A New Cloud Paradigm: Data Protection as a Service (DPASS)
|
|
|
- Bernice Tyler
- 10 years ago
- Views:
Transcription
1 A New Cloud Paradigm: Data Protection as a Service (DPASS) KholeSagar R. 1,Walunj Ajit S. 2,Gulave Rahul K. 3,Nikam Umesh P. 4 Student, Department of Computer Engineering, SavitribaiPhule Pune University, Shri Chhatrapati Shivaji College of Engineering, Shrishivajinagar, India ABSTRACT:The Paper consist of new cloud computing pattern, data protection as a service (DPASs) which is a suite of security primitives by a cloud platform, which having data security and privacy and which provide powerful proof of privacy for data owners. Despite in the presence of strongly compromised or unsecured application. Such as security of data using encryption, logging, key management. Due to this new model of security user can get the confidence that there data which store on cloud is being handle very security. The result show that user that can get notification about the security of their data which is store on the cloud platform. KEYWORDS: AES, Logging, Key management, Cloud Computing, Auditor. I. INTRODUCTION As Cloud Computing has become important and simple to implement. Many multinational companies and topmost companies are coming towards for achieving the cloud features for the best management and increasing scalability of their organization. Cloud computing offers random scaling, easy to maintain and availability of services anytime anywhere. Cloud computing offers on demand, higher quality data storage services. But there is most important factor that everybody is worried about the cloud computing is the security problem. Since all the data are stored in cloud platform data owners are worried about the security Uptil now cloud computing environment providers such as google, amazon web servers gogrid etc. had implement the cloud platform with the help of there cloud service model or cloud service stack such as Pass (Platform As a Service), Iass (Infrastructure As a Service), and Saas (Software As a Service). This are there cloud computing models which are implemented in previous cloud computing environment. But the security provided by this three models that matter the privacy issue and also the misuse of data. Also the current survey which is taken by Microsoft corporation about the cloud security has found that 58 percent of the public and 86 percent of business tikun are excited about the possibility, security and privacy of their data as it the data stored in the cloud. Therefore to overcome this issues, we propose a new cloud computing paradigm, Data protection as a service (DPaas). Dpaas is new model of security primitives offered platform which enforce data security, privacy and offers proof of privacy to data owners. Dpaas provided fined-grained access control polices on data unit through application confinement and information flow checking. It employs cryptographic protections at rest and offers robust logging and auditing to provide accountability crusially, DPaas also directly addresses the issue of rapid development and maintenance. Therefore this DPaas security approach provides security alert message, to the user, when the data is accessed by unauthorized person which is stored on cloud environment. II.RELATED WORK Firstly in 2003, The language based information flow security proposed by Andrei Sabelfeld and Andrew C. Myers, They suggested that the conventional security mechanism such as encryption and access control do not directly address the enforcement of information flow polices. A providing new approach has been developed for specifying and enforcing information flow polices. Also they survey the pass there decades of research on information flow security. Copyright to IJIRCCE /ijircce
2 Particularly focusing on work that uses static program analysis of enforce information flow polices.also in 2009, Data protection aware design for cloud computing which implemented by Sadie-creese and their team concluded that to begin the process of designing the data protection control into cloud from the Outset, so as to avoid the associated with bolting on security as on after through. This model to explore privacy maturity within an enterprise cloud developement & explore when, where there may be opportunity to design in data protection control as exploitation of the cloud matures. Also for security cloud environment the encryption algorithm i.e DES (Data Encryption Standard), which is used to protect the sensitive information as federal information processing standard. But the principle of the DES is that, it has three times as many round. Hence it is time consuming process therefore it is not favourable for long term use. Therefore Rijndael proposes the encryption standard that is the advanced encryption system (AES) in The AES algorithm provide more security to the cloud platform.in 2012, Dawn song & her team published the paper "Cloud Data Protection for the Masses" in IEEE computer society. They proposed that the new cloud security model i.edpaas, which builds the cloud platform architecture that dramatically reduces per application developement effort required to data protection while still allowing rapid development&maintainance. III. EXISTING WORK Cloud computing is the type of computing that realise on the sharing of resources rather than having local servers or personal devices to handle the application.the cloud computing is the model to delivering information technology services in which the resources are retrieved from the internet through the hundreds of millions of application. In the previous cloud computing system platform is build with help of three cloud service models such as Paas(Platform as a service), Saas(Software as a service), Iaas (Infrastructure as a service).this three models deliver software application over the web build the infrastructure for the cloud & create the platform for the entire application developement environment, not only just the use of an application. But this models having issues related with the compatibilty with hardware & operating system, also it have to do extra work to maintain the system & to maintain the integrity of the database. If the users data which is stored on cloud platform can be access by any unauthorised person then user can not get any immediate alertness about the misuse of data. Due to this more than 90 percent of public & business leaders are worried about security, availability, and privacy of their data as it rests in the cloud. Therefore the security becomes the major issue in this previous cloud computing platform. IV. PROPOSED WORK For the more security required for the cloud platform we need to build the strong security & need to protect the cloud services from large number of malicious application and avoiding unauthorised accesses. This paper proposed the new cloud computing pattern i.e the DPaas which consists of security primitives offered by cloud platform. This platform enables the verification of the cloud environment operation, so the user can get confidence about their data that is being handle securely, also DPaas is a provision of data security & privacy, that offers proof of privacy to data owners even in the presence of malicious application,so the system have the large number of scope such as all the users are managed by the admin of the system. The uploaded data can be viewed by the auditor & user itself. Every data requires unit data key so the encryption provided in high quality. If the user data can be change by any unauthorised person or the auditor itself then the user get the security alert message & user immediately alert about their data which is stored on cloud environment. To truly support this vision, cloud platform providers would have to offer DPaaS in addition to their existing hosting environment, which could be especially beneficial for small companies or developers who dont have much in-house security expertise, because DPaaS can guarantee the integrity of the data at rest via cryptographic authentication of the data in storage and by auditing the application code at runtime.therefore the propose system build successfully by implementing security but not affecting performance. Copyright to IJIRCCE /ijircce
3 V. SYSTEM DESIGN AND IMPLEMENTATION The figure illustrates architecture for the elaborating DPaas design implementation.here each server has the Trusted platform module(tpm),which acts as the cryptoprocessor which can encrypt the each of the data bit before it going to the database. Above architecture depicted that at a high Level how the system make the possible to combine the various technologies such as logging,encryption and information flow checking to realize Dpaas. Generally the system architecture consist of four main modules which plays an important role to maintain and handle the data over the cloud environment. The main module of our system is cloud computing which is a provision of dynamically scalable services over the internet. This cloud computing model is responsible for storing the user data also another module that is TPM which is responsible for encrypting data.there is an important module i.e. Auditor who tracking all the transaction and all the conversation Between the users so multilevel data security provided by the architecture.the user module from the user section allows the user to store the large amount of data in cloud and access data using secure key.secure key provided by admin while encrypting the data.the above architecture exhibits the some key. PERFORMANCE is monitor and loosely coupled architecture using web services. SECURITY:cloud architecture improves due to centralization of data increase security focus resources. MAINTENANCE: maintenance of cloud computing architecture is easier because they do not need to be install on each user computer and can be access from different places. RELIABILITY: in this architecture reliability is improved if multiple redundant sites are used which makes well design cloud computing,which is suitable for disaster recovery. MULTITENDANCY: That enable sharing of resources and cost across large pool of users. VERIFIABLE ARCHITECTURAL SUPPORT :It is necessary to fix the error also information is to be migrated and updated as architecture change.the computation which process of line that is valuable for data aggregation across hundreds of millions of users for pecompilationvaluale function. To reduce the risk of unauthorized backdoor access,all the function should be subject to same authorization flows and platform level check as normal request. VI. ENCRYPTION OVERVIEW Encryption is the process of converting of plaintext into cipher text. Encryption is a track to keep secure data by using mathematical transformations on a secure data by using mathematical transformation on a sequence of bits. This transformation use a applied sequence of bits known as a key. There are two types of key i.e public key and private key. The public key uses for encrypt the data and private key used for decrypt the data. Copyright to IJIRCCE /ijircce
4 In this paper provide better security on cloud by using Advanced Encryption Standard 128 bits of Rijndael algorithm because as compared to the other 64 or etc. it provide more security. The 128 bit encryption completed In the 10 encryption round. In 128 bit Rijndael algorithm different operation are used that is shift rows, mix columns, sub bytes and add round key. The AES algorithm is selected for several reason. The encryption core will need to provide a wide range of application will be based to encrypt large amount of data. The AES algorithm is based on simple mathematical transformation whose inverse are difficult to compute without the key.in above figure shows there are four transformation used for encryption that is sub bytes, shift rows, mix column and add round key. Each of these transformation are uses in each round. In this paper key size of 128 bit there are 10 rounds. In additional time in round 0. The last round 10 that is the mix column transformation round doesn t performed. VII. RESULT AND ANALYSIS We made experimental in terms of checking the attributes of data protection as a service.which is one of the service module of cloud computing. according to this paper the security mechanism are applied to all cloud users the service Copyright to IJIRCCE /ijircce
5 model implemented in this paper is not user specific,instead it treats every user alike and provide security to data automatically as a service. 1) File encrypted. 2) Auditor change or modified the data containing in the file. 3) User view the notification of file. The system graph shows the system versus user. it indicate the system performance is less or high. X Co-ordinate line is indicate the percentage of user and the Y line co-ordinate show the performance of the system. the middle point is called as the resolution point. the resolution point means the point at which the system user meets the requirement. if the number of user increases then the system performance decreases. under the resolution point system performance decreases i.e the system under load.above the resolution point the system performance high. In the previous system user does not get notification to the user.i.e by whom access there own data stored on the cloud.the DPAS system provide the notification the file is changed or not. VIII. ACKNOWLEDGEMENT We are profoundly grateful to Prof.Gade D.P. for his expert guidance and continuous encouragement throughout to see that this project rights its target since its commencement to its completion. We are also grateful to Prof. Dighe M.S. (Project Coordinator) for his support and guidance that have helped us to expand our horizons of thought and expression.we would like to express our deepest appreciation towards Dr.Sathe Y.U., Principal, SCSCOE, Shrishivajinagar, Prof.Jadhav H.B, HOD Computer Engineering Department, whose invaluable guidance supported us in completing of this project.at last we must express our sincere heartfelt gratitude to all friends and staff members of Computer Engineering Department who helped us directly or indirectly during this course of work. Copyright to IJIRCCE /ijircce
6 IX. CONCLUSION AND FUTURE WORK Due to increasing need for secure data storage a more safe and secure DPASS module has to be proposed.in previous paper we implemented a new data protection as a service module for provide the security to the data store on the cloud.by using the AES algorithm we provide the powerful security as compare to the previous DES algorithm.due to this new security model there is a possibilities of provision of security alert message to the user. REFERENCES 1. Dawn Song, Elaine Shi, and Ian Fischer Cloud Data Protection for Masses",Published by the IEEE Computer Society, /12,JANUARY SunumolCherian, KavithaMurukezhan\Providing Data Protection as a Service in Cloud Computing"International Journal of Scientic and Research Publications, Volume 3, Issue 6, June ISSN C.HariHar, Prof. Mrs.Varshapriya J.N. \Cloud Data Storage Protection For The Masses, ",International Journal,May Volume 1, Issue P. KiranRao, V. Lakshmi Sailaja, Alfisha Khan, S. Mamatha\High level security in cloud for scalable data, International Journal of Advanced Research in Computer,Vol. 2, Issue 3, March Craig Gentry Stanford University and IBM Watson [email protected], Fully Homomorphic Encryption Using Ideal Lattices. 6. Andrei Sabelfeld and Andrew C. Myers, Language-Based Information-Flow Security, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 1, JANUARY Copyright to IJIRCCE /ijircce
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses Mr. Mahesh Nandkumar Chopade 1, Mr. SwikarNavnath Lad 2, Mr. InzamamSadik Waikar 3, Mr. SubhashDundappa Ambi 4 Prof. Ms. Anisa B. Shikalgar 5 1 Department of Computer
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Data Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab [email protected] Dr. Tripat Deep Singh Assistant Professor, Department
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Although cloud computing promises lower costs, Cloud Data Protection for the Masses COVER FEATURE SECURITY AND PRIVACY CHALLENGES
COVER FEATURE Cloud Data Protection for the Masses Dawn Song, Elaine Shi, and Ian Fischer, University of California, Berkeley Umesh Shankar, Google The data-protection-as-a-service cloud platform architecture
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Research on Storage Techniques in Cloud Computing
American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability Sivasankaran.
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Secure Hybrid Cloud Architecture for cloud computing
Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: [email protected] Sumangala Patil Associate prof and HOD Dept of
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Cloud Computing-A Tool For Future
[Volume 1 issue 1 Feb 2013] Page No.09-14 www.ijmcr.in [International Journal Of Mathematics And Computer Research] Cloud Computing-A Tool For Future 1 Dr D S Kushwaha 1 Ankit Maurya 2 Institute of Engineering
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.
IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. Presented by Richard Marko, Manager of Technical Services Sponsored by Midland Information Systems,
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Review On Incremental Encrypted Backup For Cloud
Review On Incremental Encrypted Backup For Cloud Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain Department of Computer Engineering MIT AOE [email protected]
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
