Enhancing Cloud Computing Security by Using Pixel Key Pattern

Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems.


INTRODUCTION
Cloud computing is here. With its new way to deliver services while reducing ownership, improving responsiveness and agility, and especially by allowing the decision makers to focus their attention on the business rather than their IT infrastructure, there is no organisation that has not though about moving to the Cloud. Several surveys from Gartner have shown the importance of cloud computing ranking it as the top priority for CIOs in 2010 [GAR11] [1], also demonstrating the effort they are doing to adopt it by increasing their expenditures on cloud computing services [GAR10a]. There are several benefits, especially on infrastructure costs, but, as with all new technologies, cloud computing also has some drawbacks.
The move to the Cloud is a crucial step for any company, but has to be made with a lot of caution because it could turn against users. Organisations need to clearly understand the benefits and challenges, especially for the most critical applications. There are several concerns but, as shown in an IDC survey about the issues of the Cloud [GEN09], security is the main concern. The question is why security is such a complicated challenge in the decision of moving to the Cloud. The answer is easy: lack of control over their data.
When an organisation decides to move to the Cloud the data is no longer on their hands. Even if they just use the Cloud for processing and not storage, they are taking the data outside their private perimeter. IT infrastructures have been deperimeterized, so security needs to be approached from another perspective; but this blurring of the perimeter is not the only issue.

RESEARCH MOTIVATION
Security [2] is the key for the Cloud success. As many surveys show [GEN09, IDC11], security in the cloud is now the main challenge of cloud computing. Until a few years ago all the business processes of organisations were on their private infrastructure and, though it was possible to outsource services, it was usually non-critical data/applications on private infrastructures. Now with cloud computing, the story has changed. The traditional network perimeter is broken, and organisations feel they have lost control over their data [REE09]. New attack vectors have appeared, and the benefit of being accessible from anywhere becomes a big threat.
Many of the cloud computing issues are similar to the old ones but in a new setting [CHO09]. This requires re-assessing the risks related to each of the critical areas considering the new hazardous environment. The Cloud Security Alliance (CSA) defines 12 areas of concern for cloud computing [CSA09a] divided into two broad categories: governance and operations. All of these areas are critical and should be taking in consideration when evaluating the security of a cloud environment.
Amongst resilience and agility [4], the low costs that provide cloud computing is a real hook for companies trying to reduce costs. Start-ups looking for a place in the market pray for an economic solution that allows them to focus on their business without worrying on maintain an IT infrastructure.
With multi-tenancy resources are shared by multiple users. For example, two or more tenants could have their OSs running on the same server or two or running an instance of the same application with different data. Depending on the cloud deployment model the level of importance and sharing of multi-tenancy would be different [CSA09]; but without any doubt Infrastructure-as-a-Service (IaaS) in public clouds creates the most risks off all. M a y 1 6 , 2 0 1 5

Mrinal Kanti Sarkar, Trijit Chatterjee(2014):
The main objective of this study is to prevent data access from cloud data storage centers by unauthorized users. This scheme perfectly stores data at cloud data storage centers and retrieves data from it when it is needed. So, there are various issues that need to be addressed with respect to the management of data, service of data, privacy of data, security of data etc. But the privacy and security of data is highly challenging.

Sanjima Manocha, Sheveta Vashisht(2014):
This research work explores the basic features of data mining techniques in cloud computing and securing the data using edge detection method. This research work tries to integrate data mining techniques into cloud computing and image processing making it a hybrid approach.
Khushboo Gupta, Neha Goyal, Puneet Rani(2014): Among the various technologies of web Cloud Computing is one of the recent internet based computing technology. It provide us a virtual server and a huge size of database to store our data over the internet. Since it is easy to store and manage the data many organizations moving their confidential data into the cloud. But as it is an internet based technology we are concerning about the security related issues like hacking, stealing, misusing etc.

Monjur Ahmed and Mohammad Ashraf Hossain(2014):
This research presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest.
Sneha Arora, Sanyam Anand: In this paper, we proposed a technique to hide the text data into the color images using edge detection method. The alteration in edges cannot be distinguished well so edges can hide more data

PROBLEM STATEMENT
In the base paper, the author has tried to distribute the data into the multiple files before sending it to the cloud provider. The author has used the 3-step mechanism in which the client is sending his/her file to the gateway. Gateway is used to split the file into multiple parts. Afterwards, gateway is used to transfer the multiple files onto the cloud provider. The problem in the above said work is that when the client will send the original file to the gateway, then there is a possibility of file getting stolen by the third party (Man in the middle attack) without the permission of client, as shown in figure 1.

