Secured Medical Information Transmission Using Chaos Through Cloud Computing

Size: px
Start display at page:

Download "Secured Medical Information Transmission Using Chaos Through Cloud Computing"

Transcription

1 Middle-East Journal of Scientific Research 23 (10): , 2015 ISSN IDOSI Publications, 2015 DOI: /idosi.mejsr Secured Medical Information Transmission Using Chaos Through Cloud Computing I. Bremnavas Department of Computer Engineering and Networks, College of Computer Science and Information Systems, Jazan University, Jazan, Saudi Arabia Abstract: The next generation platform cloud provides virtualization, dynamic resource pools and high availability. The user enables e cloud storage remotely to store eir data and enjoy e on-demand service and such a service also leaving users physical control of eir outsourced data. This problem can be addressed by achieving a secure and dependable cloud storage service. The proposed system uses e secured medical information transmission using chaotic technique rough e cloud computing system. Key words: Cloud storage Chaos Cloud computing Chaotic random key generation INTRODUCTION providers such as Microsoft SkyDrive, Amazon, Dropbox, Apple icloud and Google Drive are all services initiated Cloud computing is e new era of internet based few years back. The cloud computing models and computing system, which provides to user working characteristics are shown in Figure 1. wi e cloud applications in simple and customizable. The rapid development of cloud computing is It offers to store and access e cloud data from anywhere increasing severe security concern. Lack of security is by connecting e cloud application using internet [1]. e problem in widespread adoption of cloud Users are able to store eir local data in e remote server computing [3]. It bounded various security issues such as using e cloud service [2]. In is service oriented securing e data, virtualization and examining e computing environment, e cloud computing have utilization by e cloud computing dealers. Various progressed as a most popular paradigm which resolves security and privacy concern are in e unique cloud e infrastructures are delivered as a service. Most environment [4]. commonly used cloud service is data storage among oer services, where end users can outsource any data to Shared and Extensible Responsibility: Shared and cloud servers, to enjoy and access e hardware/software extensible responsibility is compromised between resources virtually wiout investment. A set of cloud customers in different delivery models. computing services such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Outsourcing: Cloud providers should have appropriate Service (IaaS) can be accessed by e cloud computing mechanisms to prevent e control of users data lose. model. In SaaS services are provided rough e service providers and customers to run applications on a cloud Heterogeneity: Security and privacy mechanism has infrastructure. It can be accessed rough web browsers. satisfied different cloud providers which may access e In PaaS services are a mode to rent hardware, operating different approaches, us generating integration system, storage and capacity of network over e internet. challenges. In IaaS services e consumer is provided wi storage management and network, power to control process and Multi-Tenancy: Policies, protection, data access and oer fundamental computing resources which are helpful deployment of application must be e considered as to manage arbitrary software. The popular cloud service major issues of a secure multi-tenant environment. Corresponding Auor: I. Bremnavas, Department of Computer Engineering and Networks, College of Computer Science and Information Systems, Jazan University, Jazan, Saudi Arabia. 2552

2 Fig. 1: Cloud computing NIST (National Institute of Standard and Technology) Definition The tremendous technical advantage of e cloud, Cloud Based Medical Information System: Businesses, security and privacy concern has been major problem organizations, medical information system and e preventing its adoption. Cloud users store e sensitive consumers are adopting cloud technologies. Nowadays, and privacy information in cloud instances. From security e serious problem in e-heal care environment is and privacy concerns, cloud providers need to ensure e medical information security. The security tool can protect confidentiality of e service. Any cloud service, user is medical information from attackers. L.M. Vaquero et al. supposed to know e risk associated wi e data focused only on e-heal security and privacy protection security, e.g., user data loss and data eft. in e cloud [12]. Cryptographic algorim like Rivest Auentication, data encryption, integrity, recovery and Shamir Adleman (RSA) and Data Encryption Standard user protection are all e important components to cover (DES) were used for medical information security. But it is e data security model in cloud. To avoid unauorised not effective for medical information security because of person access of e data, applying encryption e high data capacity and correlation among pixels. mechanism on data, at data is totally unusable. Chaos have been explored in last two decades for medical Encryption is always a powerful scheme whenever storing information security, it has some suitable intrinsic features e sensitive and privacy information. To confirm e of medical image processing. Chaos can be well applied in basic security model components like confidentiality, cryptography [13, 14]. Because it has many characteristics integrity and availability (CIA), e cloud storage which can be connected wi e confusion and diffusion provider need to include a security scheme to ensure at property in cryptography, such as sensitive dependence e shared storage environment safeguards for e data on initial conditions and parameters, broadband power [5]. This survey have been discussed some security spectrum, randomness in e time domain and ergodicity issues in cloud computing. E.M. Mohamed et al. [6] etc. discussed e data security model of cloud computing Cloud based medical information system is and also implemented data security model for cloud becoming more predominant in medicine. Still, in e-heal computing. care environment some medical information systems M. Balduzzi et al and C. Rong et al. [7, 8] presented have concerns about transferring eir data storage, e security issues review of e cloud computing. Akhil computing capacity to e cloud providers. Behl [9] has discussed e exiting security approaches Collaboration among e hospitals and medical society is and security issues related to e cloud environment. required for sharing patient medical data and images. E.Maisen [10] presented few key security issues of Patient medical data stored in virtual environment are cloud computing. Sabahi [11] focussed e security easily accessible by different healcare providers, us issues, reliability and availability for cloud computing and e advantage of process is facilitating sharing of data also given some solutions for security issues. and considerably reducing local storage requirements. 2553

