Among the various stages of project, the part which converts the theoretical design into a working system is known as Implementation, thus making it one of the critical phase for developing a successful system.
In Implementation phase we carefully plan as well as probe the existing system keeping in mind the constraints of the implementation.
1. Client Module:
In this module, the server receives a query sent from the client. Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place. The server matches the client credentials for security. Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place.
2. System Module:
The above figure illustrates the network architecture of the cloud data .
Figure 1. Three different network entities can be identified as follows:
Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations.
• Cloud Service Provider (CSP):
A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems,.
• Third Party Inspector (TPI):
A voluntary TPI, who expertise’s and abilities that consumers may not have, is
Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand.
3. Cloud data storage Module:
The user’s data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data. Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system.
4. Cloud Authentication Server:
The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user.
5. Unauthorized data modification and corruption module:
The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like: time of access as well as the ip address of the unauthorized intruder.
6. Antagonist Module:
The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors.
Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider.