International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN 2321-3469
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 PROVIDING RESTRICTIONS AGAINST ATTACK AND CONGESTION CONTROL IN PUBLICINFRASTRUCTURE CLOUD Nousheen R1, Shanmugapriya M2, Sujatha P3,Dhinakaran D4 Student, Computer Science and Engineering, Peri Institute of Technology, Chennai, India 1,2,3 Assistant professor, Computer Science and Engineering, Peri Institute of Technology, Chennai, India 4 ABSTRACT: Cloud computing is current trend in market .It reduce the cost and complexity of service providers by the means of capital and operational cost.It allows users to access application remotely. This construct directs cloud service provider to handle cost of servers, software updates,etc. If the session tokens are not properly protected, an attacker can hijack an active session and assume the identity of a user. To focusing on session hijacking and broken authenticationOTP is generated it will send user mail.Once the user is authenticatedthey will be split into virtual machine it is initiate to the upload process into the cloud.Thecloud user files are uploaded and stored in domain based .Also in our proposed system encryption keys are maintained outside of the IaaS domain.For encryption, we proposed RSA algorithm .For data owner file encryption, we use camellia algorithm. Finally the files are stored in the public cloud named CloudMe. Keywords: Cloud computing, session hijacking, OTP, Virtual machine, Iaas, CloudMe [1] INTRODUCTION Cloud computing is an information technology(IT) standard that enables universal access to share group of configurable system resource and higher-level services that can be quickly provisioned with minimal management effort, often over the internet. Cloud providers Nousheen R, Shanmugapriya M, Sujatha P,Dhinakaran D 1 PROVIDING RESTRICTIONS AGAINST ATTACK AND CONGESTION CONTROL IN PUBLICINFRASTRUCTURE CLOUD typically use a “pay-as-you-go” model which can lead to unexpected operating expenses if administrators are not comfortable with cloud-pricing models. Companies can greatly reduce IT costs by off –loading data and computation to cloud computing services mostly, due to outstanding concerns. Closed platform can give creators complete control over the structure and difficulty of the software stack, thus they can alter it to their security requests. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user’s computer and can be accessed from different places (e.g., different work locations, while travelling, etc.). Infrastructure as a service (IaaS) refers to online services that provide high -level APIs used to dereference various low –level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. IaaSclouds often offer additional resources such as virtual –machine disk –image library, raw block storage, file or object storage, firewall, load balancer, IP addresses virtual local area networks (VLANs), and software bundles. Cloud computing has improved an idea to enormous deployment in various application domains. The difficulty of cloud computing introduce innovative security risk and challenges. Session hijacking is used to gain unauthorized access to information or service in a computer system by managing the user name and password. This proposes, a session hijacking attacks detection mechanism by periodicallymonitoring the received signal strengthvalues for a particular MAC addresses. The advantage is that it makes difficult for an attacker to avoid detection by modifying its transmission power since, it is difficult for the attacker to predict the use’s data. The need for operational and cost –effective cloud platform security mechanism is suitable for organisations that depend on cloud infrastructure. For the security of data the files are encrypted and stored in virtual machine. A set of protocols for launch of virtual machines (VM) in IaaS, which provide user with a proof that the requested VM instances were impelled on a host with an expected software stack. The domain –based storage protection protocol is introduced to allow domain manager’s to store encrypted data.An attacks applicable toIaaS environment and use them to develop protocols with preferred security stuffs, implement the security analysis and prove their conflict besides the attacks. [2] EXISTING SYSTEM In the existing system, the result offers cloud occupiers a proof regarding the integrity of computer hosts understanding their portion of the cloud infrastructure. Also no secure framework in cloud environment to deliver security against cloud attacks. The user’s files and data are stored in the single virtual machine and this leads to the congestion during the file request and response. VM environment can select to encrypt data on the operating system (OS) level within their datacentres. This method suffers from several drawbacks: first, the computer host will have right to use encryption keys whenever the VM performs cryptographic operations; second, this shift near the tenant burden of sustaining the encryption software in all their VM instances and increases the attack surface; third, this involves injecting, migrating and later securely extracting encryption keys to each of the VM instances with right to use the encrypted data, increasing the possibility than an attacker finally obtains the keys. In most cases cloud providers continues and manage the keys needed for encryption of data at rest. Then the cloud convolutes the earlier complex data migration process between different cloud Nousheen R, Shanmugapriya M, Sujatha P,Dhinakaran D 2 International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 providers, disadvantaging tenant through a new variant of vendor lock –in. Also in existing system outbreaks or threats to the infrastructure is not efficiently handled. DISADVANTAGE This approach suffers from several models: 1. The underlying computer host will still access the encryption keys whenever the VM approaches the cryptographic. 2. This shifts towards the tenant the burden of maintaining the encryption software in all their VM instances and increases the attack surfaces. [3] PROPOSED SYSTEM In proposed system, a framework for data and operation security in IaaS is described that consist of protocols for a trusted launch of virtual machines and domain –based storage protection. Thus once the user is authenticated they will be launched in virtual machines where they initiate the upload process into the cloud.The cloud user files are uploaded and stored in domain based. To provide resistance against cloud based web application attacks (focusing on session hijacking and broken authentication). Authentication is a critical aspect of this process, but even solid authentication mechanisms can be undermined by flawed credential management functions, including password change, forgot my password, remember my password, account update, and other related functions. In either case, if the session tokens are not properly protected, an attacker can hijack an active session and assume the identity of a user. Creating a scheme to create strong session tokens and protect them throughout their lifecycle has proven elusive for many developers. For session management, we have implemented cookie management and idle timeout. Also in our proposed system encryption keys are maintained outside of the IaaS domain. For key encryption we proposed RSA algorithm. For data owner file encryption, we use camellia algorithm. Finally the files are stored in public cloud named CloudMe [4]SAMPLE MODULE REGISTER &LOGIN Request key USER DOMAIN MANAGER Response key Session Hijacking (overcome)&Broken Authentication FILE FILE ENCRYPTION UPLOAD Key Generation using RSA CAMELLIA ALGORITHM ORIGINAL FILE DOMAIN SPECIFIC STORAGE Nousheen R, Shanmugapriya M, Sujatha P,Dhinakaran D 3 PROVIDING RESTRICTIONS AGAINST ATTACK AND CONGESTION CONTROL IN PUBLICINFRASTRUCTURE CLOUD VM1 VM2 DOWNLOAD UPLOAD CLOUD DECRYPTION The infrastructure cloud service model is used to store data securely using the privacy preserving .User will register using user details and Login into an account. User will Sign in with username and password. Two major attacks which is the SQL injection attack and session hijacking is explored in depth .In any case, if session tokens are not properly protected, an attacker can hijack the user identity .To overcome session hijacking,OTP is generated to user’s mail for security .If the OTP is success it enter into the user page otherwise its pushed out .Then user upload files and requests the domain manager .The user is authenticated the domain manager will response to the user .Once the user is authenticated they will be launched in virtual machines where they upload process into the cloud .The keys are encrypted using RSA algorithm. The domain manager accept the user file and it is upload in the user side. Domain manager will encrypt the file using camellia algorithm. Domain specific storage split the files into different virtual machine and upload the files in CloudMe. Once the user request for the file in the domain manager and download the files from cloud after decryption. [5] IDENTITY MANAGEMENT: Identity Management may come under the privacy preserving .This done in the user side. Initially while registering details in our system, we need to set the unique ID, during registration