SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 391
Review and Analysis of Self Destruction of Data in Cloud Computing
Pradnya Harpale1, Mohini Korde2, Bhagyashree Pawar3, Pritam Kore4,
S.H.Patil5
1,2,3,4 Dept. of Computer Engineering, JSPM’s Jayawantrao Sawant College of Engineering,
Pune, Maharashtra ,India
5 Prof. Dept. of Computer Engineering, JSPM’s Jayawantrao Sawant College of Engineering,
Pune, Maharashtra ,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is the most emerging
technology today which is used by most of the social media
sites to store the data. The data stored on the cloud is private
data of the user so it must not be tampered by other entities.
We propose a system to enhance the security, the data
uploaded by a user is shuffled between the number of
directories within cloud after a particular interval of time to
avoid the tracking of the data. The backup of the data will be
taken timely into the backup directory. The proposed system
enhances the security as well as the ease to use the cloud.
Key Words: Centrality, Cloud security, Fragmentation,
replication, performance, Secure HashAlgorithm(SHA),
Advanced Encryption Standard(AES),Cloud Computing.
1. INTRODUCTION
Cloud computing enables on-demand network access to a
shared pool of configurable computing resources such as
servers, storage, and applications. These shared resources
can be rapidly provisioned to the consumers on the basis of
paying only for whatever they use. Cloud storage refers to
the delivery of storage resources to the consumers over the
Internet. Private cloud storage is restricted to a particular
organization and data security risks are less compared to
the public cloud storage. Hence, private cloud storage is
built by exploiting the commodity machines within the
organization and the important data is storedinit.Whenthe
utilization of such private cloud storage increases,therewill
be an increase in the storage demand. It leads to the
expansion of the cloud storage with additional storage
nodes. During such expansion, storage nodes in the cloud
storage need to be balanced in terms of load. In order to
maintain the load across several storage nodes, the data
need to be migrated across the storage nodes. This data
migration consumes more network bandwidth.Thekeyidea
behind this Application is to develop a dynamic load
balancing algorithm based on deduplication to balance the
load across the storage nodes during the expansion of
private cloud storage.
Cloud computing is the most emerging technology today
which is used by most of the social media sites to store the
data. The data stored on the cloud is private data of the user
so it must not be tampered by other entities. We propose a
system to enhance the security, the data uploaded by a user
is shuffled between the numbersof directorieswithincloud
after a particular interval of time to avoid the trackingofthe
data. The backup of the data will be taken timely into the
backup directory. The proposed system enhances the
security as well as the ease to use the cloud.
2. PROPOSE SYSTEM
In proposed system, we collectively approach the issue of
security and performance as a secure data replication
problem. The division of a file into fragments is performed
based on a given user criteria. Divided File can store in
different nodes. In such a scenario, the security mechanism
must substantially increase an attacker’s effort to retrieve a
reasonable amount of data even after a successful intrusion
in the cloud. Moreover, the probable amount of loss (as a
result of data leakage) must also be minimized. Security is
one of the most crucial aspects among those prohibiting the
widespread adoption of cloud computing. Cloud security
issues may stem due to the core technologies
implementation (virtual machine ).
The data outsourced to a public cloud must be secured.
Unauthorized data accessby otherusersandprocessesmust
be prevented. The main aim of our project is secure the files
store on cloud. The division of a file into fragments is
performed based on a given user criteria. Asuccessfulattack
on a single node must not reveal the locations of other
fragments within the cloud.
To keep an attacker uncertain about the locations of the file
fragmentsand to further improve the security.Weselectthe
nodes in a manner that they are not adjacent and are at
certain distance from each other. To improve data retrieval
time, the nodes are selected based on the centrality
measures that ensure an improved access time.
We develop a scheme for outsourced data that takes into
account both the security and performance. The proposed
scheme fragments and replicates the data file over cloud
nodes. The proposed DROPS scheme ensures that even in
the case of a successful attack, no meaningful information is
revealed to the attacker. We do not rely on traditional
cryptographic techniques for data security. The non-
cryptographic nature of the proposed scheme makes it
faster to perform the required operations (placement and
retrieval) on the data. We ensure a controlled replication of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 392
the file fragments, where each of the fragmentsisreplicated
only once for the purpose of improved security.
In this system mainly consist of three modules:
 Owner
 User
 Cloud Admin
Owner-In these owner modules, owner add the multiple
users in the cloud system. Owner also uploads the text files
in the cloud storage. He can delete the files.
User-In user module, user completes the registration
process and login the system. He can upload the text fileson
cloud storage. He can delete, update or modify the files
Cloud Admin-In this module, the views the all status, views
user, view owner, and reports send back. The Cloud admin
module file can fragmentsusing the fragmentplacementand
fragments replication algorithms.
FIGURE 1 : SYSTEM ARCHITECTURE
3. ALGORITHM
3.1 T-COLORING ALGORITHM FOR FRAGMENTS
ALLOCATION:
Using DROPS method file split into various fragment. For
Security and Optimal Performance in cloud Division and
Replication is used. When selecting the node in cloud
keeping focus on performance and security. For enhanced
accesstime we have to choose central nodesofferedincloud
storage. DROPS technique uses centrality to reduce access
time.
T-coloring technique selects nodes in cloud for fragment
placement by keeping focus on performance and security.
The central node in cloud network gives improved access
time. The DROPS method utilize centrality concept to
decrease the access time. Centrality concludes central node
based on various measures.
T-coloring restricts node selection at hop distance. T-
coloring gives more security performance in the cloud. The
fragments are stored in different node so location of
fragments can’t able to determine.
3.2 FRAGMENT PLACEMENT
Algorithm 1 Algorithm for fragment placement
Inputs and initializations:
O = {O1;O2; :::;ON}
o = {sizeof(O1); sizeof(O2); ::::; sizeof(ON)}
col = {open color; close color}
cen = {cen1; cen2; :::; cenM}
col _ open color¦ i
cen _ ceni¦ i
Compute:
for each Ok > O do
select Si S Si _ indexof(max(ceni))
if colSi = open color and si >= ok then
Si _ Ok
si _ si − ok
colSi _ close color
Si’_ distance(Si; T) P /*returns all nodes at
distance T from Si and stores in temporary set Si’*/
colSi. _ close color
end if
end for
3.2 FRAGMENT’S REPLICATION
In addition to placing the fragmentson thecentralnodes,we
also perform a controlled replication to increase the data
availability, reliability, and improve data retrieval time. We
place the fragment on the node that provides the decreased
access cost with an objective to improve retrieval time for
accessing the fragments for reconstruction of original file.
While replicating the fragment, the separation of fragments
as explained in the placement technique throughTcoloring,
is also taken care off. In case of a large number of fragments
or small number of nodes, it is also possible that some ofthe
fragmentsare left without being replicatedbecauseoftheT-
coloring. As discussed previously, T-coloring prohibits to
store the fragment in neighborhood of a node storing a
fragment, resulting in the elimination of a number of nodes
to be used for storage. In such a case, only for the remaining
fragments, the nodes that are not holding any fragment are
selected for storage randomly. The replication strategy is
presented in Algorithm 2. To handle the download request
from user, the cloudmanager collects all thefragmentsfrom
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 393
the nodes and re-assemble them into a single file.
Afterwards, the file is sent to the user.
Algorithm 2 Algorithm for fragment’s replication
for each Ok in O do
select Si that has max(Ri
k +Wi
k)
if colSi = open color and si >= ok then
Si _ Ok
si _ si − ok
colSi _ close color
Si’_ distance(Si; T) P /*returns all nodes at
distance T from Si and stores in temporary set Si’*/
colSi. _ close color
end if
end for
3.2 ADVANCE ENCRYPTION STANDARD (AES)
AES is an iterative rather than Feistel cipher. It is based on
substitution–permutation network’. It comprisesof a series
of linked operations, some of which involve replacinginputs
by specific outputs (substitutions) and others involve
shuffling bits around (permutations).
Interestingly, AES performs all its computations on bytes
rather than bits. Hence, AES treatsthe 128 bitsof a plaintext
block as 16 bytes. These 16 bytes are arranged in four
columns and four rows for processing as a matrix –
Unlike DES, the number of rounds in AES is variable and
depends on the length of the key. AES uses 10 rounds for
128-bit keys, 12 rounds for 192-bit keys and 14 rounds for
256-bit keys. Each of these rounds uses a different 128-bit
round key, which is calculated from the original AES key.
The schematic of AES structure is given in the following
illustration −
FIGURE 2: AES STRUCTURE
3.2 SECURE HASH ALGORITHM
Hash functions are extremely useful and appearinalmostall
information security applications. A hash function is a
mathematical function that convertsanumericalinputvalue
into another compressed numerical value. The input to the
hash function is of arbitrary length but output is always of
fixed length.
Values returned by a hash function are called message
digest or simply hash values. Family of SHA compriseoffour
SHA algorithms; SHA-0, SHA-1, SHA-2, and SHA-3. Though
from same family, there are structurally different.
The original version is SHA-0, a 160-bit hash function, was
published by the National Institute of Standards and
Technology (NIST) in 1993. It had few weaknesses and did
not become very popular. Later in 1995, SHA-1 was
designed to correct alleged weaknesses of SHA-0.
4. MATHMATICAL MODEL
Let Assume S be the system which execute Self Destruction
of Data in Cloud Computing
S={s,e,X,Y,T,Fmain,NDD,DD,Success,Failure}
 S(System) = Is our proposed system which
includes following tuple.
 s (initial state at time T ) = GUI of search engine.
The GUI provides space to enter a query/input for
user.
 X (input to system) :- Input Query. The user has to
first enter the query. The query may be ambiguous
or not. The query also represents what user wants
to search.
 Y (output of system) :- List of URLs with Snippets.
User has to enter a query into search engine then
search engine generates a result which contains
relevant and irrelevant URL’s and their snippets.
 T (No. of steps to be performed) :- 6. These are
the total number of steps required to process a
query and generates results.
 fmain(main algorithm) :- It contains Process P.
Process P contains Input ,Output and subordinates
functions. It shows how the query willbeprocessed
into different modules and how the results are
generated.
 DD (deterministic data):- It contains Database
data. Here we have considered MySQL, SQLite
which contains number of queries.Suchqueriesare
user for showing results. Hence, SQLite is our DD.
 NDD (non-deterministic data):- No. of input
queries. In our system, user can enter numbers of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 394
queries so that we cannot judge how many queries
user enters into single session. Hence, Number of
Input queries are our NDD.
 Memory shared: - MySQL. MySQL will store
information like User Authentication, Performing
Operations likeUser can upload the file. User can
delete his own file by using secret pin.Since it is the
only memory shared in our system, we have
included it in the MYSQL.
 CPUcount: - 1. In our system, we require 1 CPU for
server.
 Success = successfully recommended best system
as per user’s interest
 Failure = If application will not send the
notification to user it will fail.
SUBORDINATE FUNCTIONS:
Let Assume S be the system which executeSelf Destruction
of Data in Cloud Computing
S={s,e,X,Y,Fmain,NDD,DD,Success,Failure}
Where
s=Start State
e=End State
X={Set Of Inputs}
X = {x1,x2,x3}
x1= Login credentials
x2= File that is to be uploaded
x3= Secret pin on download and delete
request.
Y={Set of Outputs}
= {y1,y2,y3}
Where, y1= Encrypted file will be uploaded
y2= Hashcode of the file
y3= On download decrypted file will be
downloaded.
Fmain = {Set of procedure}
= {f1,f2,f3,f4,f5,f6}
Where
f1= Take x1 Input
f2= Give y1 Output
f3= Take x2 input
f4= Give y2 output
f5= Take x3 input
f6= Give y3 output
State Transition Diagram:
Fig: State Transition Diagram
Where,
s=input state
x=query
q1= Login credentials
q2= Encrypted file will be uploaded
q3= File that is to be uploaded
q4= Hashcode of the file
q5= Secret pin on download and delete request
q6= On download decrypted file will be
downloaded
Explanation
 The q1 state accept the ambiguous query ‘x’ from
the state ‘s’ which is our initial state
 The q3 state will be forFile that is to be uploaded
 State q4 for Hashcode of the file
 The q2 state is meant for storing Login
credentialsof user,which storesthequeryxwhichis
accept in state q1. The query stores in state q2
encrypted file will be uploaded and send tostateq3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 395
 State q5 for inserting secret pin on download and
delete request
 The q6 for downloading decrypted file.
[1] X. Fu, Z. Wang, H. Wu, J. qi Yang, and Z. zhao Wang,“How
to send a self-destructing email: A method of self-
destructing email system,” in Prof. of the IEEE
International Congress on Big Data, 2014, pp.304–309.
[2] R. D. Binns, D. Millard, and L. Harris, “Data havens, or
privacy sans frontieres?: a study of international
personal data transfers,” in Proc. Of theACMconference
on Web science (WebSci), 2014, pp. 273–274.
[3] R. Lu, H. Zhu, X. Liu, J. Liu, and J. Shao, “Toward efficient
and privacy preserving computing in big dataera,”IEEE
Network, vol. 28, no. 4,pp. 46–50.
[4] M. Arafati, G. G. Dagher, B. C. M. Fung, and P. C. K. Hung,
“Dmash: A framework for privacy-preservingdata-as-a-
service mashups,” in Proc. of the 8th IEEE International
Conference on Cloud Computing (CLOUD), 2014.
3. CONCLUSIONS
This system is maintaining data theft. Reduce the data
tracking. With the help of Hash code, algorithm data is
divided into three different chunksand stored intodifferent
location so data load will be managed and provide the fast
performance. This system is avoiding data duplication and
reduce wastage of space.
REFERENCES

