Data Security and Privacy Using Data Partition Centric Key Management in Cloud
Data Security and Privacy Using Data Partition Centric Key Management in Cloud
CONTENTS PAGES
ABSTRACT 3
1. INTRODUCTION 4
2. LITERATURE SURVEY 9
2.1 Introduction
2.2 Existing System
2.3 Proposed System
2.4 Introduction
2.5 Software Requirement Specification
2.5.1 User requirement
2.5.2 Software requirement
2.5.3 Hardware requirement
3. SYSTEM DESIGN 30
3.1 Introduction
3.2 DFD / ER / UML diagram (any other project diagrams)
MIST Page 1
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
6. CONCLUSION :
8 . Future Enhancement
MIST Page 2
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
ABSTRACT:
The Cloud Computing is a next generation platform, which provides
virtualization with resource pool. There are three types of cloud service models,
Infrastructureas- a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-
Service (SaaS).Most of the scientific research focus on IaaS model, which manage
virtualization and storage. IaaS allows customer to scale based on user demand and
user only pays for the resource usage. Data security plays a crucial role in cloud
environment and user trust is most challenging problem of cloud services. This
research paper proposed new methodology that secures data and provide privacy to
the customer in cloud. Our technique providing security by using data partition
approach and that partitioned data will be proceed further parallel for encryption
mechanism. Here privacy is given by centric key management scheme
MIST Page 3
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
INTRODUCTION
MIST Page 4
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
cloud environment is examined and research related to security issues in single and
multi-clouds in cloud computing is surveyed. The remainder of this paper is
organized as follows. Section II describes the beginning of cloud computing and its
components. In addition, it presents examples of cloud providers and the benefits
of using their services. Section III discusses security risks in cloud computing.
Section IV analyses the new generation of cloud computing, that is, multi-clouds
and recent solutions to address the security of cloud computing, as well as
examining their limitations. Section V presents suggestions for future work.
Section VI will conclude the paper.
MIST Page 5
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
whose services offered by the Cloud paradigm promise to reduce capital as well as
operational expenditures for hardware and software. It classified based on Location
of the cloud computing and Type of services offered .Based on Location its types
are: public cloud, private cloud, hybrid cloud, community cloud. Based on type of
services it’s categorized in Infrastructure as a service (IaaS) , Platform as a Service
(PaaS) , Software as a service (SaaS). Public cloud is offered by third party service
provider and it involves resources that are outside the user premises. Customer has
no visibility and no control over the computing infrastructure where it is hosted
and this infrastructure is shared between any organizations.
MIST Page 6
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 7
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
2.SYSTEM ANALYSIS
MIST Page 8
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
PHP
MIST Page 9
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
FEATURES OF PHP:
Simple
Secure
Portable
SIMPLE:
It is simple for professional programmer to learn & they can use it effectively. If
we already know structure oriented programming, then learning php is very easy.
MIST Page 10
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
SECURE:
PORTABLE:
As already we have discussed about compatibility of operating
system, computers, chips. In Internet the programs have to be dynamically
downloaded to all the various types of platforms like windows for wamp ,linux for
lamp and support all platforms using xampp.
Database Management System (DBMS):
MIST Page 11
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Software.
User.
Hardware: The processor(s) and associated main memory that are used to support
the execution of database system software..
Software: The layer between the physical database and the users that handles all
requests from the user for access to the database.
Application Programmers
End User
Database Administrator (DBA)
TYPES OF DBMS
There are four major categories of DBMS data models.
Hierarchical
Network
Inverted
Relational
MIST Page 12
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Structures.
Operation.
Integrity rules.
Structures:
Operations:
They are clearly defined actions that allow users to manipulate the
data and structures of a database. The operations on a database must adhere to a
predefined set of integrity rules.
