An Intelligent Approach for Data Fortification in Cloud Computing
|
|
- Cassandra Barnett
- 8 years ago
- Views:
Transcription
1 An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology, Mumbai, India 2 St. Francis Institute of Technology, Mumbai, India Abstract Popularity of cloud computing is increasing now-a- days. With the increasing use of cloud computing we can share information, resources, and data. Also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security of data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjoint stores on different locations. Keywords Cloud, Data Protection Mechanism, Data Security I. INTRODUCTION Popularity of cloud computing is increasing day by day in distributed computing environment. There is a increasing trend of using cloud computing environments for storage of data [1].Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through Internet. Cloud computing has the ability to run a program on many connected computers at the same time [2]. There are basically three types of Cloud Computing service models. They are as follows: 1. Software as a Service (SaaS): The facility given to the user is to use the vendor s applications which are running on a cloud infrastructure. These applications can be accessed by user from anywhere. The user does not need to control these applications which are provided by vendor on the cloud infrastructure [3]. Examples: Google Apps, Microsoft Office 365 [4]. 2. Platform as a Service (PaaS): In this model software or development environment is offered as service upon which higher levels of services can be built means in which applications can be developed and deployed. Examples: Force.com, Google App Engine [4]. 3. Infrastructure as a Service (IaaS): This service provides basic storage and computing capabilities. The user doesn t need to manage cloud infrastructure but he can control applications which are deployed by him, stored data on cloud infrastructure etc. Examples: Amazon EC2, Windows Azure [4] Deployment models of cloud computing: 1. Private Cloud: The cloud infrastructure is built for individual or single enterprise and which will be used by multiple users. Private cloud is maintained and controlled by that organization only[3]. 2. Public Cloud: Public cloud is a set of computing resources which are provided by third party organizations and use by general public [3]. 3. Hybrid cloud: Hybrid cloud is a combination of public cloud and private cloud. Hybrid cloud uses mix of computing resources provided by private as well public cloud [3]. Applications of Cloud Computing: Gmail: Gmail is a free service which is provided by Google [5]. Dropbox: Dropbox is a file hosting service. In this users can share and store their files, folders [5]. Nowadays cloud computing environments are used for storage of data and to process that data. Applications provided by these cloud environments are available to their authorized users only if internet connection is available. Data on cloud should be stored in such way that is should not be available to any third party without users permission. Managing the security of data and privacy of data is a new challenge in cloud computing [6]. 422
2 The common solution for data confidentiality is data encryption. To ensure the effectiveness of encryption it is necessary to consider the use of both encryption algorithm and key strength. As the cloud computing environment consist of large amounts of data transmission, storage and handling of data, it also necessary to consider processing speed and computational. Main problem about data encryption is managing the key of encryption. The cloud providers need to maintain keys for a large number of users, key management will become more difficult and complex because the users have not enough expertise to manage the keys [6]. II. RELATED WORK With the cloud computing, user can use various services over the Internet and also on the pay per use model [8]. Instead of storing your data on your own hard drive or updating applications as per your need you can use cloud services over the Internet. Cloud Computing services are used by many enterprises as per their need. As the use of cloud computing increases data security challenges also increase. There are number of data breaches that are happening day by day that affect the cloud growth. The main concern in adapting cloud is its security. Organizations are having large amount of data which gets increased day by day and because of that data security and privacy also needs to increase.increasing growth in information technology makes easy to steal data..of course, the burglar will take the advantage of this feature, so the security of digital data becomes more important. The objective is to ensure that the data required by customer should be confidential means is not being accessed by or not being disclosed to any unauthorized third person in the cloud. The client has to assure themselves that he providers are executing their security responsibility [6] [9]. In two ways it is possible to protect data or file. The first way is to hide the file. If we hide the file, hacker can t find that file and then he can t steal it. To a low level burglar, it is valid to prevent illegal access. But for a hacker, it is very easy to find out the hidden files in your system, so it doesn t work. The second method is encryption of data. If the encryption algorithm is proper, it is difficult to plagiarize the original data. But the question is obvious: the data can be falsified or broken. This method is also not sufficient to secure your data. The system contains three parts: SFS (Security File System) Daemon, FUSE (File System in User space) and Authorization Server. The application process will use system call to access the service of the kernel and start accessing the data. VFS (Virtual File System) in Linux kernel will turn the request to FUSE and then pass it to SFS Daemon. According to authorization result, the SFS Daemon returns the requested data to the application process where as FUSE is a user space file system development framework [9].It consists of: a Kernel Module, a User Space library, a Mount Utility. SFS s function is to provide secure mechanism to data. Authorization server s function is to give authorization to user. When file is created or uploaded by user, author or admin have rights to decide whether user needs the server authorization or not. By organizing the close grouping of these three modules, the file or data protection will performance increased dramatically. The aim of system protect file is not only from access methods and authority of data but also security of content resolution, and can mitigate the chance of data leakage at utmost [9]. III. PROPOSED WORK Cloud computing provides many services to enterprises. Also it is possible to access and store not only our business but also personal data on cloud. But with this benefits security of data is a major concern in cloud computing. Though user authentication is provided to access data but it is not sufficient for the security of data. To overcome this problem, it is necessary to develop a system which will provide not only access rights, encryption of data but also data will be disjointly stored. The aim of this work is to develop a system which will provide highest security to data. The implementation will consist of 4 modules: 1. User Authentication Module: In this module a cloud server will be developed. The server will be managed by an Admin and so admin panel development will be done. In the same way admin will create users and the users created by admin can only access the file by proper authentication. Once authenticated a user can download, read, write a file. Admin plays a vital role in the access rights definition of the users. 2. Encryption of data: Admin will define the role of different users and users data will be encrypt using the AES algorithm. The user access rights to be made more complex as apart from the reading and writing access rights there also needs to be a clear bifurcation of the file type and the prevention of certain files and/or programs can be prevented to safeguard the server data. 423
3 3. Store data disjoint: When the admin will upload data (file), first file will encrypted and then system will automatically break the file and the files will be stored on different locations of different machines (systems), so file on different system will be in encrypted format. When the admin upload file, he will ask for user s _id, validation key and AAES key will be send to that particular user. 4. File Access: When the user want access any file, he will request for that file. The user got validation key and encryption key on his _id.then after providing that keys by user,system will do cross-checking of key with the database. If the key matches then system will put all broken files together and display it to user. User will get that file in decrypted format. - Validation key should be five or more than five numbers and AAES key should be of 16 numbers only. 7. Click on upload button. Server panel will show file has been successfully uploaded. 8. Client panel will show file received. 9. File will break and stored on different client machines on different locations.(file uploading is done) Steps for File Access (Downloading file): 1. To download file, user will provides appropriate login details. 2. Again start the server and connect client to server. If admin have uploaded files in two client machines then connect both the client machines to server. Otherwise server will show an error. 3. Click on download button and provide details like name of the file which user wants to download, validation key and AAES key which user got on his _id. 4. Click on download button. 5. System will put broken files together; user will get that file and location of that file where the file is stored. 6. Client will show file has been sent to user. IV. RESULTS Figure 1: Proposed Work Steps for File storing (Uploading file): 1. Admin login with correct details 2. Start server. -After starting server, server will automatically show system s IP address, date and time. 3. Admin will create new user who can download the file. 4. On client side, connect client machine to server machine by providing appropriate IP address. (Note: You can connect many client machines to server. In the following results two systems connected to server.) 5. On server side, it will show number of clients connected to server with their system name, date and time. 6. Click on upload file button and provide all the details. (Choose file which you want to upload, AAES key, validation key, user s _id) Figure 2. Admin login information 424 Figure 3. Server Connection
