You are on page 1of 4

Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No.

1, March 2019 7

Enhanced on Data Encryption Standard for Secured


Cloud Storage
M. Jayasarathi, S. Rajeshwari, I. Shiny Mercy and S.K.B. Rathika

Abstract--- Present days many users store their significant DES algorithm was designed by Horst Feistel and
data in cloud. To ensure that the security of the cloud stored developed by IBM in the early 1970’s. This algorithm was
data users need to encrypt the important data. The point of submitted to the National Bureau of Standards (NBS). Initially
data security which has always been noteworthy aspect of it was found that this algorithm includes differential
quality, cloud computing cause a new security threats. In cryptanalysis.
cloud storage systems, the server that stores the client’s data
So this algorithm was slightly modified to strengthen
is not necessarily trusted. The existing system does not provide differential cryptanalysis at the same time it was weakened
security mechanisms for storing data in clouds. But the against Brute-Force attack which consists of an attacker
proposed system can provide security against collusion attack,
submitting many passwords or passphrases with the hope of
DDOS attack. Existing data auditing schemes have security eventually guessing correctly.
risks in processing of data. For achieving the efficiency of
cloud storage the proposed system provides flexible data Thus the attacker continuously checks for correct
segmentation with additional authorization process among the passwords and passphrases.
three participating parties of client, Server and a Third Party In order to prevent this problem we KGC in which the
Auditor (TPA). With the DES algorithm collusion attack can request sent from the client is forwarded to the user through
be resisted since this is a identity based data storage scheme. sms and once they grant permission for the client to view the
Keywords--- DDOS Attack, Collusion Attack, Third Party file, the password is sent to the client. Thus we protect the
Auditor, DES Algorithm. privacy of the user.
The document is continuously monitored and clients can
use just one attempt to view the file and once they provide
I. INTRODUCTION
wrong password that particular person is restricted to view the
Cloud computing uses a network of remote severs hosted file this way they will not be able to even guess the password.
on the Internet to store, manage and process data rather than a The password will be valid only upto a particular and each
local server or a personal computer. Cloud computing [2] time it is being changed by the user.
provides convenient, on-demand services from a shared pool
of configurable computing resources. In spite of the numerous Thus one client can view that particular document and
advantages, unpredictable security and privacy concerns [3], even if they share the password, the other person will not be
[4] become the most important problem that make it difficult able to use it.
to widespread adoption of data storage in public cloud This way the files uploaded by the user are secured by
infrastructure. modified DES algorithm.
In the existing system, anyone can easily receive the
document from the server which is completely insecure and II. EXISTING SYSTEM
lack of privacy. In order to overcome this problem we put The existing system [1] consists of Efficient Traceable
together Data Authorization Search System for Secure Cloud Storage. In this
system the user can upload a file with a password.
Encryption Standard algorithm with cloud storage
facilities. We include sms sent to the user through which the Authorized user may intentionally leak the secret key for
privacy has been protected. financial benefit. So that any client can request and open the
file without the knowledge of the user. Thus, tracing and
revoking the malicious user who abuses secret key needs to be
M. Jayasarathi, B.E, UG Student, Department of Computer Science and solved imminently.
Engineering, Sree Sakthi Engineering College Anna University, Chennai,
India. E-mail: jayasarathi06@gmail.com
S. Rajeshwari, B.E, UG Student, Department of Computer Science and III. BLOCK DIAGRAM OWNER-MODULE
Engineering, Sree Sakthi Engineering College Anna University, Chennai,
India. E-mail: roja0010@gmail.com Registration-Module
I. Shiny Mercy, B.E, UG Student, Department of Computer Science and In this module the cloud storage space is available that can
Engineering, Sree Sakthi Engineering College Anna University, Chennai, be purchased by any owner, at first they should be registered.
India. E-mail: Shinymercy1997@gmail.com
S.K.B. Rathika, M.E, Assistant Professor, Department of Computer
Science and Engineering Sree Sakthi Engineering College Anna University,
Chennai, India. E-mail: rathika.skb@gmail.com
DOI:10.9756/BIJSESC.9004