ARCHITECTURE:
MIST Page 13
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Two processes (or tasks) are of concern on the server: the database
(MySQL, for us) and the web server (usually Apache or Microsoft IIS). The PHP
processor runs under control of the web server and executes the PHP files that
compose the application. The four labels in the server box correspond to the
elements of the so-called LAMP stack: operating system (Linux), web server
(Apache), database (MySQL), and language (PHP). As I’ll explain, the first
doesn’t have to be Linux and the second doesn’t have to be Apache. Generally, the
last two don’t have to be MySQL and PHP, but they are in this book, since that’s
our focus. There are usually lots of applications running on the client, but only the
browser that’s connected to the web server running the PHP application is of
concern to us. Since you’re a developer, you also care about the development
platform, which consists of two essential applications, at least: an editor that can
create and modify PHP files and a transfer utility that can copy those files to the
web server, typically an FTP (File Transfer Protocol) or SFTP (Secure File
MIST Page 14
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Transfer Protocol) utility, sometimes built into the editor. It’s convenient to
reproduce the whole server platform on the development system so the PHP files
can be accessed directly by the editor, and so you can run the application locally.
To do this, it’s necessary to install a server platform on the development computer
and then to open up a browser on that computer to interface with the application.
Fig illustrates this process. When the application is ready to deploy, an FTP utility
copies the PHP files to the remote server, as figure shows
Client-Server Architecture
The server platform runs on an operating system, naturally, and on
that runs the web server and the database system,MySQL. For us, the web server is
programmed in PHP, and I’ll give my reasons why that’s almost always my choice,
and that of lots of other people, too.
MIST Page 15
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 16
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 17
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 18
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
technologies, and because MySQL is always there and works extremely well, it’s
always my first choice.
Sun Microsystems bought MySQL in 2008, and Oracle bought Sun
about two years later, so now, somewhat ironically, Oracle owns MySQL. Despite
some concern that Oracle might neglect MySQL development and/or support in
order not to cannibalize Oracle sales, it hasn’t done so, and MySQL remains just as
viable as ever. Nonetheless,
there’s some unease with that situation, so the MySQL original
authors have taken the open source MySQL code and produced a compatible
system called MariaDB, which aims to be binary compatible with it. As MySQL is
still the version most widely supported by hosting companies and cloud servers,
that’s the one I use.
Do what you can to make sure you’re using at least Version 5.5 of
MySQL, as that’s the version I’m going to assume you have in this book. That’s
where MySQL is as of this writing, Of course, it will be on to , and so on. If your
application is new, start with the newest stable version. Very high-performance
web sites don’t send SQL queries to the database, because they take too much
processing time and make it difficult to cache results for reuse by other queries.
applications, you want to use SQL. The performance of MySQL will be more than
adequate.
MIST Page 19
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
PHP is always there. I’ve never found a hosting company that didn’t
offer it. Java is sometimes an extra-cost option, if it’s available at all, and Python
and Ruby are often unavailable. PERL is as common as PHP, but it’s an even
worse language. It’s fast. It’s so widely used that there’s lots of optimization for it,
especially when used with Apache.
It has an extraordinary collection of extensions that allow it to handle most
any webapplication. Every web service (Amazon, Facebook, Flickr, etc.) has a
PHP interface. Without supporting PHP, they know their support is incomplete. By
contrast, they can get away with ignoring For these reasons, w3techs.comreports
that PHP is used on almost 80% of web sites. (.NET is 20% and Java is 4%;some
sites use more than one language.)
So, the answer to why PHP, since I can and have used almost every
language that ever existed, is that it’s pleasant enough to use, always available,
extremely well supported, and nearly always has a function to There are three other
languages you’ll be using, as web application developers always use at least four
languages.
The three others are
a. HTML (including CSS),
b. JavaScript, and
c. SQL, to talk to the database.
HTML and JavaScript run in the browser; never on the server. SQL is
passed to the database from your PHP program, or sometimes used directly on the
database, so it’s a server language.
MIST Page 20
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Design is the first step in moving from problem domain to the solution
domain. Design is essentially the bridge between requirements specification and
the final solution.