Weitere ähnliche Inhalte

Was ist angesagt?

Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
IAEME Publication
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
IAEME Publication
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 

Was ist angesagt? (20)

Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Br36413417
Br36413417Br36413417
Br36413417
 
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...
 
50120130405028
5012013040502850120130405028
50120130405028
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Secry poster
Secry posterSecry poster
Secry poster
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
C017421624
C017421624C017421624
C017421624
 

Ähnlich wie Review and Analysis of Self Destruction of Data in Cloud Computing

Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
 

Ähnlich wie Review and Analysis of Self Destruction of Data in Cloud Computing (20)

IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Kürzlich hochgeladen (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Review and Analysis of Self Destruction of Data in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 391 Review and Analysis of Self Destruction of Data in Cloud Computing Pradnya Harpale1, Mohini Korde2, Bhagyashree Pawar3, Pritam Kore4, S.H.Patil5 1,2,3,4 Dept. of Computer Engineering, JSPM’s Jayawantrao Sawant College of Engineering, Pune, Maharashtra ,India 5 Prof. Dept. of Computer Engineering, JSPM’s Jayawantrao Sawant College of Engineering, Pune, Maharashtra ,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is the most emerging technology today which is used by most of the social media sites to store the data. The data stored on the cloud is private data of the user so it must not be tampered by other entities. We propose a system to enhance the security, the data uploaded by a user is shuffled between the number of directories within cloud after a particular interval of time to avoid the tracking of the data. The backup of the data will be taken timely into the backup directory. The proposed system enhances the security as well as the ease to use the cloud. Key Words: Centrality, Cloud security, Fragmentation, replication, performance, Secure HashAlgorithm(SHA), Advanced Encryption Standard(AES),Cloud Computing. 1. INTRODUCTION Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage, and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is storedinit.Whenthe utilization of such private cloud storage increases,therewill be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth.Thekeyidea behind this Application is to develop a dynamic load balancing algorithm based on deduplication to balance the load across the storage nodes during the expansion of private cloud storage. Cloud computing is the most emerging technology today which is used by most of the social media sites to store the data. The data stored on the cloud is private data of the user so it must not be tampered by other entities. We propose a system to enhance the security, the data uploaded by a user is shuffled between the numbersof directorieswithincloud after a particular interval of time to avoid the trackingofthe data. The backup of the data will be taken timely into the backup directory. The proposed system enhances the security as well as the ease to use the cloud. 2. PROPOSE SYSTEM In proposed system, we collectively approach the issue of security and performance as a secure data replication problem. The division of a file into fragments is performed based on a given user criteria. Divided File can store in different nodes. In such a scenario, the security mechanism must substantially increase an attacker’s effort to retrieve a reasonable amount of data even after a successful intrusion in the cloud. Moreover, the probable amount of loss (as a result of data leakage) must also be minimized. Security is one of the most crucial aspects among those prohibiting the widespread adoption of cloud computing. Cloud security issues may stem due to the core technologies implementation (virtual machine ). The data outsourced to a public cloud must be secured. Unauthorized data accessby otherusersandprocessesmust be prevented. The main aim of our project is secure the files store on cloud. The division of a file into fragments is performed based on a given user criteria. Asuccessfulattack on a single node must not reveal the locations of other fragments within the cloud. To keep an attacker uncertain about the locations of the file fragmentsand to further improve the security.Weselectthe nodes in a manner that they are not adjacent and are at certain distance from each other. To improve data retrieval time, the nodes are selected based on the centrality measures that ensure an improved access time. We develop a scheme for outsourced data that takes into account both the security and performance. The proposed scheme fragments and replicates the data file over cloud nodes. The proposed DROPS scheme ensures that even in the case of a successful attack, no meaningful information is revealed to the attacker. We do not rely on traditional cryptographic techniques for data security. The non- cryptographic nature of the proposed scheme makes it faster to perform the required operations (placement and retrieval) on the data. We ensure a controlled replication of