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 8

Data to Encryption is classified into two types;o ne thing is


the metadata is segregate based on the query .They are
encrypted separately and stored in the ;and the second thing is
the data are separately encrypted .both are stored in the cloud
storage space.
User Module
Registration Module
In this module the user should registered with their
personal details such as email id, phone number, username and
password.
Login Module
The user can authenticate with their username and
password.
File Search
The user can search their file in this module. If they really
needed they should be give an request to the particular user.
File Approvals
If the file is approved by the user, they are allowed to view
file or download file by using their encryption key of file and
secret key of particular user.
Cloud Storage Module (Key Generation)
This module completely shows the accurate data stored in
the cloud storage .This help you search file that you needed
with the help of the keywords. Then that particular document
is displayed
When files is needed the user wants to request to the
admin. The admin may accept/Decline files based on the data
Fig. 1: Block Diagram mode (ie., Private, Public

IV. PROPOSED SYSTEM V. OUTPUT SCREENSHOT


• An user will give request directly to the admin
• It avoid time complexity
• Admin accept as the request given by the user and it
will generate the secret key
• DES will use same key generation to encrypt and
decrypt the file from users
• From using Triple DES each data block we are
encrypting three times to generate the keys
• Thus they are provide additional security for encrypt
Login-Module:
The Login module which can used for authenticating the
owner. In his module the user should provide their user name
and password to view files.
Cloud Space Purchasing
In which the user can purchase their own storage space
according to their usage.
File Upload
As per space availability purchased by the user, the cloud
storage that allows you to store the data. The information are
encrypted as before they are stored in their own space. If there
doesn’t exists any availability you are not supposed to upload
the file.

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 9

VI. CONCLUSION
The enforcement of access control and the support of
keyword search are important issues in secure cloud storage
system. In this work, proposed DES algorithm for securing
data. It supports flexible multiple keywords subset search, and
solves the privacy issues. Malicious user who sells secret key
for benefit can be traced. The performance analysis and
simulation show its efficiency in computation and storage
overhead. Experimental results indicate that the computation
overhead at user’s terminal is significantly reduced, which
greatly saves the energy for resource-constrained devices of
users.

VII. ACKNOWLEDGEMENT
It is a pleasure for us to acknowledge all those who
assisted and lead this project to a success.

REFERENCES
[1] Y. Yang, X. Liu, X. Zheng, C. Rong and W. Guo, “Efficient Traceable
Authorization Search Systemfor Secure Cloud Storage”, IEEE
Transactions on Cloud Computing, 2018.
[2] C. Wang, N. Cao, J. Li, K. Ren and W. Lou, “Secure ranked keyword
search over encrypted cloud data”, IEEE 30th International Conference
on Distributed Computing Systems (ICDCS), Pp. 253-262, 2010.

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 10

[3] Q. Zhang, L.T. Yang, Z. Chen, P. Li and M.J. Deen, “Privacy-preserving


Double-Projection Deep Computation Model with Crowd sourcing on
Cloud for Big Data Feature Learning”, IEEE Internet of Things Journal,
2017.
[4] R. Chen, Y. Mu, G. Yang, F. Guo and X. Wang, “Dual-Server Public-
Key Encryption with Keyword Search for Secure Cloud Storage”, IEEE
Transactions on Information Forensics and Security, Vol. 11, No. 4, Pp.
789-798, 2016.
[5] X. Liu, R.H. Deng, K.K.R. Choo and J. Weng, “An efficient privacy
preserving outsourced calculation toolkit with multiple keys”, IEEE
Transactions on Information Forensics and Security, Vol. 11, No. 11,
Pp. 2401-2414, 2016.
[6] B.R. Waters, D. Balfanz, G. Durfee and D. K. Smetters, “Buildingan
encrypted and searchable audit log”, In NDSS, 2004.

ISSN 2277-5099 | © 2019 Bonfring

You might also like