SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2743
Implementation of QR code on data protection of cloud computing
Sabah Shaikh
MCA, Post Graduate, V.E.S.I.T
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is basically an outsourcing
project. Cloud computing has a number of other benefits too
like online storage and users have the ability to increase or
decrease space according to their requirements. Cloud
computing lets you store information and use hardware and
software remotely over the internet, based on where and
when you need them. This unique attribute, however, poses
may new security challenges which have not been well
understood. In this paper we will study how QR code can be
used for cloud computing as data protection.
Key Words: Cloud Computing, Security challenges, QR code.
1. INTRODUCTION
Cloud computing is a model for allowing convenient, on
demand access from anywhere, to a shared pool of
computing resources. These can include servers, storage,
networking, applications and services that can be rapidly
and easily provisioned and released. The cloud model
includes five essential characteristics [1] On-Demand Self
Service: This allows users to quickly and automatically get
access to the IT resources that they want without
requiring any additional human interaction. [2] Broad
Network Access: This is the ability to access a service from
any standard device that is connected to the network
including PCs, laptops, mobile phones or tablets. [3]
Resource Pooling: Computing networking and storage are
pooled and shared across multiple customers. [4] Rapid
Elasticity: This allows you to quickly scale or shrink the
capabilities of your cloud to match the level of user
demand. [5] Metering: This tracks and controls the level of
resource usage or the cost of that usage.
A cloud data can be categorized by SaaS, PaaS and IaaS.
Software as a service or SaaS allows users to access an
application without having to manage or control the
underlying cloud infrastructure. Platform as a service or
PaaS gives users access to a software development
environment to allow them to create their own cloud
applications using programming languages, libraries
services and tools. The user has control over these
applications without having to manage or control the
underlying cloud infrastructure. Most widely viewed as
cloud
Is Infrastructure as a service or IaaS, allows a user to
quickly and easily provision full computing resources
including processing storage and networks without the
user having to manage or control the underlying cloud
infrastructure.
Authentication is an important process in cloud
computing. Data security is very big problem in public
storage. In order to prevent this a proper effective
authentication system must be implemented which
prevents data leakage or loss, a new technique called QR
code.
QR code stands for Quick Response. It is very similar to a
bar code. QR code is more versatile than barcode as it
allows you to store more information than barcode. In fact,
compared to barcode’s 20 alphanumeric character limits, a
QR code can hold thousands of characters of data. QR code
was developed by Denso Wave in Japan in 1994. QR code
is two-dimensional matrix format barcode. Two types of
QR codes are there, Static QR code and dynamic QR code.
It can store and digitally present much more data than
other barcode. Data is aligned in vertical and horizontal
directions which mean it could store more information up
to 406 bytes than a normal barcode within a limited space.
Information is retrieved by a photograph of the code using
QR code Reader with a camera. QR can be read from any
position. QR code scanner decodes the image through
three squares present in the corner of the image.
1.1 Structure
The structure of QR code consists of an encoding region
(cell) and a functional pattern. Functional patterns are such
as finder pattern, alignment pattern, timing pattern and a
quiet zone which makes the reading of the data easier and
provide an area for storage. Besides the finder pattern are
located at three corners with intention to ease the location
and identification of its position, size and inclination.
Moreover the alignment pattern acts as a correction
pattern that will correct the distorted QR code. While the
black and white patterns allows the timing pattern to
better identify and correct the central coordinate of the
data cell at the time the QR code symbol is distorted. The
quiet zone is the margin space needed for reading of QR
code, while the data will be stored in the data area in the
symbol. Currently there are 40 versions of QR code and
four levels of error correction.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2744
Fig -1: QR code
1.2 Types
The 4 different types of QR codes [1] differ with the view