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 392 the file fragments, where each of the fragmentsisreplicated only once for the purpose of improved security. In this system mainly consist of three modules:  Owner  User  Cloud Admin Owner-In these owner modules, owner add the multiple users in the cloud system. Owner also uploads the text files in the cloud storage. He can delete the files. User-In user module, user completes the registration process and login the system. He can upload the text fileson cloud storage. He can delete, update or modify the files Cloud Admin-In this module, the views the all status, views user, view owner, and reports send back. The Cloud admin module file can fragmentsusing the fragmentplacementand fragments replication algorithms. FIGURE 1 : SYSTEM ARCHITECTURE 3. ALGORITHM 3.1 T-COLORING ALGORITHM FOR FRAGMENTS ALLOCATION: Using DROPS method file split into various fragment. For Security and Optimal Performance in cloud Division and Replication is used. When selecting the node in cloud keeping focus on performance and security. For enhanced accesstime we have to choose central nodesofferedincloud storage. DROPS technique uses centrality to reduce access time. T-coloring technique selects nodes in cloud for fragment placement by keeping focus on performance and security. The central node in cloud network gives improved access time. The DROPS method utilize centrality concept to decrease the access time. Centrality concludes central node based on various measures. T-coloring restricts node selection at hop distance. T- coloring gives more security performance in the cloud. The fragments are stored in different node so location of fragments can’t able to determine. 3.2 FRAGMENT PLACEMENT Algorithm 1 Algorithm for fragment placement Inputs and initializations: O = {O1;O2; :::;ON} o = {sizeof(O1); sizeof(O2); ::::; sizeof(ON)} col = {open color; close color} cen = {cen1; cen2; :::; cenM} col _ open color¦ i cen _ ceni¦ i Compute: for each Ok > O do select Si S Si _ indexof(max(ceni)) if colSi = open color and si >= ok then Si _ Ok si _ si − ok colSi _ close color Si’_ distance(Si; T) P /*returns all nodes at distance T from Si and stores in temporary set Si’*/ colSi. _ close color end if end for 3.2 FRAGMENT’S REPLICATION In addition to placing the fragmentson thecentralnodes,we also perform a controlled replication to increase the data availability, reliability, and improve data retrieval time. We place the fragment on the node that provides the decreased access cost with an objective to improve retrieval time for accessing the fragments for reconstruction of original file. While replicating the fragment, the separation of fragments as explained in the placement technique throughTcoloring, is also taken care off. In case of a large number of fragments or small number of nodes, it is also possible that some ofthe fragmentsare left without being replicatedbecauseoftheT- coloring. As discussed previously, T-coloring prohibits to store the fragment in neighborhood of a node storing a fragment, resulting in the elimination of a number of nodes to be used for storage. In such a case, only for the remaining fragments, the nodes that are not holding any fragment are selected for storage randomly. The replication strategy is presented in Algorithm 2. To handle the download request from user, the cloudmanager collects all thefragmentsfrom
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 393 the nodes and re-assemble them into a single file. Afterwards, the file is sent to the user. Algorithm 2 Algorithm for fragment’s replication for each Ok in O do select Si that has max(Ri k +Wi k) if colSi = open color and si >= ok then Si _ Ok si _ si − ok colSi _ close color Si’_ distance(Si; T) P /*returns all nodes at distance T from Si and stores in temporary set Si’*/ colSi. _ close color end if end for 3.2 ADVANCE ENCRYPTION STANDARD (AES) AES is an iterative rather than Feistel cipher. It is based on substitution–permutation network’. It comprisesof a series of linked operations, some of which involve replacinginputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treatsthe 128 bitsof a plaintext block as 16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matrix – Unlike DES, the number of rounds in AES is variable and depends on the length of the key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. The schematic of AES structure is given in the following illustration − FIGURE 2: AES STRUCTURE 3.2 SECURE HASH ALGORITHM Hash functions are extremely useful and appearinalmostall information security applications. A hash function is a mathematical function that convertsanumericalinputvalue into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length. Values returned by a hash function are called message digest or simply hash values. Family of SHA compriseoffour SHA algorithms; SHA-0, SHA-1, SHA-2, and SHA-3. Though from same family, there are structurally different. The original version is SHA-0, a 160-bit hash function, was published by the National Institute of Standards and Technology (NIST) in 1993. It had few weaknesses and did not become very popular. Later in 1995, SHA-1 was designed to correct alleged weaknesses of SHA-0. 