Вы находитесь на странице: 1из 9

DATA LEAKAGE DETECTION SHARING WITH SENSITIVE INFORMATION

HIDING FOR SECURE CLOUD STORAGE

Mrs. D.RAJASELVI, M.Sc. M.Phil. B.Ed., 1


1. Assistant Professor
Department Of Computer Science
V.MAHALAKSHMI 2

2. M.Sc Computer Science

ABSTRACT:

Data leakage detection sharing with sensitive information hiding for secure Cloud Storage.
We show how to flexibly, securely, efficiently and share data with others in cloud storage. The
novelty is that one can aggregate any set of secret keys and make them as compact as a single key,
but encompassing the power of all the keys being aggregated. In the secret key holder can release
a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other
encrypted files outside the set remain confidential. We describe new private-key crypto systems
which produce constant-size cipher texts such that efficient delegation of decryption rights for any
set of cipher texts are possible. This compact aggregate key can be conveniently sent to others or
be stored in a storage with secure storage. We provide formal data security analysis of our schemes
in the standard model. We also describe other application of our schemes. Our schemes give the
first asymmetric key (public-key) patient-controlled encryption for flexible hierarchy, which was
yet to be known. Encryption keys also come with two flavors one is symmetric key and another
one is asymmetric key also symmetric key (private key) are using data leakage detection sharing
with sensitive information hiding for secure cloud storage. Using symmetric encryption, when user
wants the data to be originated from admin, she has to give the encrypt or her secret key to access
the data. Otherwise it throws a fake user message to user In this authentication system, our usability
goal is to support the users in selecting better passwords, thus increases the security by expanding
the effective password space and after that Data sharing is an important functionality in cloud
storage.

I.INTRODUCTION

The objective is to develop a system, we present a secure graphical authentication system


named Pass point that protects users from becoming victims of shoulder surfing attacks when
inputting passwords in public through the usage of one-time login indicators. Authentication is the
process of determining whether a user should be allowed to access to a particular system or
resource. In this paper, we propose a Cued Click Points (CCP) for graphical password
authentication. A password consists of one click-point per image for a sequence of images. The
next image displayed is based on the previous click-point so users receive immediate implicit
feedback as to whether they are on the correct path when logging in.

1.1 Existing System

➢ Referring to the previous section where we selected recognition out of the three categories
in graphical password techniques and afterwards select technique as the proposed
algorithm for image gallery security. Now we will explain the steps involved during
registration and login section using this existing algorithm.
➢ The CW (Cryptographic word) schemes are not applicable whenever a malicious attack
can take place.
1.2 Proposed System
➢ In our proposed approach, the delegation of decryption can be efficiently implemented with
the aggregate key, which is only of fixed size.
➢ KEY-AGGREGATE ENCRYPTION give the framework and definition for key aggregate
encryption.
➢ We propose data allocation strategies (across the agents) that improve the probability of
identifying leakages.
For example, in enterprise settings, every employee can upload encrypted data on the
cloud storage server without the knowledge of the company’s master-secret key.

Cued Click Points

Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click
one point on each of c = 5 images rather than on five points on one image. It offers cued-
recall and introduces visual cues that instantly alert valid users if they have made a mistake
when entering their latest click-point (at which point they can cancel their attempt and retry
from the beginning). It also makes attacks based on hotspot analysis more challenging, as
we discuss later. As shown in Figure 1, each click results in showing a next-image, in
effect leading users down a “path” as they click on their sequence of points.

A wrong click leads down an incorrect path, with an explicit indication of


authentication failure only after the final click. Users can choose their images only to the
extent that their click-point dictates the next image. If they dislike the resulting images,
they could create a new password involving different click-points to get different images.

Fig 1.1

II. ARCHITECTURE DIAGRAM

Graphical image password


by click point
III. MODULES

The project has been divided into 7 different modules:

1. Enrolls Images with User Information and Generate Graphical Password.


2. Authentication Process While Logging Users.
3. Implementing the Process of Single Graphical Password on Mechanism.
4. Lock user files using secret key.
5. Unlock user files using secret key.
6. Retrieve files using secret key.
7. Identifying leakage data.

3.1 Generate Graphical Password

Graphical image password is based on the click count and pixel based for authentication of
users.

3.2 Authentication Process While Logging Users

The login registration compare the image click points and username password provide
the authentication.

3.3 Lock user files using secret key

The admin will provide the permission for files and user lock the files by a secret key.

3.4 Unlock user files using secret key

The admin will provide the permission for files and user unlock the files by a secret key.

3.5 Retrieve files using secret key.


The user unlock the files by the same secret key which give to the files.
In order to solve the problems of existing system we develop the new system. Proposed
system provide high quality service to send the data to receiver. It also provides data security
efficient utilization of errors.

System Design
System design is the vital phase because input, output and database designs are done in this
phase. This is the core part of the project. It can be defined as a transition from a user’s view to
view of programmers and database personnel. It concentrates on translating to design specification.
The major steps in the design phase are input design, output design and database design.

Input design describes how we designed the input forms according to the user’s
requirements. In the same manner, the output design shows how the output forms are formatted
according to user requirements. The next step is the database design, which concentrates on
choosing the database, which suits most to the application environment. Database tables are
designed by using all necessary fields in a compact and correct manner so that redundancy and
duplication of fields can be avoided. Design is the phase were quality is fostered in software
development. Design is the only way where requirements are actually translated into finished
software products or system.

IV. SCREENSHOTS

Input and Output design

Admin Login Form Design

This form is used by the administrator. The administrator has to give the permission to user to
upload files in the space provided.

Create User Form Design


This form is entirely meant for the user. This page provides facilities for the registration by new
user.

Graphical image password by click count


Graphical image password is based on the click count and pixel based for authentication of users.

Files Upload Form Design

Upload the files and give a security code (OTP) for the file access to reduce the data leakage
detection.
Output design

Graphical image password is based on the click count and pixel based for authentication of users.
And then upload the files and give a security code (OTP) to g-mail for the file access to reduce the
data leakage detection and identify the fake users.

File Retrieval Form

After giving the secret key the file will be downloaded to the authenticated users.

V.CONCLUSION

This system has been developed as versatile and user friendly as possible keeping in mind
the advanced features in this technology. In this system, users first choose an ordered sequence of
5 clicking point and then select single image to click-draw their secrets. At the time of login phase
images appear as per the certain series. For registration, user selects 5 clicking point from the
image. User select the image clicking point one by one on X-axis and Y-axis. Based on the Cued
Click Points are a click-based graphical password scheme, on during registration. While user
coming to authentication phase, first step select images from the image pool based on image
selected by registration phase and server can generate the graphical password based on image
selection. Second step verify the registration graphical password with newly generated password
point. If both the password point are same the secrete key is generate and send to the mail-id.
Otherwise abort the user. The performance of the system proved to be efficient.
REFERENCES:

[1]S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE -Simple Privacy-Preserving
Management for Cloud Environment,”in Applied Cryptography and Network Security – ACNS
2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526–543.

[2] L. Hardesty, “Secure computers aren’t so secure,” MIT press, 2009,


http://www.physorg.com/news176107396.html.

[3] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing
for Secure Cloud Storage,” IEEE Trans.

[4] O. Adeyinka, “Analysis of IPSec VPNs Performance in A Multimedia Environment,” School


of Computing and Technology, University of East
London.

Вам также может понравиться