3 Fig. 2: Cloud computing general architecture Ultimately what system allows physicians to build characterized by sensitive dependence on initial networks for storing e high volume of patient medical conditions and similarity to random behaviour. information and open platform for sharing and accessing Here, we consider one dimensional chaotic logistic of patient medical information. map. It is a simple model which yields chaos, can be The proposed system uses e secured patient written as: medical information transmission using chaotic map over to cloud computing system. The first process is to x n+1 = a x n (1-x n) ( n=0, 1, 2 ) where 0<=a<=4 provide e security for patient medical data using chaos and sharing and exchanging wi e available "Cloud". This is a discrete time map which receives a real The patient medical information will be available in e number between 0 and 1 and returns a real number in cloud, which can provide e required details to e [0, 1]. n denotes a discrete time step and x n denotes doctors and e patient can seek e treatment in oer a data at n. Time series x n (n=0, 1, 2 ) is deterministic. branch hospital, reduce e computational resource Using e above simulator, we can get ese sequences x0, maintenance in e hospital. The cloud computing general x 1, x 2... dramatically and a is e control parameters architecture is shown in Figure 2. governing e chaotic behavior. In e above logistic difference equation initial key Secured Medical Information Transmission Using a = 0.3 as e user perception. The difference equation is Chaotic Map in Cloud: From security perspective, for evaluated to generate a sequence of random numbers secure communication e encryption is a better which are sorted and eir index value is used. This value mechanism. Better to secure e data before storing in a 0.3 acts as an encryption key K for e encryption cloud server. User can give e permission to eir process. The image pixel in e one dimensional array members such at data can be easily accessed by em. format is being encrypted wi e pseudo random In a public cloud, users are sharing medical information numbers generated by e logistic map as e key in e wi oer medical hospitals. In a shared pool outside e chaotic region i.e., a value 0 and 4. It has been applied to hospitals, users don t have any knowledge or control of security and increases e hiding capacity of e where e resources are located. Because users share e embedding positions. This proposed algorim has been medical environment in e cloud, may put your data at put forward for Least Significant Bit (LSB) based image risk of seizure. Data integrity is assurance at e data is steganography in which e last bits of e cover image consistent and correct. Ensuring e integrity of e data are replaced by e bits of e message image which is really means at it changes only in response to encrypted using index based logistic chaotic map. auorized transactions. Now e image is encrypted in e chaotic region and it is The dynamic nonlinear system is chaos, has ready to send across e transmission channels wi more brought out e consideration of ese facts such as number of attackers. Figure 3 is e proposed flow low-dimensional dynamical systems are capable of diagram of secured medical image transmission using handling complex and unpredictable behaviour. Chaos chaos in distributed cloud environment. Figure 4 is e seems to be a good technique for encryption algorim, flow diagram of proposed embedding algorim. 2554