4. MATHMATICAL MODEL Let Assume S be the system which execute Self Destruction of Data in Cloud Computing S={s,e,X,Y,T,Fmain,NDD,DD,Success,Failure}  S(System) = Is our proposed system which includes following tuple.  s (initial state at time T ) = GUI of search engine. The GUI provides space to enter a query/input for user.  X (input to system) :- Input Query. The user has to first enter the query. The query may be ambiguous or not. The query also represents what user wants to search.  Y (output of system) :- List of URLs with Snippets. User has to enter a query into search engine then search engine generates a result which contains relevant and irrelevant URL’s and their snippets.  T (No. of steps to be performed) :- 6. These are the total number of steps required to process a query and generates results.  fmain(main algorithm) :- It contains Process P. Process P contains Input ,Output and subordinates functions. It shows how the query willbeprocessed into different modules and how the results are generated.  DD (deterministic data):- It contains Database data. Here we have considered MySQL, SQLite which contains number of queries.Suchqueriesare user for showing results. Hence, SQLite is our DD.  NDD (non-deterministic data):- No. of input queries. In our system, user can enter numbers of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 394 queries so that we cannot judge how many queries user enters into single session. Hence, Number of Input queries are our NDD.  Memory shared: - MySQL. MySQL will store information like User Authentication, Performing Operations likeUser can upload the file. User can delete his own file by using secret pin.Since it is the only memory shared in our system, we have included it in the MYSQL.  CPUcount: - 1. In our system, we require 1 CPU for server.  Success = successfully recommended best system as per user’s interest  Failure = If application will not send the notification to user it will fail. SUBORDINATE FUNCTIONS: Let Assume S be the system which executeSelf Destruction of Data in Cloud Computing S={s,e,X,Y,Fmain,NDD,DD,Success,Failure} Where s=Start State e=End State X={Set Of Inputs} X = {x1,x2,x3} x1= Login credentials x2= File that is to be uploaded x3= Secret pin on download and delete request. Y={Set of Outputs} = {y1,y2,y3} Where, y1= Encrypted file will be uploaded y2= Hashcode of the file y3= On download decrypted file will be downloaded. Fmain = {Set of procedure} = {f1,f2,f3,f4,f5,f6} Where f1= Take x1 Input f2= Give y1 Output f3= Take x2 input f4= Give y2 output f5= Take x3 input f6= Give y3 output State Transition Diagram: Fig: State Transition Diagram Where, s=input state x=query q1= Login credentials q2= Encrypted file will be uploaded q3= File that is to be uploaded q4= Hashcode of the file q5= Secret pin on download and delete request q6= On download decrypted file will be downloaded Explanation  The q1 state accept the ambiguous query ‘x’ from the state ‘s’ which is our initial state  The q3 state will be forFile that is to be uploaded  State q4 for Hashcode of the file  The q2 state is meant for storing Login credentialsof user,which storesthequeryxwhichis accept in state q1. The query stores in state q2 encrypted file will be uploaded and send tostateq3
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 395  State q5 for inserting secret pin on download and delete request  The q6 for downloading decrypted file. [1] X. Fu, Z. Wang, H. Wu, J. qi Yang, and Z. zhao Wang,“How to send a self-destructing email: A method of self- destructing email system,” in Prof. of the IEEE International Congress on Big Data, 2014, pp.304–309. [2] R. D. Binns, D. Millard, and L. Harris, “Data havens, or privacy sans frontieres?: a study of international personal data transfers,” in Proc. Of theACMconference on Web science (WebSci), 2014, pp. 273–274. [3] R. Lu, H. Zhu, X. Liu, J. Liu, and J. Shao, “Toward efficient and privacy preserving computing in big dataera,”IEEE Network, vol. 28, no. 4,pp. 46–50. [4] M. Arafati, G. G. Dagher, B. C. M. Fung, and P. C. K. Hung, “Dmash: A framework for privacy-preservingdata-as-a- service mashups,” in Proc. of the 8th IEEE International Conference on Cloud Computing (CLOUD), 2014. 3. CONCLUSIONS This system is maintaining data theft. Reduce the data tracking. With the help of Hash code, algorithm data is divided into three different chunksand stored intodifferent location so data load will be managed and provide the fast performance. This system is avoiding data duplication and reduce wastage of space. REFERENCES