“ INFORMATION SYSTEM FOR GMAIL WITH KNOWLEDGE DISCOVERY”

JAVED AKHTAR KHAN (Ph.D Scholar )

Computer Science & Engineering Department

Takshshila Institute Of Engineering & Technology

Bhagwant University Ajmer

Jabalpur (M.P) INDIA

()

Dr.M.R ALONY

Computer Science & Engineering Department

TIT Group Of Institute Of Engineering

Bhagwant University Ajmer

Bhopal (M.P) INDIA

Abstract :-We all know the value of data in our life. In this paper I am analyses the basic problem of cloud computing data in Google App’s (Gmail Account ) and introduce the some new unique features /App’s for Conventional Gmail Account including the concept discovery of knowledge from Mail data base.In this research paper we concentrate on cloudApp’s (Pass/Sass/Iass) is application of cloud computing, and set up new architecture model of data security in cloud computing with knowledge discovery . In this research paper we include a new facilities in conventional Gmail Account for identification of mail from the bulk of available mail in the user account .A color combination of a mail with the help of this unique facilities user are easily able to identified a any mail. Apart from that in this research paper we Add one more facility for the user to read a unlimited mail from his /her account at the same time with out any event with the help of this facilities user are able read both older and newer mail in the same window .

Key words:-cloud computing ,Data security model ,Software as a Service (SaaS), Platformas a Service (PaaS), , Infrastructure as a Service (IaaS),Private Cloud Computing.

I-Introduction

There are so many definitions of Cloud computing.As per the National Institute of Standards and Technology (NIST), says a cloud computing is “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. In this category we include Resources like Servers, Networks, Storage, and some Services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [14]. According to Gartnerdefines Cloud computing as being scalable, delivering IT-enabled services using the

Internet[15]. Each model has different levels of responsibility for security management. Security concerns such as secure data transfer, secure software interfaces, secure stored data, user access control and data separation must be considered before moving to the Cloud . The cloud vendors list Microsoft, IBM Smart Cloud, and Google.

Fig-A

The highest challenge/issue related to the Cloud is security. See Figure-(A)below for a depiction of these service models.

Fig-B

Now in this Figure-B that Software as a Service (SaaS) provides a number of ways to control access to the Web portal, such as the management of user identities, application level configuration, and the ability to restrict access to specific IP address ranges or geographies.Platform as a Service (PaaS) allow clients to assume more responsibilities for managing the configuration and security for the middleware, database software, and application runtime environments.Infrastructure as a Service (IaaS) model transfers even more control, and responsibility for security, from the Cloud provider to the client; access is available to the operating system that supports virtual images, networking, and storage. [16] This Figure Cloud computing models. Taken from (Buecker, Lodewijkx, Moss, Skapinetz, Waidner, 2009)[16].

A .Public Cloud Computing

There are three Cloud models which companies can choose from, which are public Cloud computing, private Cloud computing and hybrid Cloud computing. Public Cloud computing means relying on third parties to offer efficient IT services over theInternet as needed. On the other hand, Private Cloud computing reassures the organization that their information and processes are more secure since everything is managed internally. Hybrid Cloud computing is a combination of both private and public services. Hybrid Cloud computing is another extensive topic; therefore this paper will not discuss it. The National Institute of Standards and Technology defines a public Cloud as a Cloud infrastructure that is made available to the general public or a large industry group. Public Clouds are owned by the organization(s) selling Cloud services [14]. Figure (C) below gives a basic illustration of an organization using a public Cloud.

Fig-C

Figure-C Illustration of an organization using public Cloud services. (Diagram by Delvis Simmonds and Alli Wahab, 2012).

B.Private Cloud Computing

According to the National Institute of Standards and Technology (NIST) a private Cloud is a Cloud infrastructure that is operated solely for an organization. The organization or a third party can manage it. Private Clouds can exist on-site or off-site[14]. Typically private Clouds are used when sensitive data is involved. Figure(D)below gives a basic illustration of an organization using a private Cloud.

Fig-D

Figure (D): Illustration of an organization with a private Cloud. (Diagram by Delvis Simmonds and Alli Wahab, 2012).

II.Literature Survey

I am read some latest research paper regarding to cloud computing security issue some of them introduce here Security is one of the major issues which hamper the [1] growth of cloud. With reference paper [18] title author introduce the new architecture of cloud data security . paper The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. Now in This paper author introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types. According to Secure Overlay Cloud Storage with Access Control and Assured Deletion [2] implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion. It associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to anyone upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds.

Threshold proxy re-encryption scheme[4] and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages.Current research on cloud security is still in the early stages, and no universal model or set of techniques has yet emerged. Methods include segregating user resources during data processing to prevent widespread virus infection, the use of a third-party auditor to verify the integrity of data stored in the cloud[7][8] and access control based on data attributes and semantics.[5],[6]Some trust management experts recommend applying multiple security policies to authenticate users, manage identities, and protect data from unauthorized users. Amazon administrators, for example, log and routinely audit any access to customers’ data or operating systems

To fill the need for a more discerning security architecture, author exploring a security-on-demand design that applies security algorithms and protocols according to three stages in the service data’s life cycle: in transmission, Traditional security planning has maintained the security level in high-risk system environments by increasing the strength of security mechanisms. His architecture adjusts security strength according to the specific service needs as well as the risk. S. Ramgovind and colleagues provide an overall security perspective on cloud computing, illustrating security requirements coupled with cloud service and deployment models.[10] Hassan Takabi and his colleagues discuss user authentication, access control, policies, service, and trust in the cloud environment.[11] In 2011, S. Subashini and V. Kavitha surveyed SQL injection flaws, cross-site scripting, insecure storage, and invalidated redirects or forwards.[12] Minqi Zhou and colleagues investigated cloud security and privacy issues in terms of the special relationship between users and providers in a cloud.[13] The relationship contains three parties: the cloud service user, cloud service provider/cloud user, and cloud provider. However, most of the existing research discusses cloud security from a generic viewpoint outside a cloud. with reference paper [17] in this paper author present a multiple mail accesses facilities from the one mail .