and features. QR code model 1 and model 2 are the first
type of QR code. Up to 1167 numerals can be stored in
largest version of model 1 and up to 7089 numerals can be
stored in largest version of model 2. The next type is a
micro QR code. It differs from the regular QR model by
position detection pattern and size. IQR Code is next type.
The same size of the IQR Code as an existing QR Code can
hold 80% more information than the latter. SQR Code is
used to store private information there is no difference
from regular code in appearance. The next type is logo QR
it incorporates a high level of design features.
Fig -2: Types of QR code
2. Related Work
Presently, much of growing interest has been pursued in
the context of remotely stored data security David Pintor
Maestre et al. [3] consider secure authentication using QR
code in their defined “A Improved secure authentication
method using QR codes” develop an authentication method
using 2 factor authentication.. In their scheme, they utilize
IMEI number of smart phone with random number of QR
code for secure authentication, thus private data security is
achieved. The problem here is the server must have a copy
of the user's private key in order to generate the same
pincode. They consider authentication of consumer
product can be done with QR codes. They achieve the
security by QR code along with the public key encryption
algorithm. But the normal QR code can be easily retrieved
using any smart phone. They do not consider security of QR
code. Suraj kumar sahu et al. [7] describe “Encryption in
QR code using stegnograpy” where cover image and QR
data is embed and encrypted. Dong-sik oh et al. [8]
consider creating 3 set of QR code by converting the single
information into 3 versions of QR code and stored in
distributed server system.
3. Proposed System
The proposed system, involve various steps in the process
of storing and retrieving the data secured in a cloud
computing environment. First achieving initial
authentication by the secure random number generation
used for creating a unique key for each user. Then the
uploaded file is encrypted by homomorphic authentication
and then combined with QR code. This combination of
encryption code is stored in three different severs. A key is
given to the user at time of download. The data is
downloaded from servers if key is correct. The data is
merged and decrypted before display to the user.
Fig -3: Flowchart
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2745
The pseudo code is given below:
// Module for uploading data
Upload ( )
{
If (user authentication success)
{
Split and encode + combined QR;
Distributed to servers
}
Else
Return authentication failed;
}
// Module for downloading the data Download ( )
{
If (key is ok)
{
Collect from the server;
Decrypt the file;
}
Else
Failed;
}
3.1 Working
Random key generation is the initial process. Xn is the
random number. The next number assigned to the user is
Xn +1 =(a Xn+b)mod m. Here a, b, m are large integers. This
random number is a password for the user to access the
cloud. N =Xn, N is Individual user. RSA Based homomorphic
algorithm used for encrypt the data Key generation in
RSA,P and r are distinctive prime numbers . Find the value
of n , n=p*r product is n= (p-1)(q-1) .Find Co prime(e) for n
and modular multiplicative inverse d. e*d mod n=1. Here
public key is n and e private key is d .plain text m,
Encryption is C(m)= m power e mod n and Decryption is m
(c ) = c power d mod n. Binary of QR code is XOR with every
bit of Encrypted file F and result files Fn stored in to
distributed server.
4. Conclusion
We thus conclude this proposed system saying that it will
be a good technique for data protection which can be
implemented in cloud computing to avoid the cloud storage
problem and improvise the security. Future enhancement
of this work is to apply additional mechanism to increase
the speed of access of data from the cloud environment.
REFERENCES
[1] http://www.qrcode.com/en/codes/
[2]Denso-wave:
http://www.densowave.com/qrcode/index-e.html
[3]David Pintor Maestre Universitat Oberta de
Catalunya08018, Barcelona, Spain “QRP An Improved
Secure Authentication method using QR codes” .
[4] Peter Kieseberg, Manuel Leithner, Martin Mulazzani,
Lindsay Munroe, SebastianSchrittwieser, Mayank Sinha,
Edgar Weippl: “QR-Code Security”. SBA Research, 2010.
[5] Srikanth BharadwajA STUDY ON QR CODE BASED
PUBLIC CLOUD DATA PROTECTION.
[6] Wang, L., Laszewski, G., Kunze, M., Tao, J.: ‘Cloud
computing: a perspective study’, New Gener. Comput.,
2010.
[7] Suraj Kumar Sahu: “ Encryption in QR Code Using
Stegnography “. MATS University, Raipur
[8] Dong sik-oh, Bong han-kim and Jae- Kwang Lee : “A
Study on Authentication System using QR code for Mobile
cloud computing Environment”. Hennam University
Daejeon, Korea.

More Related Content

PDF
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
PDF
IRJET- I-Share: A Secure Way to Share Images
PDF
IRJET - Image Watermarking using QR Code
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
Jo3417381741
PPTX
Lightweight cryptography
PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
PDF
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- I-Share: A Secure Way to Share Images
IRJET - Image Watermarking using QR Code
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
Jo3417381741
Lightweight cryptography
Literature Survey: Secure transmitting of data using RSA public key implement...
IRJET - Identification and Classification of IoT Devices in Various Appli...

What's hot (20)

PDF
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PDF
Final report
PDF
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
PDF
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
PDF
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
DOCX
Dotnet ieee 2014, completed list(gy)
PDF
1670 1673
PDF
581 517-525
PDF
Study of Various Techniques to Filter Spam Emails
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
PDF
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
Secure Data Storage on Cloud System for Privacy Preserving
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
Final report
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
Dotnet ieee 2014, completed list(gy)
1670 1673
581 517-525
Study of Various Techniques to Filter Spam Emails
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Ad

Similar to IRJET-Implementation of QR Code on Data Protection of Cloud Computing (20)

PDF
QR Code Document Authentication and Retrieval
PDF
A Review on QR Code for Hiding Private Information
PDF
CryptoQR System based on RSA
PDF
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
PDF
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
PDF
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
PDF
QR code based two-factor authentication to verify paper-based documents
PDF
IRJET- Securing E-Medical Documents using QR Code
DOCX
QR Codes seminar
PDF
Laboratory Access Implementing QR Code Authentication Using OTP
PDF
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
PDF
IRJET- Two Layer QR Code with Picture Embedding
PDF
Survey on information sharing
PDF
A Survey On Secrete Communication Through QR Code Steganography For Military ...
PDF
IRJET- Two Way Authentication for Banking Systems
PDF
Use of QR Code: A Step Towards Development in India
PPTX
CREATION AND DETECTION OF QR CODE.pptx
PDF
Published pdf-2072-6-2072 kajal
PDF
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
PDF
Survey on information hiding techniques using qr barcode
QR Code Document Authentication and Retrieval
A Review on QR Code for Hiding Private Information
CryptoQR System based on RSA
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
QR code based two-factor authentication to verify paper-based documents
IRJET- Securing E-Medical Documents using QR Code
QR Codes seminar
Laboratory Access Implementing QR Code Authentication Using OTP
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET- Two Layer QR Code with Picture Embedding
Survey on information sharing
A Survey On Secrete Communication Through QR Code Steganography For Military ...
IRJET- Two Way Authentication for Banking Systems
Use of QR Code: A Step Towards Development in India
CREATION AND DETECTION OF QR CODE.pptx
Published pdf-2072-6-2072 kajal
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
Survey on information hiding techniques using qr barcode
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
additive manufacturing of ss316l using mig welding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PPTX
Geodesy 1.pptx...............................................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
DOCX
573137875-Attendance-Management-System-original
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Foundation to blockchain - A guide to Blockchain Tech
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
additive manufacturing of ss316l using mig welding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Digital Logic Computer Design lecture notes
web development for engineering and engineering
Geodesy 1.pptx...............................................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
573137875-Attendance-Management-System-original
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks

IRJET-Implementation of QR Code on Data Protection of Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2743 Implementation of QR code on data protection of cloud computing Sabah Shaikh MCA, Post Graduate, V.E.S.I.T ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is basically an outsourcing project. Cloud computing has a number of other benefits too like online storage and users have the ability to increase or decrease space according to their requirements. Cloud computing lets you store information and use hardware and software remotely over the internet, based on where and when you need them. This unique attribute, however, poses may new security challenges which have not been well understood. In this paper we will study how QR code can be used for cloud computing as data protection. Key Words: Cloud Computing, Security challenges, QR code. 1. INTRODUCTION Cloud computing is a model for allowing convenient, on demand access from anywhere, to a shared pool of computing resources. These can include servers, storage, networking, applications and services that can be rapidly and easily provisioned and released. The cloud model includes five essential characteristics [1] On-Demand Self Service: This allows users to quickly and automatically get access to the IT resources that they want without requiring any additional human interaction. [2] Broad Network Access: This is the ability to access a service from any standard device that is connected to the network including PCs, laptops, mobile phones or tablets. [3] Resource Pooling: Computing networking and storage are pooled and shared across multiple customers. [4] Rapid Elasticity: This allows you to quickly scale or shrink the capabilities of your cloud to match the level of user demand. [5] Metering: This tracks and controls the level of resource usage or the cost of that usage. A cloud data can be categorized by SaaS, PaaS and IaaS. Software as a service or SaaS allows users to access an application without having to manage or control the underlying cloud infrastructure. Platform as a service or PaaS gives users access to a software development environment to allow them to create their own cloud applications using programming languages, libraries services and tools. The user has control over these applications without having to manage or control the underlying cloud infrastructure. Most widely viewed as cloud Is Infrastructure as a service or IaaS, allows a user to quickly and easily provision full computing resources including processing storage and networks without the user having to manage or control the underlying cloud infrastructure. Authentication is an important process in cloud computing. Data security is very big problem in public storage. In order to prevent this a proper effective authentication system must be implemented which prevents data leakage or loss, a new technique called QR code. QR code stands for Quick Response. It is very similar to a bar code. QR code is more versatile than barcode as it allows you to store more information than barcode. In fact, compared to barcode’s 20 alphanumeric character limits, a QR code can hold thousands of characters of data. QR code was developed by Denso Wave in Japan in 1994. QR code is two-dimensional matrix format barcode. Two types of QR codes are there, Static QR code and dynamic QR code. It can store and digitally present much more data than other barcode. Data is aligned in vertical and horizontal directions which mean it could store more information up to 406 bytes than a normal barcode within a limited space. Information is retrieved by a photograph of the code using QR code Reader with a camera. QR can be read from any position. QR code scanner decodes the image through three squares present in the corner of the image. 1.1 Structure The structure of QR code consists of an encoding region (cell) and a functional pattern. Functional patterns are such as finder pattern, alignment pattern, timing pattern and a quiet zone which makes the reading of the data easier and provide an area for storage. Besides the finder pattern are located at three corners with intention to ease the location and identification of its position, size and inclination. Moreover the alignment pattern acts as a correction pattern that will correct the distorted QR code. While the black and white patterns allows the timing pattern to better identify and correct the central coordinate of the data cell at the time the QR code symbol is distorted. The quiet zone is the margin space needed for reading of QR code, while the data will be stored in the data area in the symbol. Currently there are 40 versions of QR code and four levels of error correction.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2744 Fig -1: QR code 1.2 Types The 4 different types of QR codes [1] differ with the view and features. QR code model 1 and model 2 are the first type of QR code. Up to 1167 numerals can be stored in largest version of model 1 and up to 7089 numerals can be stored in largest version of model 2. The next type is a micro QR code. It differs from the regular QR model by position detection pattern and size. IQR Code is next type. The same size of the IQR Code as an existing QR Code can hold 80% more information than the latter. SQR Code is used to store private information there is no difference from regular code in appearance. The next type is logo QR it incorporates a high level of design features. Fig -2: Types of QR code 2. Related Work Presently, much of growing interest has been pursued in the context of remotely stored data security David Pintor Maestre et al. [3] consider secure authentication using QR code in their defined “A Improved secure authentication method using QR codes” develop an authentication method using 2 factor authentication.. In their scheme, they utilize IMEI number of smart phone with random number of QR code for secure authentication, thus private data security is achieved. The problem here is the server must have a copy of the user's private key in order to generate the same pincode. They consider authentication of consumer product can be done with QR codes. They achieve the security by QR code along with the public key encryption algorithm. But the normal QR code can be easily retrieved using any smart phone. They do not consider security of QR code. Suraj kumar sahu et al. [7] describe “Encryption in QR code using stegnograpy” where cover image and QR data is embed and encrypted. Dong-sik oh et al. [8] consider creating 3 set of QR code by converting the single information into 3 versions of QR code and stored in distributed server system. 3. Proposed System The proposed system, involve various steps in the process of storing and retrieving the data secured in a cloud computing environment. First achieving initial authentication by the secure random number generation used for creating a unique key for each user. Then the uploaded file is encrypted by homomorphic authentication and then combined with QR code. This combination of encryption code is stored in three different severs. A key is given to the user at time of download. The data is downloaded from servers if key is correct. The data is merged and decrypted before display to the user. Fig -3: Flowchart
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2745 The pseudo code is given below: // Module for uploading data Upload ( ) { If (user authentication success) { Split and encode + combined QR; Distributed to servers } Else Return authentication failed; } // Module for downloading the data Download ( ) { If (key is ok) { Collect from the server; Decrypt the file; } Else Failed; } 3.1 Working Random key generation is the initial process. Xn is the random number. The next number assigned to the user is Xn +1 =(a Xn+b)mod m. Here a, b, m are large integers. This random number is a password for the user to access the cloud. N =Xn, N is Individual user. RSA Based homomorphic algorithm used for encrypt the data Key generation in RSA,P and r are distinctive prime numbers . Find the value of n , n=p*r product is n= (p-1)(q-1) .Find Co prime(e) for n and modular multiplicative inverse d. e*d mod n=1. Here public key is n and e private key is d .plain text m, Encryption is C(m)= m power e mod n and Decryption is m (c ) = c power d mod n. Binary of QR code is XOR with every bit of Encrypted file F and result files Fn stored in to distributed server. 4. Conclusion We thus conclude this proposed system saying that it will be a good technique for data protection which can be implemented in cloud computing to avoid the cloud storage problem and improvise the security. Future enhancement of this work is to apply additional mechanism to increase the speed of access of data from the cloud environment. REFERENCES [1] http://www.qrcode.com/en/codes/ [2]Denso-wave: http://www.densowave.com/qrcode/index-e.html [3]David Pintor Maestre Universitat Oberta de Catalunya08018, Barcelona, Spain “QRP An Improved Secure Authentication method using QR codes” . [4] Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, SebastianSchrittwieser, Mayank Sinha, Edgar Weippl: “QR-Code Security”. SBA Research, 2010. [5] Srikanth BharadwajA STUDY ON QR CODE BASED PUBLIC CLOUD DATA PROTECTION. [6] Wang, L., Laszewski, G., Kunze, M., Tao, J.: ‘Cloud computing: a perspective study’, New Gener. Comput., 2010. [7] Suraj Kumar Sahu: “ Encryption in QR Code Using Stegnography “. MATS University, Raipur [8] Dong sik-oh, Bong han-kim and Jae- Kwang Lee : “A Study on Authentication System using QR code for Mobile cloud computing Environment”. Hennam University Daejeon, Korea.