HTML:
CSS :
CSS Stands for "Cascading Style Sheet." Cascading style sheets are
used to format the layout of Web pages. They can be used to define text styles,
table sizes, and other aspects of Web pages that previously could only be defined
in a page's HTML. The basic purpose of CSS is to separate the content of a web
document (written in any mark up language) from its presentation (that is written
using Cascading Style Sheets). There are lots of benefits that one can extract
through CSS like improved content accessibility, better flexibility and moreover,
MIST Page 21
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
JAVA SCRIPT
PHP
MIST Page 22
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
SQL
SQL stands for Structured Query Language. SQL lets us access and
manipulate databases. SQL is an ANSI (American National Standards Institute)
standard. SQL can execute queries against a database ,retrieve data from a
database, insert records in a database, update records in a database, delete records
from a database, create new databases , create new tables in a database , create
stored procedures in a database, create views in a database, set permissions on
tables, procedures, and views.
Functional Requirements:
MIST Page 23
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Non-Functional Requirements
MIST Page 24
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Scalability:
Interoperability:
Reliability:
Portability:
MIST Page 25
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Extensibility:
Efficiency:
MODULES
USER:
In this module user register and login to the site. And user can view the files and
they want to download from the admin request and key will be sent to user mail
.with that key user can download the files.
Admin:
In this module admin can login the site and can upload the files on the cloud with
centric key management and he will give the permission to users.
MIST Page 26
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Hardware specifications:-
Software requirements:-
Technology : PHP
Database : MYSQL
MIST Page 27
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Tool : Notepad++.
SYSTEM STUDY
FEASIBILITY STUDY:
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
MIST Page 28
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system
will have on the organization. The amount of fund that the company can pour into
the research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a high
demand on the available technical resources. This will lead to high demands on the
available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
SOCIAL FEASIBILITY
MIST Page 29
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
with it. His level of confidence must be raised so that he is also able to make some
constructive criticism, which is welcomed, as he is the final user of the system.
System design
Context Diagram:
MIST Page 30
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
DFD SYMBOLS:
MIST Page 31
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Data Flow
Data Store
CONSTRUCTING A DFD:
Process should be named and numbered for an easy interface. Each name
should be representative of the process.
The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow back to
the source. One way to indicate this is to draw long flow line back to a source. An
alternative way is to repeat the source symbol as a destination. Since it is used
more than once in the DFD it is marked with a short diagonal.
MIST Page 32
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
When a process is exploded into lower level details, they are numbered.
The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized.
A DFD typically shows the minimum contents of data store. Each data
store should contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out.
Missing interfaces redundancies and like is then accounted for often through
interviews.
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether
the data flow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
Types of data flow diagrams
Physical DFD:
MIST Page 33
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Logical DFD:
Logical DFDs are the model of the proposed system. They clearly
should show the requirements on which the new system should be built. Later
during design activity this is taken as the basis for drawing the system’s
structure charts.
PROCESS
DATA STORE
Data cannot move directly from one data store to another data store, a
process must move data.
MIST Page 34
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Data cannot move directly from an outside source to a data store, a process,
which retrieves, must move data from the source and place the data into data store.
MIST Page 35
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
USECASE DIAGRAM
The main purpose is to show the interaction between the use cases and
the actor.
To represent the system requirement from user’s perspective.
use cases are the functions that are to be performed in the module.
An actor could be the end-user of the system or an external system.
MIST Page 36
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
CLASS DIAGRAM
Class Diagram consists of the classes and the objects and the interaction
between them. It mainly deals with the interaction between classes in the system,
their behavior and properties of the system. Apart from classes this also provides
inheritance relationships in the project. Class diagrams consist of basically two
parts: first one is the member variables and class variables and the second part
consists of the total number of methods available in the class.