4 SENDERSIDE Medical Information System Database Medical Image Information (I) Chaotic signal is generated (CS) Chaos signal in to medical image information (CSI) Encrypted Medical Image Information wi respective index key (ES) Cloud Storage Medical Information System Database Extracted Medical Image Information (I) Chaotic s ignal is extracted Chaos signal in to medical image information (CSI) Encrypted Medical Image Information wi respective index key (ES) RECEIVER Fig. 3: Secured medical image transmission using chaos in distributed cloud environment Input medical image information (I) Embedding chaos signal in to medical image information (CSI) Output medical image information wi chaos signal (ES) Fig. 4: Embedding Process The medical information system has a patient medical x n+1 = ax n (1- x n) database, where n number of patient medical information in e database. It extracts e features from Step 3: The medical image information I is medical information and generates a key. To protect what e sensitive patient medical information are encrypted embedded wiin e chaotic signal S using e following steps before outsourcing to e cloud server. During e encryption process, e unique index key value is assigned for each patient medical data. Then, e encrypted query is submitted to e cloud server. Finally, e auorized user decrypts e received medical information. Working example of sender side encryption process is shown in Figure 5. Proposed Embedding Algorim: I/P and O/P: Medical image information, I: Encrypted Signal, ES Step 1: Load an medical image information from e database and store an image in one-dimensional array named as I. Step 2: Generate e chaotic signal S using logistic equation. Fix e covered boundary region based on e size of an medical image information I. The signal is assumed to be generated from e starting position of e boundary region. Set a key value K dynamically as user perception wiin e boundary region for representing e initial position. The medical image information value I is embedded wi chaotic signal S from K. The sort actual indexes of e sorted key values should be stored. Step 4: The Encrypted signal (ES) is transferred along wi e key value K. (The key value is embedded in a standardized position of e signal ES). 2555

5 Medical Image Information (I) Generate e signal based on e logistic equations (CSI) Medical Information and chaos signal wi e cover region (ES) Fig. 5: Working example of sender side encryption process 2556

6 Medical image information wi chaos signal (ES) Extracting chaos signal (CS) Medical image information (I) Fig. 6: Extraction Process Medical Information and chaos signal wi e cover region (ES) Extracting e Chaotic signal (CS) Medical Image Information (I) Fig. 7: Working example of receiver side decryption process 2557

7 Figure 6 is e flow diagram of proposed extraction 3. Fernandes, D.AB., L.FB. Soares, J.V. Gomes, M.M. process. The encrypted image is received by e trusted Freire and P.R.M. Inacio, Security issues in receiver. The indexing key value and e key is also cloud environments: a survey, Int. J. Inform. Sec., embedded in e same cover region wi secret coding. 13(2): The receiver generates e random numbers using same 4. Takabi, H., J. Joshi and G.J. Ahn, Secure cloud: logistic equation. The encrypted logistic map is Towards a comprehensive security framework for subtracted from e raw logistic map ereby e image is cloud computing environments, In: Computer being retrieved from e encrypted source of information. Software and Applications Conference Workshops Working example of receiver side decryption process is in (COMPSACW), 2010 IEEE 34 Annual, pp: Figure Xiao, Z. and Y. Xiao, Security and privacy in cloud computing, IEEE Commun. Surveys Tutorials, Proposed Extraction Algorim: 15(2): Mohamed, E.M., Hatem S. Abdelkader, Sherif E.I. I/P : Encrypted signal, ES Etriby, Enhanced Data Security Model for O/P : Medical image information, I Cloud Computing, in: 8 International Conference on Informatics and Systems (INFOS), Cairo, pp: Step 1: Receive e encrypted signal, ES from e open 7. Balduzzi, M., J. Zaddach, D. Balzarotti, E. Kirda and communication channel. S. Loureiro, A Security analysis of amazon s Step 2: Retrieve e actual indexes of e stored key value elastic compute cloud service, in: Proceedings of e K from encrypted signal ES. 27 Annual ACM Symposiumon Applied Step 3: Generate e chaotic signal S using logistic Computings, pp: equation. 8. Rong, C., S.T. Nguyen and M.G. Jaatun, x n+1 = ax n (1- x n) Beyond lightning: a survey on security challenges in cloud computing, Comput. Electr. Engg., 39(1): Step 4: Subtract e received encrypted signal, ES wi 9. Akhil Bhel, Emerging Security Challenges in e raw logistic signal, S using e key value K, to obtain Cloud Computing. Information and Communication a one-dimensional array for medical image information, I Technologies, in: World Congress on, Mumbai, Step 5: The resultant medical image information, I from e pp: one-dimensional array. 10. Eystein Maisen, Security Challenges and Solutions in Cloud Computing, in: International CONCLUSION Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp: In is work, we proposed a secured medical 11. Farzad Sabahi, Cloud Computing Security information transmission using chaotic map rough rd Threats and Responses, in: IEEE 3 International cloud computing system. The proposed meod considers Conference on Communication software and e techniques from chaos security and image processing Networks (ICCSN), pp: domains to perform secure medial information outsourcing 12. Abbas, A. and S.U. Khan, A Review on e problem. state-of-e-art privacy preserving approaches in e- healclouds, IEEE J. Biomed. Heal Inform. REFERENCES 13. Maniccam, S.S. and N.G. Bourbkis, Pattern Recognition, 37: Vaquero, L.M., L. Rodero-Merino, J. Caceres and 14. Kocarev, L., IEEE Circuits and System M. Lindner, A break in e clouds: towards a Magazine, 3: cloud definition, in: ACM SIGCOMM Computer Communication Review, pp: Mollah, M.B., K.R. Islam and S.S. Islam, Next generation of computing rough cloud computing technology, in: 25 IEEE Canadian Conference on Electrical Computer Engineering (CCECE), pp:

