requirements :

• Operating system: Windows 7.


• Coding Language : JAVA/J2EE
• Tool : Netbeans 7.2.1
• Database : MYSQL
Conclusion

● The development of cloud computing brings us a lot of benefits.

● Cloud storage is a convenient technology which helps users to expand their storage capacity. However, cloud
storage also causes a series of secure problems.

● When using cloud storage, users do not actually control the physical storage of their data and it results in the
separation of ownership and management of data.

● In order to solve the problem of privacy protection in cloud storage, we propose a TLS framework based on
fog computing model and design a Hash-Solomon algorithm. Through the theoretical safety analysis, the
scheme is proved to be feasible.

● The data can be stored in different blocks like cloud server, fog server, local machine and the code or data will
be in the encode matrix.

● Cracking the encode matrix is impossible theoretically. So, the attacker cannot get the users information easily.
References

● J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloudassisted urban data sharing framework for
ubiquitous-cities,” Pervasive Mobile Comput., vol. 41, pp. 219–230, 2017.

● Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, “Privacy- preserving smart semantic search based on
conceptual graphs over encrypted outsourced data,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 8,
pp. 1874–1884, Aug. 2017.

● G. Feng, “A data privacy protection scheme of cloud storage,” vol. 14, no. 12, pp. 174–176, 2015.

● Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced
data with efficiency improvement,” IEEE Tr ans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546–2559,
Sep. 2016.

● Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multikeyword ranked search scheme
over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.
THANK YOU

You might also like