Second Review
Second Review
ABSTRACT:
DISADVANTAGES:
HARDWARE REQUIREMENTS:
Hard Disk - 20 GB
SOFTWARE REQUIREMENTS:
Scripts : JavaScript.
MODULES:
1. User Authentication
2.Cloud ID Allocation
3. Cloud Server
4. Decoy Generation
1. User Authentication:
2. Cloud ID Allocation:
In this module, user need to allocate their memory space(100 MB-GB) in
cloud server by giving some amount to buy that particular space. Cloud
server randomly generates cloud id for registered user .After getting the
cloud id, user is allowed to store and retrieve their data in cloud server.
3. Cloud Server:
In cloud server, we store and retrieve our personal and
business information in safe manner.
(i)Cloud Storage:
In this module, we will upload our file using Cloud ID then the uploaded
file will be encrypted (original data is converted to some other format) using
DES algorithm, so that incase some intruder may hack the file at any reason
or at any cost, we generate decoy files using some challenging questions,
after that store our data in cloud server
(ii) Cloud Retrieval:
In the module, we retrieve our files in cloud server. If you are authorized
user, means your cloud id and challenging questions must be same in storing
procedure you will get your original data after decrypted(other format is
converted to original data)using DES algorithm otherwise you will get your
decoy data(fake data)
4. Decoy Generation:
Decoy Technology, allows invalid users to download decoy files which
are placed in a highly conspicuous locations. Monitoring access to the decoy
files should signal masquerade activity of the system. The decoy documents
carry a keyed-Hash Message Authentication code (HMAC) to differentiate
original file from the decoy files.
SYSTEM ARCHITECTURE:
FOG COMPUTING
Cloud Server
STORAGE RETRIEVAL
Invalid User
Valid User
File uploading Decoy
usin cloud id generation
& security
questions Decoy
Retrieve
Files
original files
DATAFLOW DIAGRAM
Level 0:
Cloud Storage
User
Authentication Process
Cloud Retrieval
Level 1:
New User
Registration
Login
User
Authentication
User_reg1
Cloud Server
Level 3
Level 2:
Cloud ID allocation Allocated
space Cloud_reg
Generatin
g cloud ID
Level 3:
Level 4
Cloud
Retrieval
Level 5
Level 4:
store
Decoy Generati
generation ng fake
files
decoy
Level 5:
Cloud ID
Cloud retrieval
& Security
que
Validate
Decryption authentica
usind DES store
ted user
Invalid
Retrieve Retriev ate
original e fake user
files files
decoy
SCREENSHOTS:
Main page:
About Fog Computing: