AUTHENTICATION AND AUTHORIZATION FOR FILE SHARING AND ACCESSING IN CLOUD
|
|
- Gerard Hopkins
- 8 years ago
- Views:
Transcription
1 Authentication and Authorization for File Sharing and Accessing in Cloud AUTHENTICATION AND AUTHORIZATION FOR FILE SHARING AND ACCESSING IN CLOUD R.Venkatesan 1, R.Saraswathy 2, R.Suganya 3, E.Anupriya 4 Assistant Professor 1, UG Scholar 2, UG scholar 3, UG Scholar 4 Department of Computer Science and Engineering CARE Group of Institutions Trichy. venkat.ishva@gmail.com 1, rsaraswathy94@gmail.com 2, sugu.shree869@gmail.com 3, eanupriya4993@gmail.com 4 Abstract - In many real world applications very sensitive information s are kept in log which is less on an un-trusted machine. This kind of sensitive information is can be hacked or misused at anytime. Basically whatever the information uploaded into the cloud environment its moves over the internet. Cloud which means moving data. While moving such data items security mechanisms are not so good. The basic security goals could not be achieved for even a small document. It seems like all the data are freely accessed under GPL. To overcome the above problem, the development of authentication and authorization in file sharing and accessing in cloud introduces some security mechanism. Security can be provided with the concept of cryptographic and steganography method. In this system the data owner can able to set the privileges to their files. Once uploaded the file will be processed under cryptography and steganography method along with the privileges grand by the data owner. Also they can able to track their log through the status about the each file and security level which they grant. Keywords - Trusted Storage Systems, Authentication, Authorization, Secured Logs, Integrity, Encryption, Cryptography, Steganography, lumberjack, log harmonizer. I. INTRODUCTION Cloud computing is the use of computing resources that are delivered as a service over the internet and its sharing the resources to individuals and business also. The name comes from the use of a cloud-shaped Cloud computing entrust remote services with a user's data(files),software s. Cloud Computing, has the ability to transform a large part of the IT sectors. And making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Moreover, companies with large batch-oriented tasks can get results as quickly as their programs can scale, since using thousand servers for less time costs no more than using one server for more time. This uses of resources, while not paying a quantity for big scale, is new within the history of IT. The Cloud information responsible framework [1] projected during this work conducts machine-driven work and distributed auditing of relevant access performed by any entity, taken out at any purpose of your time at any cloud service supplier. It has two major components: lumberjack and log harmonizer. The JAR file includes a group of straightforward access management rules specifying, whether and the way the cloud servers and presumably alternative information stakeholder s area unit licensed to access the content itself. Apart from that we have a tendency to area unit planning to check the integrity of the JRE on the systems on that the lumberjack parts are initiated. This integrity checks area unit disbursed by exploitation oblivious hashing.the projected methodology will take concern of the JAR file by changing the JAR into obfuscated code which is able to adds an extra layer of security to the infrastructure. Apart from that we have a tendency to area unit planning to enlarge the safety of user s information by demonstrable information possessions for integrity verification. Based on the configuration settings outlined at the time of creation, the JAR can provides the details of user s usage related to logging, or can offer solely work Page No: 38
2 R.Venkatesan 1, R.Saraswathy 2, R.Suganya 3, E.Anupriya 4 practicality. As for the work, whenever there is an access to the info, the JAR can automatically manufacture a log record. A log may be a record of events occurring at intervals an organization s system or network [1] Laws like HIPAA [2], Payment Card Industry information Security commonplace [3], or Sarbanes-Oxley [4] often need forensically sound preservation of knowledge. To befits these laws, proof created in an exceedingly, together with log records, should be unbiased, non tampered with, and complete before they'll be used. Since log files contain record of most system events together with user activities, they become a vital target for malicious attackers. An assaulter, breaking into a system, typically would strive to not leave traces of his or her activities behind. Consequently, the primary factor an assaulter usually will is to damage log files or interrupt the work services. What is more, the sensitive information contained in log files usually directly contributes to confidentiality breaches. An example of this is once logs contain information dealings information. II. RELATED WORK We briefly summarize the most recent and closely related We Work here as follows, Secure Audit Logs to Support Computer Forensics. In the work done by B.Schneier and J. Kelsey[1]. In many real-world applications, sensitive information is kept in logs which are less on an un-trusted machine. When an event occurs as an attacker captures this machine, it is guaranteed that the attacker will gain little or no information from the log less and to limit his ability to corrupt the log files. Their system describes a computationally cheap method for making all log entries generated prior to the logging machine's com-promise impossible for the attacker to read and also impossible to undetectably modify or destroy. A New Approach to Secure Logging is done by Di Ma and Gene Tsudik[2]. They were developed a special approach to secure work based mostly upon recently developed Forward-Secure ordered mixture (FssAgg) authentication techniques. Their approach offers each spaceefficiency and obvious security. They illustrate 2 concrete schemes one private-verifiable and one public verifiable that supply sensible secure work with none reliance on on-line trusted third parties or secure hardware. Here as a data owner cannot able to change their scheme of verifiability in a dynamic manner. Also the data owner s logs cannot be viewed by them. The entire log history of a data owner will be hided. FAL: A Forensics Aware Language for Secure Logging the work done by S Zawoad, R Hasan [3]. Using FAL, they outlined log structure, which represents the format of logs and ensures the protection properties of a selected secure work scheme. This log structures are often later utilized by FAL to serve two purposes. Also a software package security analyst can outline the desired audit path structure generate code for a generic purpose language (GPL), e.g., Java, C# to store the audit logs firmly. To deal with the matter of secure work mechanism, they have got designed and enforced the domain-specific language FAL with the subsequent limitations: Needed code to use specialized API for secure application logging is mechanically generated. Hence, the effort and cost for developing secure work theme is lower. Heterogeneous formats of logs with any secure work schemes are often simply handled. A.Yavuz, Peng Ning and their group introduced a novel system called Log Forwardsecure and Append-only Signature (LogFAS)[4]. LogFAS achieves the foremost fascinating properties of each isosceles and PKC based schemes at the same time. LogFAS will turn out in public verifiable forward-secure and append-only signatures without requiring any on-line trustworthy server support or time issue. Most notably, LogFAS is that the solely PKC-based theme that achieves the optimum booster procedure and storage potency. This can be fascinating since any dependence on the timely communication with a trustworthy server might be exploited by an energetic mortal to defeat the theme. AD Dhongade[5] done a survey on Secure Logging Techniques which describes The Log Records hold on in log file of a corporation could contain sensitive knowledge that ought to be protected properly for correct operating of a corporation. Maintaining security of such log records is one in the entire vital task. Also, over a protracted amount of your time maintaining integrity of such log knowledge is incredibly vital. However, deploying such a system for security of log records is an Page No: 39
3 Authentication and Authorization for File Sharing and Accessing in Cloud overhead for a corporation and conjointly it needs further value. M Bellare[6] developed a system called Secure audit log. They define the forward integrity security property, inspire its appropriateness as a systems security demand, and demonstrate styles that deliver the goods this property. Applications embody secure audit logs (e.g., syslog data) for intrusion detection or answerableness, communications security, and authenticating partial results of computation for mobile agents. They proved security theorems on their forward integrity message authentication theme, and discuss the secure audit log application thoroughly. A technically tougher doside is to style digital signature schemes with the forward security property. This has been done by Bellare and labore. The above systems were commonly have some limitation such as, No security for user s data. No authentication or security provided. High resource costs needed for the implementation. Not suitable for small and medium level storage users. Craig Gentry [7] constructed a secret writing theme that allows analysis of arbitrary circuits, it suffices to construct a secret writing scheme which will judge its own decoding circuit. Next, They describe a public key secret writing theme exploitation ideal lattices that's virtually bootstrap. Lattice-based cryptosystems usually have decoding algorithms with low circuit quality. Homomorphic secret writing schemes that aren't semantically secure, like basic RSA, May additionally have stronger attacks on their one-way. Ensuring Distributed Accountability for Data Sharing in Cloud Securing data owners using cryptography in cloud The work done by a karthick[8] and their group. They proposed a CIA framework, based on the notation