Fir LLLLL LLLLL LLLLL
Fir LLLLL LLLLL LLLLL
Fir LLLLL LLLLL LLLLL
OUTSOURCING MECHANISM
A PROJECT REPORT
Submitted by
PADMAPRIYA.M (21310104066)
RAJALAKSHMI.R (21310104078)
SABITHA.P (21310104088)
i
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this project report “EXPLOITING THE CLOUD FOR SECURE
SIGNATURE SIGNATURE
ii
ACKNOWLEDGEMENT
We express our profound thanks to all other staff members for their
continuous encouragement and motivation given to us for this work and for their
great support in successfully completing this project.
We thank all our family and friends for inspiring us to do this project.
iii
ABSTRACT
Cloud computing provide services on the basis of pay-per use technique ,where
you can obtain the networked storage space and computer resources. In cloud
computing model, the customers plug into the cloud to access IT resources which are
priced and provided on demand services. Cloud computing economically enables
customers with limited computational resources to outsource large-scale computations
to the cloud. Users can store their data in the cloud and there is a lot of personal
information and potentially secure data that people store on their computers, and this
information is now being transferred to the cloud. Here we must ensure the security
of user’s data, which is stored by using secure outsourcing mechanism in cloud. To
enhance the speed we are introducing a temporary memory called cache or buffered
memory. Cloud Computing is a subscription based service. At the completion of the
contract with the cloud, the utilized services can be carried over to the new contract, so
that cost efficiency can be achieved.
iv
TABLE OF CONTENTS
5 IMPLEMENTATION
v
5.1 Input & Output 28
5.2 Limitations 29
6 RESULTS AND DISCUSSIONS
6.1 Efficiency of the proposed system 30
6.2 Advantages of the proposed system 30
6.3 Comparison of Existing and 30
proposed System
7 CONCLUSION AND FUTURE ENHANCEMENTS
7.1 Conclusion 31
7.2 Future Enhancements 31
APPENDICES 41
REFERENCES 45
vi
CHAPTER 1
INTRODUCTION
Cloud computing represents a keyword in the industrial and academic world
today. Its success is due to its win-win model specialized providers offer their
resources through standardized mechanisms, while stakeholders exploit and pay
for the resources they need wherever they are. Some of the main features of the
available cloud computing solutions are elasticity and scalability. Providers have a
large number of resources, where a potentially unlimited number of stakeholders
may ask for their usage based on their actual needs. The stakeholder’s needs may
often be characterized by significant fluctuations due to the model of payment,
which is based on the pay-per-use paradigm. This has an important implication
providers make an initial investment in expensive infrastructure and resources to
sustain this model.
Focusing on the engineering and scientific computing problems,
investigates secure outsourcing for widely applicable large-scale systems. The
execution time of a computer program depends not only on the number of
operations it must execute, but on the location of the data in the memory hierarchy,
solving such large-scale problems on customer’s weak computing devices can be
practically impossible, due to the inevitably involved huge IO cost.
You can be billed for resources as you use them. This pay-as-you-go model
means usage is metered and you pay only for what you consume. Cloud customers
can provision cloud services without going through a lengthy process. You request
an amount of computing, storage, software, process, or more from the service
provider. After you use these resources, they can be automatically deprovisioned.
vii
Software as a Service (SaaS):
Following this model, the cloud service provider makes both the software and the
cloud infrastructure to run it available to the client, while it retains complete
control over the underlying physical settings of the cloud (i.e., the operating
system, network, storage, etc.) and the individual application capabilities. Thin
client interfaces such as web browsers are often used to allow access to these
applications.
ix
CHAPTER 3
PROJECT DESCRIPTION
EXISTING SYSTEM
DISADVANTAGE
Applying ordinary encryption techniques to the sensitive information before
outsourcing could be one way to combat the security concern it also makes
the task of computation over encrypted data in general a very difficult
problem
x
quality of the computed results. Thus, we argue that the cloud is intrinsically
not secure from the viewpoint of customers.
The execution time of a computer program depends not only on the number
of operations it must execute, but on the location of the data in the memory
hierarchy, solving such large-scale problems on customer’s weak computing
devices can be practically impossible, due to the inevitably involved huge IO
cost.
xi
PROPOSED SYSTEM
ADVANTAGES
Once the data is to accessed , the user has to give request for that data to the
admin . The admin has to verify the request and key for that data is given to
the user , admin must know the user who is accessing the data through which
cheating detection can be achieved.
xii
First time the data will be downloaded directly from the server , from the
second time it will be downloaded from the catch-speed access.
xiii
3.3 SPECIFICATION
MYSQL 5.1
CHAPTER 4
xiv
MODULE DESCRIPTION
Design Phase deals with the various UML [Unified Modeling language] diagrams
for the implementation of project. Software design is a process through which the
requirements are translated into representation of the software. Design is the place
where quality is rendered in software engineering. Design is the means to
accurately translate customer requirements into finished product.