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

Enhance data security of private cloud using encryption scheme with RBAC

Enhance data security of private cloud using encryption scheme with RBAC Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College,

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the

More information

Cloud Computing and Attacks

Cloud Computing and Attacks Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large

More information

An Efficient data storage security algorithm using RSA Algorithm

An Efficient data storage security algorithm using RSA Algorithm An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert [email protected], [email protected] Yildiz Technical University (Turkey) Abstract

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing

More information

Information Security Management System for Cloud Computing

Information Security Management System for Cloud Computing ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing Security Issues And Methods to Overcome Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &

More information

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

Survey On Security Threats In Data Storing & Sharing In Cloud Environment Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India

More information

[email protected] [email protected]

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Cloud Computing Services In Libraries: An Overview

Cloud Computing Services In Libraries: An Overview 9 th Convention PLANNER 2014 Cloud Computing Services In Libraries... Cloud Computing Services In Libraries: An Overview Shekar HP Muttayya Konganurmath Abstract The purpose of this paper is to provide

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

A Fully Homomorphic Encryption Implementation on Cloud Computing

A Fully Homomorphic Encryption Implementation on Cloud Computing International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic

More information

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,

More information

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM

IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM Mohammed Abdullah Mohammed Aysan* Abstract: Electronic Fund Transfer involves electronic transfer

More information

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

A Novel Cryptographic Key Generation Method Using Image Features

A Novel Cryptographic Key Generation Method Using Image Features Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic

More information

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia [email protected] 2 MIRACL Lab, FSEG, University

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan

Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 2, 23-27, 2015 Secure Mobile Cloud Computing Based-On Fingerprint Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing

More information

A Review: Data Security Approach in Cloud computing by using RSA Algorithm

A Review: Data Security Approach in Cloud computing by using RSA Algorithm ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:

More information

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY Yogita Gangboir 1, Praveen Shende 2 1.,2 CSE Dept, CSIT Durg, (India) ABSTRACT Cloud computing is rising day by day around

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

RUNNING HEAD: Cloud Computing 1. Cloud Computing. Future of Computer Networking

RUNNING HEAD: Cloud Computing 1. Cloud Computing. Future of Computer Networking RUNNING HEAD: Cloud Computing 1 Cloud Computing Future of Computer Networking Asif U Islam University of North Texas LTEC 4550 Assignment 5 07/31/2014 Cloud Computing 2 Abstract The paper discusses the

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Cloud & Security. Dr Debabrata Nayak [email protected]

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages

More information

A Secure Model for Cloud Computing Based Storage and Retrieval

A Secure Model for Cloud Computing Based Storage and Retrieval IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

Cloud Computing in the Czech Republic

Cloud Computing in the Czech Republic Cloud Computing in the Czech Republic George Feuerlicht, Lukas Burkon and Nikos Margaris Cloud Computing Research Group Prague University of Economics Cloud Computing Research Group CCRG@KIT http://cloud-computing.vse.cz/wp/

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica

More information

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Secure Data Storage in Cloud Service using RC5 Algorithm

Secure Data Storage in Cloud Service using RC5 Algorithm International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-5 November 2013 Secure Data Storage in Cloud using RC5 Algorithm Sachindra K. Chavan, Manoj L. Bangare

More information