of information accountability.unlike privacy protection technologies which are built on the hideit-or-lose-it perspective. information accountability focuses on keeping the data usage transparent and trackable.their proposed CIA framework provides end-toned accountability in a highly distributed fashion. Here no secure cloud database is maintained and need to apply secret key algorithm to avoid the risk of data loosing and stealing. III. SECURING DATA OWNERS USING CRYPTOGRAPHY IN CLOUD a server operating in a cloud-based environment. We address security goals and integrity issues not only just during the log generation phase. The major contributions of this system, as follows, the propose architecture for the various components of the system and develop cryptographic protocols to address integrity and confidentiality issues with storing the data, managing data, and viewing log records at the honest but curious cloud provider and in transit. To overcome the above problems, we introduce a novel method, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Data Owner will transfer the information into the cloud server once encrypted the information. User will subscribe into the cloud server with sure access polices like browse, write and replica of the first information. The Loggers and Log Harmonizer can have a track of the access logs and reports to the data owner. This entire Cloud information accountability has the following sub sections namely, i. Log Generators ii. Logging Client or Logging Relay iii. Logging Cloud iv. Log Monitor SYSTEM ARCHITEURE (i)log Generators Fig. 1 Architecture Diagram Our system introduces a comprehensive These are the computing devices that solution for storing and maintaining log records in generate log data. Each organization hat adopts the Page No: 40
4 R.Venkatesan 1, R.Saraswathy 2, R.Suganya 3, E.Anupriya 4 cloud-based log management service has a number of log generators. Each of these generators is up to with logging capability. The log files generated by these hosts are not stored locally except temporarily till such time as they are pushed to the logging client. (ii)logging Client or Logging Relay The logging client might be a collector that receives groups of log records generated by one or plenty of log generators, and prepares the log data therefore it should be pushed to the cloud for long-term storage. The log data is transferred from the generators to the patron in batches, either on a schedule, or as and once needed looking on the quantity of log data waiting to be transferred. The logging client incorporates security protection on batches of accumulated log data and pushed..the logging client incorporates security protection on batches of accumulated log knowledge and pushes every batch to the logging cloud. once the logging client pushes log knowledge to the cloud it acts as a logging relay. This system use the terms logging client and logging relay interchangeably. The logging client or relay are often enforced as a bunch of collaborating hosts. For simplicity but, we have a tendency to assume that there's one logging client (iii) Logging Cloud The logging cloud provides future storage and maintenance service to log knowledge received from totally different logging clients happiness to different organizations. The logging cloud is maintained by a cloud service owner. solely those organizations that have signed to the logging cloud s services will transfer knowledge to the cloud.its, for the asking from a data owner can even delete log knowledge and perform log deletion. Before the logging cloud can delete or update log knowledge it desires a signal from the requester that the latter is allowed to form such a call for participation. The logging client generates such a signal. However, the proof are often given by the logging client to any entity that it needs to authorize (iv) Log Monitors These area unit hosts that area unit accustomed monitor and review log knowledge. they'll generate queries to retrieve log knowledge from the cloud. supported the log knowledge retrieved, these monitors can perform any analysis as needed. It will additionally raise the log cloud to delete log knowledge for good, or rotate logs ALGORITHM Pushing or pulling strategies have interesting tradeoffs. The pushing strategy is beneficial when there are a large number of accesses to the data within a short period of time. In this case, if the data are not pushed out frequently enough, the log file may become very large, which may increase cost of operations like copying data. The pushing mode may be preferred by data owners who are organizations and need to keep track of the data usage consistently over time. For such data owners, receiving the logs automatically can lighten the load of the data analyzers. The maximum size at which logs are pushed out is a parameter which can be easily configured while creating the logger component. The pull strategy is most needed when the data owner suspects some misuse of his data; the pull mode allows him to monitor the usage of his content immediately. A hybrid strategy can actually be implemented to benefit of