Data Protection As A Server Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Giving solid data protection to the cloud user while using data applications is a challenging mission. Here we come across a new architecture in cloud computing platform called Data protection in the service, which reduces the pre application development effort to offer data protection in cloud computing, while the rapid development and maintenance are still in consistence. There are many software companies coming forward to develop software, which gives a complete protection to the cloud computing but still there are draw backs in each design. The cloud computing has lot of demand among companies that use multiple data. Cloud computing is nothing but storing the users data in a remote data storage device with the help of cloud server. There are many cloud servers in the present world some charge fee to use the server and some don't. There are many advantages and disadvantages using this cloud computing. Security is the major issue in cloud computing so in order to rectify the issue, a new system is proposed which is called Data protection as a server, which is discussed in the later context.

Introduction:

In cloud computing the data from the users or the clients are stored in a remote data storage location with the help of Internet. The user anytime and anywhere can access this data, but the only thing is that he should have a device, which is connected to the Internet. Many IT companies are being benefited by this cloud computing. IT companies have large data in exchange and large data to store, they cannot always upgrade the storage device for the addition of every new data so this cloud data storage servers help them to use the cloud storage as their data holding device. There are two sides in cloud computing the first is the technical side and the second is the legal side. The technical side of cloud server is always being monitored. Each server is connected to few other remote servers because if there is any crash in one of the server, all the data, which it holds, is transfers to other server. In cloud computing remote server and end user are not enough it should also have a speed medium, which connects both the parties and does the work in real time that makes the user confident about his data being secure. The other side is the legal side where it deals with the policies of the cloud servers and the end users. This task is a highly risky because if there is any mislead, it deals with huge amount of loss. Cloud computing is completely a new technology to the world and it has lot of challenges to face. Every time each challenge is rectified and made better from its best.

Aims:

To give protection to the data in cloud server.

Make sure the user data is not corrupted.

Data wont leak to any unauthorized users.

User should easily understand the platform or application code is running

The data must be encrypted and easily retrievable by the user

Objectives:

To propose a model which satisfies all the above aims.

To create user-friendly screen for the data entry to handle large volume of data.

To write an application that protects the user data in the cloud server. Providing it with same economics of scale for security and privacy

Giving independent checking for both platform operation and runtime of the application so that the user gains confidence that the data is being handled properly.

Literature Survey:

Literature survey is very important while designing software. Before developing the application it is needed to determine the time, capital, and strength of the subject. After justifying the factors its time to decide which OS and language is used to create the application. Once the application is being build, we need a lot of support from the resources, which can be books, Internet, expertise, and programmers. In order to build a proposed system the above considerations are taken into account. In order to propose a system we need to know the drawbacks of the system that can be known by research, which is in the later context.

From the above picture it is clear that how the cloud computing works. The name cloud computing is originated from the image of cloud as shown in the above figure. Here the medium, which acts as a bridge to the remote server and all the other devices, is INTERNET. Through cloud computing the user can access the data from anywhere. "The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at datacenters" Prof. Yi Pan (2012). If he doesn't have space on his device to store the data he can send the data to the cloud server, which is also called remote server. In cloud computing when we need more computing power we can increase the scale of computing server and if we don't want we can reduce the scale of computing server. In cloud computing we only pay for what we use and with cloud hosting you can stop worrying about the hardware. "Fear of the Cloud" Chow et al (2009) in his book he categorize security concerns into three concerns, availability, security and third party data control.

cloud computing saves time and money. There are four different types of cloud servers

Private cloud computing

Public cloud computing

Hybrid cloud computing

Community cloud computing

"Private cloud computing

It is a data canter that is dynamically provisioned which delivers servicers to the particular businesses. In private cloud the organisations data stays in the organisation server it is not provided on third party (internet) and it makes integration with other systems much easier. Some organisations own them but they also pay for the extra privileges.

Public cloud computing

This cloud server offers anything from a simple personal storage to complex data files of enterprise services. Public cloud consists of data centers owned by service providers and managed the infrastructure and they sell it to the third party. This is where the public cloud scores from a customer's point of view it got a clear price advantage over private cloud because the cost of infrastructure is share among many users.

Hybrid cloud computing

Hybrid cloud marries the advantages of both the approaches and it's fundamentally about insuring that works loads are managed are the most appropriate infrastructure.

Community Cloud Computing

The cloud is basically the mixture of one or more public, which is shared by many organization for a same cause (mainly for security). The Body is to be shared by several organizations within specific community with common security, agreement objectives. It is managed by third party or managed internally. Its cost is lesser then public cloud but more than private cloud." (http://en.wikipedia.org/wiki/Cloud_computing).

Project Description

The main aim of the project is to give security and privacy to the data, which is stored in the cloud storage server by using Data protection as a server (DPaaS). "Security has always been the main issue for IT Executives when it comes to cloud adoption" Frank Gens IDC (2008). The main technology used in this proposal is Java Technology that is described in later module.

Module Description:

Cloud computing

Trusted platform module

Third party

User module

Cloud computing

Cloud computing is supplying the dynamically accessible and more virtualized supplies as a service over the Internet. Used need not have the knowledge on who is controlling the technology infrastructure and about the expertise in the 'cloud' which supports the user. Cloud computing changed every thing the ways we store information and run applications. Every thing is hosted in the clouds. Instead of hosting data or info in a single desktop computer. Internet is the medium between group of computers and servers to access each other.

The following characteristics are shown by cloud computing:

Agility (quick to comprehend) improves with the user ability to re provision technology resources.

Multi tenancy (serving multiple) sharing of assets and cost.

Utilization and efficiency improvements for systems that are used around 20% only.

Reliability (trusting) cloud computing is suitable for business progress and disaster recovery. Multiple non-functioning sites are automatically removed from server.

Security could improve because the data is centralized, increased security focused resources. But some times there will be loss of control over complex data and the absence of security for stored data. Security is sometimes good or better then regular systems. The providers are solving the security issues, which are not affordable by the customers. Here in cloud computing the complexity of security issues is greatly increased because the data is distributed on a wide area and in multiple tenant system. Many people get access to a single server and multiple data is stored in single server there will be a chance of misleading some ones data to some other. Sometimes user access to the security audit logs may be difficult or impossible. This motivates the users to install a private cloud to regain their control over infrastructure and avoid losing data or information security.

Maintenance of cloud storage computing is very easy because they do not need to be installed on each users computers and can be accessed from different places.

Trusted Platform Module

Trusted platform module (TPM) the name it self says that it deals with a secure crypto processor which is added to the data that helps to protect the information

Disk encryption is a method that converts the data into code, and makes it unreadable which protects the information from unauthorized people. Disk encryption is software that encrypts every bit of data that goes to store in hard disk or disk volume. This disk encryption avoids unwanted users from accessing the data storage. There is an option which is called full disk encryption that is used to encrypt the whole hard disk it can encrypt bootable operating systems but it wont encrypt master boot record there are some hard ware based full disk encryption which can encrypt the whole boot system including master boot record

Third Party Auditor

Here in the module, the auditor views all the data of the user and checks the data and also sometimes changes the data in case of necessary. Auditor has full access to the data and he can view the data without the key. Admin provides permission to the auditor. Once the data is viewed by the auditor and after auditing the data it is stored in the cloud.

User Module

With the help of the secure key the user gets access to view the data, which is stored in large amounts in the cloud. The administrator provides the secure key after the data is encrypted. Using TPM encryption of data is done. User stores the data after it is verified, viewed and corrected by the auditor. User again can view data but this time the administrator provides the message to user only to change the data.

Existing System:

Cloud computing ensures easier maintenance, instant scaling, cheap cost, and availability of service anywhere and anytime. "In cloud computing, everything is delivered as a Service (XaaS), from testing and security, to collaboration and metamodeling" Bhaskar P (2011). But there is a major task to make sure and construct confidence that the cloud securely handles the user data. A survey of Microsoft recently found that "58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more then 90 percentage are worried about its security, availability, and privacy of their data as it rest in the cloud" Lance Whitney (2010). The main concern of the existing system is the Security. There is no security for a data in cloud servers one can easily hack the data from the cloud server.

The above figure shows the basic protocol of cloud computing. Here the host is connected to the router, which is connected to the network cloud also called as Internet and further connected to the cloud router that is connected to the cloud server. The issue is that, is privacy and security is given to the data stored in cloud server?.

There are three main advantages in cloud computing they are scalability, instant, and saving money. There are also dis advantages in using cloud computing like retrievability of data, timely access, hacking of data Out of all the issues, security is the major concern in cloud computing.

Proposed System:

The new proposed system in cloud computing paradigm is, DATA PROTECTION AS A SERVER (DPaaS) is a suit of security primitives offered by the cloud-computing platform, which enables data security, privacy, and offers evidence of privacy to the data owner, even in the presence of possibly negotiated or malicious application. Here using encryption, logging in, and key management data in cloud server is made secured. "Symmetric Encryption permits a user to selectively search the data that the user hosted in the cloud" Curtmola (2006). The data is encrypted and saved in the server only the user can decrypt the data.

Macintosh HD:Users:samuelgodi:Movies:Hitchcock.2012.WEBRip.Xvid.AC3-VoXHD:PP :doc:Screen Shot 2013-04-20 at 11.51.14.png

DATA PROTECTION AS A SERVER (DPaaS)

The system proposes that whenever the user stores the data in the cloud server it should go through few steps to secure and make the data privacy in the server. In a normal scenario the user logs into his cloud server account and stores the data and there is no guarantee that the data is given security and privacy in the stored location. There is no information given to the user after he stores the data in the storage location. So in order to secure the data the following procedure is followed. First the user logs into his account and uploads the data, which has to be stored. Second comes the auditor where it views all the user data, secure the user data with encryption code and possible changes or no changes are made and then it is stored in the cloud server. And finally the administrator updates status of the data by notifying the user with a key, if at all he wants to edit or view his data. When the user wants to retrieve or view the data again, it is administrator that gives access to the user to view data when the user inputs the correct key that is sent by the administrator. Once the key is accepted the user can view his data. This builds the confidence in the user while using the cloud server. This proposed system minimizes the risks in the cloud computing. It provides encryption and key for the user to view to the data in cloud server. This system helps data from being viewed by hackers and unauthorized persons. The following figure gives the idea of proposed system.

System requirements:

H/W System configuration

Processor -Pentium-III

Speed -1.1 G Hz

RAM -256 MB (min)

Hard Disk -20 GB

Computer -Keyboard, Mouse, Monitor

Peripherals

S/W system Configuration

Operating System -WindowsVista/windows7/windows8.

Application Server -TomCat 5.0/6.X.

Front End -HTML, Java, Jsp.

Scripts -JavaScript.

Server Side Script -Java Server Pages.

Database -MySQL.

Database Connectivity -JDBC.

Software Environment:

Java Tech

Java Technology is a programming language as well as a platform. The java programming language is considered as a high level language, which is characterized by the following catchwords:

Simple

Architecture neutral

Object oriented

Compact

Circulated

High performance

Inferred

Multithreaded

Full-bodied

Dynamic

Secure

Most of the computer programming language are either compile or interpret a program so you can run on the computer but it is different in java programming language here this language is both complied and interpreted. With the help of the compiler you need to first translate the program in to intermediate language called Java Byte Codes. The interpreter in the java platform interprets the codes. Each changed code is debugged on the computer. In java platform the compilation occurs only once but the interpretation occurs every time hen the program is executed. The below figure explains how it works.

g1

Java byte codes are the machine code instruction for the java virtual machine (Java VM). Java interpreter whether it is a developer tool or a web tool which are the implementation of the Java VM. In java code the main advantage is "write once and run anywhere" is possible. Any computer that has a java compiler can run java byte code. The byte code can then be run on any implementation of the java VM. This means if a computer has a Java VM, the same program written in the java programming language can run on Windows XP, a Solaris Workstation or on a iMac.

helloWorld

The Java Platform

A platform is nothing but hardware or a software medium in which a program runs. There are some platforms that are most popular like windows XP, Linux, Solaris, and Macintosh. Platforms are known as the combination of both hardware and operating system. The java software is different from many other computer language software.

There are two main constituents in java

Java Virtual Device

Java Application Programming interface

Java API is ready-made software, which provides functions such as, GUI graphical user interface. This API has libraries that are known as Packages. You are already introduced to java VM.

As java is a high level language it is also a powerful software platform. Using the substantial API, one can write many types of program. We can create a program to build a security protocol that helps to protect the data in the cloud server. The java is widely used in the network application software because it provides features like.

The essentials such as the threads, input and outputs, data structure, properties, time and date, and so on.

Networking in which they use URL's, Transmission control protocol, user data gram protocol, Internet protocol.

The programs are written in such a way that any user from any operating system can use it worldwide. It adopts the locales and use the appropriate program language this is called internationalization.

Security is in both high level and low level it includes electronic signature, public and private key management, access control and certificates.

Java Data base connectivity (JDBC) provides uniform access to a wide range of relational database.

System Design:

Macintosh HD:Users:samuelgodi:Desktop:Screen Shot 2013-04-24 at 21.33.02.png

Input design

Here the input design is the connection between the server and the user. It consists of the specifications and procedures for the developing the steps which helps to move data from the user to the server in a secured fashion. The design of input focuses on handling the input data, controlling the errors, avoiding slowness or delays and keeping the process simple. The input designs in such a way that it provides security and ease the use with giving the privacy.

Objectives of Input Design

Input design is to process of converting a user description input in to a computer-based system.

It avoids the errors in the data input process and shows the correct format from the computerized system.

Creating user-friendly software that can be easily understandable by the new users.

Providing recording and viewing facilities.

Output design

A Quality output is one that meets the requests of the end user and displays the data clearly. A system is said to be functioning when there is a communication between the user and the other system. In an output design the information is displayed crystal clear which is one of the important act to the user. Efficient, secured and intelligent output design helps to improve the relation between the user and the system.

Objectives of Output Design

Select method for presenting information.

Convey information about the data and update the status of the data.

Signal events, problems, or warnings.

Trigger an action.

Confirm an action.

Statement of Ethics:

In this project the main principal is to give security and privacy to the data to store in the cloud server. The data is safeguarded with encryption and an access key. The project is genuinely undergone by me in a safe surrounding and done with awareness about plagiarism and this is individual project with step process for the development of the project. This is the software-based problem and it does not affect any environmental conditions.

Conclusion:

All the private data moves online, the need of security has increased in recent days. Here adding protection to a single cloud platform can benefit hundreds of thousands of application and, by extension, hundred of millions of users. The focused here is on a particular section that is security and privacy-sensitive classes of application. The project is a security application that is design to give protection to the data in the cloud server. Security is the major concern in the present world scenario and is taken into consideration while designing the application. In order to increase the security option we consider the model called Data Protection As a Server (DPaaS) this is an interactive process with has different steps that make the data encrypted and store in the server. In this, encryption and the user key are consider as the model parameters. In this model the data is checked by the admin and stored in the server. This method can provide maximum security and privacy to the data compared with the existing system.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.