17-10-2016, 03:01 PM
1459445616-finaldoc.docx (Size: 232.17 KB / Downloads: 5)
Abstract
Cloud Computing is the fundamental change happening in the field of information technology. It is a representation of a movement towards the intensive, large scale specialization. On the other hand, it brings about not only convenience and efficient problems, but also great challenges in the field of data security and privacy protection. Currently, security has been regarded as one of the greatest problem in the development of cloud computing. This paper describes the great requirements in cloud computing, such as security key technology, standard and regulation etc., and discusses ways in which they may be addressed.
In this model using privacy preserving delegated access control mechanism. In this model describes how to provide access policies of users and how to provide security for data in cloud server. This model describes easily identify the misbehavior users or intruders. Using this mechanism only authorized persons using the services from cloud server. Unauthorized users not possible to access the cloud server services.
In this proposed system using Privacy preserving delegated access control mechanism. In this mechanism three users in system. Admin, data owner and customer. Admin create cloud servers and create cloud admin for each cloud server. User registered in particular domain. Based on that domain user accessing files from cloud server. Only registered domain files are downloaded. If user want access files from another domain. It is not possible. In that situation user is unauthorized person. Based on this mechanism easily provide access policies for cloud admin and customers in cloud computing.
Introduction
1.1 Project Introduction:
In this model using privacy preserving delegated access control mechanism. In this model describes how to provide access policies of users and how to provide security for data in cloud server. This model describes easily identify the misbehavior users or intruders. Using this mechanism only authorized persons using the services from cloud server. Unauthorized users not possible to access the cloud server services.
1.2 Functional Specification:
Admin functionalities
In this admin module admin create new data owners, new servers and assign data owner to server
Next check for requested files details and
Give permission to files downloading
Data owner functionalities
In this module data owner add new files and upload files to drivehq.com cloud server
Next check for user details and requested files are forward to admin
Again admin accepted files details are forward to user for downloading
User Functionalities
In this user module new user registered into system
Security key is send to user mail id
User enter security key and login into system
Send the request to particular registered domain files
After getting permission from data owner download that particular files
1.3 Problem Description:
In present scenario all cloud computing applications there is no particular privacy for policies and data in cloud.
Provide security it is a time taking process
Lots amount of time required to user accessing services from cloud server
There is no accuracy in cloud server services
There is a chance for getting intruders also accessing the services
There is no accuracy in data and privacy
Software Requirement Specification
In this section discuss about what existing system is and what drawbacks of existing system are. What is proposed system and what are drawbacks of proposed system.
2.1 Existing System
In present systems to provide security in cloud computing by using Attribute based encryption techniques and identity based encryption techniques but implementation of these techniques are very complex and these take long time to implementation. It contains so many calculations and equations and all.
2.2 Drawbacks of Existing system
1. There is more time required to user getting services from cloud server
2. There is no security for data in cloud server
2.3 Proposed System:
In this proposed system using Privacy preserving delegated access control mechanism. In this mechanism three users in system. Admin, data owner and customer. Admin create cloud servers and create cloud admin for each cloud server. User registered in particular domain. Based on that domain user accessing files from cloud server. Only registered domain files are downloaded. If user want access files from another domain. It is not possible. In that situation user is unauthorized person. Based on this mechanism easily provide access policies for cloud admin and customers in cloud computing.
2.4 Advantages of proposed system
1. Less time required to access services from cloud server
2. There is no chance to get intruders in system
3. Maintain 100% accuracy
2.5 Functional requirements:
1. Admin Create n sub servers
2. All servers are connect to drivehq.com
3. First admin upload files
4. Uploaded files are stored in main cloud drive.com
5. If user wants to download files verify the user details
6. If verification successful download file from cloud server
7. User possible to download only registered domain files
8. User not possible to download other domain files
9. Based on domain/category user accessing services from cloud server
10. In this system implemented by real cloud server drivehq.com
2.6 Software Requirements:
• Operating system : - Windows XP.
• Coding Language : JAVA
2.7 Hardware Requirements:
Recommended requirements are
Processor : Intel Pentium III or AMD
RAM : 256 MB
Disk space : 100 MB
Chapter 3
Implementation
3.1 MODULES:
Admin module
Data Owner Module
User module
Privacy preserving delegation control module
3.2 MODULE DESCRIPTION:
3.2.1 Admin module:
In this admin module admin create new data owners, new servers and assign data owner to serverNext check for requested files details and Give permission to files downloading. Admin want edit profile details edit the details and change the password. Next check for cloud servers details and uploaded files details and data owner details and create categories and sub categories in data storage in cloud server.
3.2.2 Data Owner Module
In this module data owner add new files and upload files to drivehq.com cloud server. Next check for user details and requested files are forward to admin. Again admin accepted files details are forward to user for downloading. Data owner check for uploaded files in cloud server and provide access policies for that files. That means which files belongs to which category is assigned by cloud data owner.
3.2.3 User module
In this user module new user registered into system. Security key is send to user mail id. User enters security key and login into system. Send the request to particular registered domain file. After getting permission from data owner download that particulat files
3.2.4 Privacy preserving delegation control module
In this module finally provide access policies for admin, data owner and user. Next provide security for data in cloud computing. User wants to get encrypted file. If user is authorized decrypt the data and show the original data for user. Finally in overall system access control and security of data everything is controlled by using privacy delegated access mechanism in cloud computing.
Conclusion and Future Scope
6.1 Conclusion
In this paper discuss about implementation of privacy preserving delegated access mechanism. By using this technique provide security for data in cloud server and provide privacy access controlling of users in system. By using this mechanism only authorized users using the services from cloud server. Unauthorized users not possible to access the services from cloud server. This mechanism improves the efficiency of cloud services in cloud computing.
6.2 Future Enhancements
Future enhancement of this project is by using different crypto systems techniques to encrypt and decrypt data for more security