DFD DIAGRAMS
Level1:
xv
Level 2:
xvi
xvii
Level 3:
xviii
4.1.2 UML DIAGRAMS
USECASE
The use case diagrams describe system functionality as a set of tasks that
the system must carry out and actors who interact with the system to
complete the tasks. Each use case on the diagram represents a single task
that the system needs to carry out.
login
download
upload
delete
allocate memory
renewal
logout
xix
CLASS DIAGRAM
SEQUENCE DIAGRAM
xx
Data user Server Admin
1.login
2.login verified
3. login
4.login verified
5. upload file
6.key request
8.Download file
9.Download file
10.upload file
11.Renewal request
12.Renew
13.Logout
14.Logout
xxi
COLLABORATION DIAGRAM
2:
9:
Server Admin
1:
5:
14:
4: 6:
8: 11:
3: 7:
10: 12:
13:
Data
user
E-R Diagram
The relation upon the system is structure through a conceptual ER-Diagram, which
not only specifics the existential entities but also the standard relations through
which the system exists and the cardinalities that are necessary for the system state
to continue.
The entity Relationship Diagram (ERD) depicts the relationship between the data
objects. The ERD is the notation that is used to conduct the date modeling activity
xxii
the attributes of each data object noted is the ERD can be described resign a data
object descriptions.
The set of primary components that are identified by the ERD are
o Data object
o Relationships
o Attributes
The primary purpose of the ERD is to represent data objects and their
relationships.
xxiii
4.2 GENERAL ARCHITECTURE
In the cloud , the data information that is to be stored in the cloud server is
uploaded by the data owner in the encrypted format . The cloud user , who is need
of those confidential data has to request the admin for the data . Once the admin
verifies the request , the cloud user can download the requested data using the key
given to them.
xxiv
4.3 MODULES
Homomorphic Encryption
Cheating Detection
speed access
4.4 MODULE DESCRIPTION
xxv
CHEATING DETECTION
The data owner upload the files in the cloud server, that will be stored in the
encrypted format which is done by FHE. For accessing those data , cloud user has
to request the admin for that particular data once the admin verified the request key
has been generated. Here we use atomatic key generation technique. This
algorithm generates the key automatically from the message itself and are not
required to be defined by the user.
Once the encryption is done, the key is to be transferred to the receiver‟s end so
that it could be used for decryption. Therefore it is transferred to the receiver‟s end
while being added with the message in the encrypted form. Another role is played
by random number generator to enhance security.
KeyGen(1k) → {K}.This is a randomized key generation algorithm which takes a
system security parameter k, and returns a secret key K that is used later by
customer .
SPEED ACCESS
The data files are uploaded in the cloud server, the uploaded data file will be
downloaded directly from the server after that the same file can be downloaded
from the catch memory.
xxvi
COMPARISON OF EXISTING AND PROPOSED SYSTEM
In the existion system the cloud uses some ordinary data encryption techniques for
data security. The operational details inside the cloud are not transparent. Secure
outsourcing computations is expensive.No standards or model is defined for secure
outsourcing.
In the proposed system the sensitive data have to be encrypted using Fully
homomorphic encryption before outsourcing.Provide dynamic key every time,
when a user logged in for cloud service. Provides more secure environment for
cloud service provider and clients.This task secure cloud services from malicious
or unwanted access.
CONCLUSION
thus
FUTURE IMPROVEMENT
Recently, a general result of secure computation outsourcing has been shown
viable in theory , which is based on Yao’s garbled circuits and Gentry’s fully
homomorphic encryption (FHE) scheme . However, applying this general
mechanism to our daily computations would be far
from practical, due to the extremely high complexity of FHE operation and the
pessimistic circuit sizes that can hardly be handled in practice. Instead of
outsourcing general functions, in the security community, Atallah et al. explore a
list of customized solutions for securely outsourcing specific computations. In
,they give the first investigation of secure outsourcing of numerical and scientific
xxvii
computation, including LE. Though a set of problem dependent disguising
techniques are proposed, they explicitly allow private information leakage.
Besides, the important case of result verification is not considered. In ,Atallah and
Bejanmin give a protocol design for secure matrix multiplication outsourcing. The
design is built upon the assumption of two no colluding servers and thus vulnerable
to colluding attacks. Later on in, Atallah and Frikken give an improved protocol
for secure outsourcing matrix multiplications based on secret sharing, which
outperforms their previous work in terms of single server assumption and
computation efficiency. But the drawback is that due to secret sharing technique,
all scalar operations in original matrix multiplication are expanded to polynomials,
introducing significant communication overhead. Considering the case of the result
verification, the communication overhead must be further doubled, due to the
introducing of additional recomputed “random noise” matrices. In short, these
solutions, although elegant, are still not efficient enough for immediate practical
uses on large scale problems, which we aim to address for the secure LE
outsourcing in this paper. Wang et al. give the first study of secure outsourcing of
linear programming in cloud computing. Their solution is based on problem
transformation,
and has the advantage of bringing customer savings without introducing substantial
overhead on cloud. However, those techniques involve cubic-time computational
burden matrix-matrix operations, which may not be handled by the weak customer
in our assumption. Very recently, Blanton et al. explored secure outsourcing all
pair distance calculations of large-scale biometric data. Their focus is on result
verification, which leverages certain structures of the distance computations and
the framework of adding fake items and random sampling.
xxviii