4 Figure 4. New User Created by Admin Figure 8. File database information (AAES key and validation key, Host name in database) Figure 5. Client Connected to Server Figure 9. File sucessfully uploded(server Side) Figure 6. Two Clients connected to Server Figure 10. File Receeived Sucessfully (Client Side) Figure 7. File uploading with Encryption key and Validation key Figure 11. Encrypted Broken files on different systems 425
5 Figure 12. User login information Figure 15. File successfully downloaded from two clients (systems) and showing file path Figure 13. Server connection for downloading file Figure 16. Client showing file sent to user Figure 14. User providing file downloading details which he got on his _id Figure17. Merged file from two systems V. PERFORMANCE ANALYSIS Performance of the system will be measured on the strength of security provided. The performance parameters include read, write, upload, and download operation to file and breaking of file. 426
6 Performance will be analysed on four layers for security of data: 1. Authentication of User and defining roles of user 2. Encryption of data 3. Breaking of data and then storing that data on different locations VI. CONCLUSION In information society, data is become one of the most important part to company or individual. At the same time data leakage becomes an important aspect. By designing four layers for security of data which consist of providing authentication of user, and from administrator side access control mechanism is also provided to each user.based upon that only user can perform various activities. Also user s data will be stored in encrypted format. User s data will be stored disjoint so hacker cannot access whole data. Using the combination of this four layers security of file can be increased. REFERENCES [1] Ranjita Mishra, Sanjit Kumar Dash, A Privacy Preserving Repository for Securing Data across the Cloud,Electronics Computer Technology(ICECT), vol. 5, pp.6-10, 2011 [2] Cloud computing is a colloquial expression, 22 Aug 2013 [3] NIST Definition of Cloud, 22 Aug 2013 [4] Cloud computing service models, 30 Aug 2013 [5] Computing Applications, 15 Sep 2013 [6] Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, vol.1.pp , 2012 [7] Wayne A. Jansen, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 44th Hawaii International Conference on System Sciences (HICSS), pp.1-10, 2011 [8] Di Iu, Pingchang Bai, Hong Jiang, Using The User Space File System To Protect File International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp ,2010. [9] V.Nirmala,R.K.Sivanandhan,Dr.R.ShanmugaLakshmi, Data Confidentiality and Integrity Verification Using User Authentication Scheme in Cloud IEEE International Conference on Green High Performance Computing (ICGHPC),pp.1-5,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationSECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationA SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com
More informationSecurity Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More informationApplication Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationManual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationDaren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
More informationCLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
More informationA SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING
A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor
More informationA Model for Data Protection Based on the Concept of Secure Cloud Computing
International Journal of Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 A Model for Data Protection Based on the Concept of Secure Cloud Computing Gargee Sharma 1, Prakriti Trivedi
More informationCloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationInternational Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE,
More informationA Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
More informationScientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationAbout me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
More informationSRG Security Services Technology Report Cloud Computing and Drop Box April 2013
SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationA Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
More informationData Leakage Detection in Cloud Computing using Identity Services
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Data Leakage Detection in Cloud Computing using Identity Services K. Mythili 1*,
More informationIMPLEMENTING DATA SECURITY IN MULTI CLOUD
IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationSecurity in Changing IT Ecosystem: Virtualization and Cloud Computing
Security in Changing IT Ecosystem: Virtualization and Cloud Computing Dr. Dhiren Patel Indian Institute of Technology Gandhinagar, India dhiren@iitgn.ac.in Cloud Computing World is further shrinking!!!
More informationCloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationCloud Computing in Medical Diagnosis for improving Health Care Environment
Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,
More informationCLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
More informationCHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationSurvey On Security Threats In Data Storing & Sharing In Cloud Environment
Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India
More informationThird Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
More informationMIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
More informationTamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
More informationResearch on Storage Techniques in Cloud Computing
American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei
More informationCloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
More informationUsage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
More informationCloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
More informationCloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
More informationBanking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationInternational Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
More informationCryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
More informationRole of Cloud Computing in Education
Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic
More informationIndian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved
Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Analysis Web enabled cloud library system: a conceptual
More informationVIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
More informationA Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
More informationAuthentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationMobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
More informationSECURITY OF CLOUD STORAGE AND CLOUD COMPUTING
SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING ECE 646 Final Presentation George Mason University GIRI PRANEETH KOMMALAPATI VENKAT RAMAN SRIPERUMBUDUR Introduction Save and access the files online. Data
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More informationA Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationSecure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing
Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationqwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer Problems Faced by Cloud Computing tyuiopasdfghjklzxcvbnmqwertyuiopas
More informationCloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationAbstract 1. INTRODUCTION
Abstract CLOUD COMPUTING GauravBawa & Sheena Girdhar DAV Institute of Engineering and Technology, Jalandhar Email: gaurav.daviet@yahoo.com, sheenagirdhar@gmail.com Contact Numbers: 09417614654,09914658188
More informationCloud Computing Services In Libraries: An Overview
9 th Convention PLANNER 2014 Cloud Computing Services In Libraries... Cloud Computing Services In Libraries: An Overview Shekar HP Muttayya Konganurmath Abstract The purpose of this paper is to provide
More informationCloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT What Have We Learned So Far? We have learned several cloud applications (Dropbox, Google Docs, Piazza, etc.) Dropbox SugarSync
More informationCloud Computing. What is it? Presented by Prof. Dr.Prabhas CHONGSTITVATANA Asst. Prof. Dr.Chaiyachet SAIVICHIT. Source : Montana State Library Archive
Cloud Computing What is it? Presented by Prof. Dr.Prabhas CHONGSTITVATANA Asst. Prof. Dr.Chaiyachet SAIVICHIT Source : Montana State Library Archive Source: http://www.free-pictures-photos.com/ How much
More informationA Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
More informationCloud Computing Security Issues and Controls
Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud
More informationA Proposed Secure Framework for Safe Data Transmission in Private Cloud
A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred
More informationCopyright IEEE. Citation for the published paper:
Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products
More informationIndex-Terms - S-Box Key Exchange, DSKE Method, And Three Layer Security, Modified Diffie-Hellman Key Exchange.
Secured and Authenticated Communication in Cloud Using Dynamic Key Exchange Protocol Abstract -Cloud computing is a new type of service which provides large scale computing resources to each customer.
More informationAsigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data
Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and
More informationHow To Compare Resource Allocation In Cloud Computing
An Efficient Resource Allocation Strategies in Cloud Computing B.Rajasekar 1,S.K.Manigandan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai, India 1 Assistant Professor, VelTech
More informationParametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
More informationOptimized Multi-tenancy Secure mechanism in SPI Cloud Architecture
Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized
More informationCloud Computing: Advantages and Security Challenges
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 771-778 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
More informationObjectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer
1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,
More informationProposal. Deployment Guide. How to Use CloudBerry Drive with Oracle Storage Cloud Service WWW.CLOUDBERRYLAB.COM
Proposal Deployment Guide How to Use CloudBerry Drive with Oracle Storage Cloud Service WWW.CLOUDBERRYLAB.COM Contents PRELIMINARY DETAILS... 3 LEGAL NOTICE... 3 INTRODUCTION... 4 HOW TO SIGN UP FOR ORACLE
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationSECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com
More informationWhy back up the Cloud?
Why back up the Cloud? The CloudBerry Lab Whitepaper The introduction Always backup your data, even if it is in the cloud. The 3-2-1 rule of data protection says keep three copies of your data, on two
More informationWHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
More information10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More informationA Review on Leaders in Cloud Computing Service Providers and Cloud SQL a Case Study
Research Journal of Applied Sciences, Engineering and Technology 4(17): 2926-2933, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: December 16, 2011 Accepted: January 13, 2012 Published:
More informationResearch Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
More informationPerformance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
More informationKeywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
More informationWelcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationINCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
More informationOutline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More information