III.Problem Definition

We all are have the Email -ID in various domain like Yahoo ! Gmail, Hotmail So many more .we all know that a Billion of people are using a Gmail Account in this world .suppose user want to read a older mail from his /her account for this Gmail Account provide the one special sign shown like this < > after clicking a this left or right arrow sign user read or see a older mail or newer mail shown in Figure-E and Figure-F.This button is simple navigate a new page of user account and change the window at this movement user leave the current page .in the very simple word we can say user are not able to see older mail without leaving a currentpage.

Fig-E

Fig -F

IV. Proposed Solution

In the conventional Gmail Account color combination is not provide shown if figure –G .I am take Gmail Login Page generally used by many people after Successfully login we get this page shown below.

Fig-G

A color combination of a mail with the help of this unique facilities user are easily able to identified a any mail in his or her Gmail Account . with the help of this facilities user are able to filter a read mail and user give the unique color for the special mail . we are use this facilities in the college and business for give the special attention to boss mail .say for the example use green color which task was done . give the red color for urgent mail. So may more its depends on user how to use this facilities . shown in Figure –H after using this facilities output is in shown in Figure -I

Fig-H

Fig -I

This is major drawback is in the conventional Gmail Account User are not able to see a both Older and newer mail at the same time for the solution of this big problem we introduce a new splitting facilities in the Gmail Account .Now with using this unique facilities user are able to see a both mail Newer as well as Older Mail at the same time without any fix number of Mail .For this work user just scrolling a curserbutton for seeing or reading unlimited mail both mail older and newer at the same time .now here user not click < > button for seeing a mail .shown in the Figure -J and figure -K

Fig-J

Fig-K

V.Conclusions & Future Work

This paper has described a new architecture for Gmail application. With the help of virtualization concept we used this unique idea for different Domain like Gmail to Yahoo switching, Yahoo to Gmail Switching etc infuture. We have demonstrated the output of new architecture. In this paper we have provided a definition of Cloud computing and highlighted the security issues/concerns related to public Clouds and private Clouds.Cloud computing is a very wide subject area. Even though the scope was scaled down to the security issues in public Cloud computing and private Cloud computing it was still quite a challenge getting details on certain areas; most information found during the research is related to either public Cloud computing or Cloud computing in general.

Reference

[1] Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 247 Cloud Computing Security Issues and Challenges Kuyoro S. O. Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria

[2] Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P.C. Lee, Member, IEEE, John C.S. Lui, Fellow, IEEE, and Radia Perlman, Fellow, IEEE IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 6, NOVEMBER/DECEMBER 2012

[4] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member, IEEE

[5] 2011, pp. 847-859. 5. L.K. Hu, S. Yi, and X.Y. Jia, “A Semantics-Based Approach for Cross Domain Access Control,” J. Internet Technology, vol. 11, no. 2, 2010, pp. 279-288.

[6]G. Pallis, “Clou d Computing: The New Frontier of Internet Computing,” IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 70-73.

[7]. C. Wang et al., “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, 2010, pp. 19-24.

[8] Q. Wang et al., “Enabling Public Auditability and Data Dy- namics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no

[10] S. Ramgovind, M.M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” Proc. Information Security for South Asia (ISSA 10), IEEE Press, 2010, pp. 1–7.

[11] H. Takabi, J.B.D. Joshi, and G.-J. Ahn, “SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments,” Proc. 2010 IEEE 34th Ann. Computer Software and Applications Conf. Workshops, IEEE Press, 2010, pp. 393–398.

[12] S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J. Network and Computer Applications, vol. 34, no. 1, 2010, pp. 1– 11.

[13] M. Zhou et al., “Security and Privacy in Cloud Computing: A Survey,” Proc. 6th Int’l Conf. Semantics, Knowledge and Grids, IEEE Press, 2010, pp. 105–112

[14](2009) The NIST Definition of Cloud Computing. Retrieved March 15, 2012 from

[15]Cloud Computing. Retrieved April 15, 2012 from

[16]Buecker. A., Lodewijkx. K., Moss. H., Skapinetz. K., & Waidner. M. (2009). Cloud Security Guidance. IBM Recommendations for the Implementation of Cloud Security. Cloud security: the grand challenge. Retrieved April 16, 2012 from

[17]“Cloud Computing Google App’s with knowledge discovery for Gmail” Javed Akhtar khan paper present in the 28th M.P. Young scientist 2013 Bhopal M.P

[18] Computing Data Security With Knowledge Discovery ”Javed Akhtar Khan Paper Prsent in the IEEE International Conference ICARET-13 organized by KLU university Andhra Pradesh India .

.