Figure 1 Man-In-the-Middle attack
Moreover, when the files are being stored at the cloud provider, there is a possibility of data mining attack on the files which will result in the useful information leaked from the cloud end. M a y 1 6 , 2 0 1 5

RESEARCH OBJECTIVES
Our main objective is to enhance the security between the client and the cloud provider by using pixel key pattern for the steganography and by using the cloud data distributor to split the single file into multiple fragments.


The security has a primary role in the services of Cloud computing because the data being transferred between the client and cloud provider is of utmost importance and thereby neither the client nor the cloud provider will sacrifice on the security of the cloud.


The data is enclosed in the image by the client itself before sending it to the cloud. The cloud provider will never come to know about the original data of the client.
 Moreover, the image sent by the client is divided into multiple parts by the Cloud data distributor.
 These fragments (multiple parts) are being stored over the cloud.
These objectives are stated to ensure the privacy of the client's data when it is being transferred, processed or stored at the cloud provider.

METHODOLOGY
This thesis aims to provide an understanding of the different attack vectors created by multi-tenancy and virtualization in a public IaaS cloud. The vectors will be explored, focusing on the threats arisen from different tenants coexisting in the same physical host. A critical analysis of the different vectors will be provided along with guidance on how to approach them. This analysis will be performed using previous works from different entities and authors, along with personal knowledge obtained from experience. As part of the aim of this research, a strong foundation will be provided on the terms of cloud computing, multi-tenancy and virtualization. All these areas will be explored giving a strong definition.
The different security issues will be also explored in order to provide an introduction to the main focus of the research.
• Client will enter the data that has to be sent to the Cloud Provider.
• Client will automatically choose the image in which the data will be encrypted using pixel key pattern technique of Steganography. The data is encoded inside the image so that it is saved from outside interference and misuse. (Hidden from outside world) • This encrypted/encoded image is then transferred to the gateway.
• Gateway will receive the file sent by the client and will split it into multiple files.
• Gateway will store the name of the files in the distribution table.
• Afterwards Gateway will transfer all the splitted files to the cloud provider for storage.
So, Using this approach, we have achieved two purposes.


If anyone tries to hack the data while transferring from client to the gateway, he/she will get only encoded image.


If anyone tries to perform the mining on the files stored at the cloud provider, no results will be retrieved During Downloading the file from cloud end, the client will follow the following steps: 1. Client will ask the gateway to download his/her stored file.
2. Gateway will forward the request to the cloud provider and cloud provider will send all the stored splitted files of that client to the gateway. M a y 1 6 , 2 0 1 5 8. else 9. find the next contour 10. convert the available matrix as well as the data into the bytes format.

11.
replace the redundant bits of the matrix with the bits of the data.

DECRYPTION ALGORITHM
1. client logins with the cloud provider.

2.
Client sends the name of the file to be downloaded to the gateway 3. Gateway forwards the request to the cloud provider.

4.
for all the fragments of the requested file.

5.
Cloud transfers the fragments to the gateway.

27.
Convert the data array to the string format.

Evaluation of the System
After implementing the proposed methodology, we have reached up to a solution that the cloud security can be enhanced by applying the steganography as well as data distribution on the client's data. The data sent/received by the client is of utmost importance and it needs to be handled carefully. We have been able to reduce the processing time, encryption time, processing cost which increases the overall efficiency of the system.

Accuracy of the System
Accuracy of the System can is enhance by measuring Processing time ,Cost and Data distribution as shown in the graphs below, which increases the overall efficiency of the system. From the above bar chart, it is clear that the processing time has been reduced. The processing time depending upon the size of the file. As the size of the file increases, the processing time will also increase. But we have been able to reduce the processing time of the proposed work as it will finally increase the overall efficiency of the system.

Figure 8 File Size v/s Cost
From the above bar chart, it is clear that the cost has been reduced. Usually Cloud Computing providers have detailed costing models which are used to bill users on pay per use basis The Cost depends upon the size of the file. As the size of the file increases, the Cost will also increase. But we have been able to reduce the Cost of the proposed work as it will finally increase the overall efficiency of the system.

Figure 9 File Size v/s Parts
From the above bar chart, it is clear that as the file size increases number of partitions of the file also goes on increasing which helps to secure data at the cloud end. As data is not present in one file so it cant be hacked by the third party easily which hence ensuring the data security.

CONCLUSION
The primary conclusion of our research is that adoption of user-centric security models and shifting certain parts of communication and computation to the client side allows us to provide the cloud consumers with more visibility and control over their resources. Therefore, using this approach not only the security and privacy concerns of cloud consumers can be addressed more effectively, but also the burden of managing end-users' identities and access control will be reduced from cloud service providers.