MIST Page 37
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
SEQUENCE DIAGRAM
The main purpose is to represent the logical flow of data with respect to a process
MIST Page 38
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 39
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Activity Diagram:
MIST Page 40
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 41
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
<!DOCTYPE html>
<html>
<head>
<!--[if IE 6]>
<![endif]-->
<!--[if IE 7]>
<![endif]-->
</head>
<body>
MIST Page 42
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
<style>
.t
font-size:24px;
color:#3300FF;
.home
text-align:center;
overflow:hidden;
font-size:16px;
color:#000000;
</style>
MIST Page 43
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
<div class="header">
<div id="navigation">
<ul>
<li class="selected"><a
href="index.php">HOME</a></li>
<li><a
href="register.php">REGISTER</a></li>
<li><a href="login.php">LOGIN</a></li>
<li><a href="about.php">ABOUT</a></li>
<li><a href="contact.php">CONTACT
US</a></li>
</ul>
</div>
</div>
<div class="body">
MIST Page 44
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
<body style="background-color:#f0f0f0;margin:0">
<div id="wowslider-container1">
<div class="ws_images"><ul>
MIST Page 45
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
<li><a href="http://wowslider.net"><img
src="data1/images/3.jpg" alt="wowslider.net" title="" id="wows1_2"/></a></li>
</ul></div>
</div>
</div>
</div>
<div align="left">
<ul class="home">
MIST Page 46
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Software-as-a-Service (SaaS).</li>
</ul>
MIST Page 47
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
</div>
</div>
<div class="connect">
</div>
</div>
</div>
<div class="footer">
</div>
</body>
</html>
MIST Page 48
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
TESTING
A good test case is one that has a high probability of finding an as yet
undiscovered error. A successful test is one that uncovers an as yet undiscovered
error. Software testing is usually performed for two reasons.
Defect detection
Reliability estimation
MIST Page 49
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
In order to make sure that the system does not have errors, the
different levels of testing strategies that are applied at differing phases of software
development are:
Unit Testing:
In this strategy some test cases are generated as input conditions that
fully execute all functional requirements for the program. This testing has been
uses to find errors in the following categories:
Incorrect or missing functions
Interface errors
Errors in data structure or external database access
Performance errors
Initialization and termination errors.
In this testing only the output is checked for correctness. The logical flow of
the data is not checked.
MIST Page 50
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
In this the test cases are generated on the logic of each module by
drawing flow graphs of that module and logical decisions are tested on all the
cases.
It has been uses to generate the test cases in the following cases:
3. System Testing:
Involves in-house testing of the entire system before delivery to the user. Its
aim is to satisfy the user the system meets all requirements of the client's
specifications.
MIST Page 51
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
4. Acceptance Testing:
Validation:
The system has been tested and implemented successfully and thus
ensured that all the requirements as listed in the software requirements
specification are completely fulfilled. In case of erroneous input corresponding
error messages are displayed.
COMPILING TEST
It was a good idea to do our stress testing early on, because it gave us
time to fix some of the unexpected deadlocks and stability problems that only
occurred when components were exposed to very high transaction volumes.
EXECUTION TEST
OUTPUT TEST
The successful output screens are placed in the output screens section
above.
MIST Page 52
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Test Objective: To check whether the user inserted data is available or not.
Test Description:When user click on Report url in new window view uploaded data
in all clouds.
The user user view data stored in clouds See all clouds have same data or not.
through this form
MIST Page 53
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Test Objective: To check whether the user/administrator can login without his userid
Test Description: when a user or administrator clicks the link, a login form will be
displayed. In this form if user wants to login he has to enter userid and password. If he
doesn’t enter and then tries to login, he will get a message indicating “user id is
mandatory”
MIST Page 54
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 55
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Test case 3:change password Priority (H, L):High
Test Objective: To check whether the user can change his password when desired
Test Description: when a user or administrator clicks the link to change the password,
then a window appears to reset password. In that a new password is given and then
updated.
The user/administrator will login through When user logins with new password then
the login form he should be allowed to login
MIST Page 56
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Test Objective: Whether the admin click on cloud create cloud is create or not .
Test Description: when a administrator click on a create cloud url then a new
window appears in that provide filled all details of cloud then click on submit.
The administrator create new clouds A relevant message should appear cloud is
through this form create successfully.
MIST Page 57
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
RESULTS
SCREEN SHOTS
Home page
CONCLUSION:
MIST Page 58
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
Future enhancement:
REFERENCES:
MIST Page 59
DATA SECURITY AND PRIVACY USING DATA PARTITION
CENTRIC KEY MANAGEMENT IN CLOUD
MIST Page 60