the consistent information offered by pushing mode and the convenience of the pull mode. Logging mechanism: The Logger Structure Log Record Generation Dependability of Logs JARs Availability Log Correctness Examples In this twenty examples are provided for the MAC generation process. The underlying block cipher is either the AES algorithm or TDEA. A block cipher key is fixed for each of the currently allowed key sizes, i.e., AES-128, AES-192, AES- 256, two key TDEA, and three key TDEA. For each key, the generation of the associated sub keys is given, followed by four examples of MAC generation with the key. The messages in each set of examples are derived by truncating a common fixed string of 64 bytes. All strings are represented in hexadecimal notation, with a space (or a new line) inserted every 8 symbols, for readability. As Page No: 41
5 Authentication and Authorization for File Sharing and Accessing in Cloud in the body of the Recommendation, K1 and K2denote the sub keys, M denotes the message, and T denotes the MAC. For the AES algorithm examples, Tlen is 128, i.e., 32 hexadecimal symbols, and K denotes the key. For the TDEA examples, Tlen is 64, i.e., 16 hexadecimal symbols, and the key, K, is the ordered triple of strings, (Key1, Key2, Key3). For two key TDEA, Key1 = Key3. D.1 AES-128 For Examples 1 4 below, the block cipher is the AES algorithm with the following 128 bit key: K 2b7e aed2a6 abf cf4f3c. Subkey Generation CIPHK(0 128 ) 7df76b0c 1ab899b3 3e42f047 b91b546f K1 fbeed c85e08f 7236a8de K2 f7ddac30 6ae266cc f90bc11e e46d513b IV EXPERIMENTAL RESULTS According to the method described above and the structure of cloud for data owner who were registered with this system. We build an experimental system with 25 data owners. They were requested to upload the various forms of data such as images, documents, pdf, etc. Each user can able to set the level of security for the every data which they uploaded. Based on the findings of the probability value for the security issues on various forms of data can be assessed with the help of P- test and T-Test method. Data owner1 uploaded the 3 forms of data such as, images, documents and pdf files. These data items were supposed to view by any number of users over the internet. During the visibility of data the system achieved the security level for protecting such data from un-authorized users in network. The following table demonstrates the proof of the achieved security level, TABLE 1 EXPERIMENT TABLE users Owners Uploaded data Probability Value Total Cumula 1 Data Owner1 Share( 0.25) View(0.5) Download(0. 05) Status(0.2) tive Value Images Documents Pdf Audio exe files As per above table more than 10 users were used the data which are uploaded by the various data owners. By considering the parameters and values obtained through those parameters are recorded. For all 10 users cumulative probability values are generated depends on their action. The obtained cumulated probability values are given to the input of the t-test calculator to verify the significant level of security. The positive result will be considered by taking the value of T-test result. The obtained value should be lesser than that of the predefined significant value as 0.10 as per mathematical rule. From the above table the system proves that the Cloud Information Accountability (CIA) reaches the expected security level. Page No: 42
6 R.Venkatesan 1, R.Saraswathy 2, R.Suganya 3, E.Anupriya 4 User s U1 0.7 U U U4 0.7 U5 0.7 U U U U U Cumulati ve values TABLE 2 RESULTANT TABLE T- Value P- Value 0.74 = >0.74 = <0.74 = Result The T- value is lesser than the significa nt level of 0.10 so that the level of security is proved. (ISSN , ISO 9001:2008 Certified Journal, Volume 4, Issue 3, March [6] Mihir Bellare,Bennet S. Yeey Forward Integrity For Secure Audit Logs Dept. of Computer Science & Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA [7] Craig Gentry Fully Homomorphic Encryption Using Ideal Lattices Stanford University and IBM Watson. [8] K. Karthick, P. Jennifer and A. Muthukumaravel Ensuring Distributed Accountability for Data Sharing in Cloud Securing data owners using cryptography In cloud. Middle-East Journal of Scientific Research (6): , ****IJCI-2K15-428**** IV. CONCLUSION This system proposed innovative approaches for automatically logging any access to the data in the cloud together with an auditing mechanism. Our approach allows the data owner to not only audit his content but also enforce strong back-end protection if needed. Moreover, one of the main features of our work is that it enables the data owner to audit even those copies of its data that were made without his knowledge. REFERENCES [1] Bruce Schneier, John Kelsey Secure Audit Logs to Support Computer Forensics Counterpane Systems 101 East Minnehaha Parkway, Minneapolis, MN [2] Di ma and Gene Tsudik A New Approach to Secure Logging ACM Transactions on Storage, Vol. 5, No. 1, Article 2, Publication date: March [3] Shams Zawoad, Marjan Mernik, Ragib Hasan FAL: A Forensics Aware Language for Secure Logging, Proceedings of the 2013 Federated Conference on Computer Science and Information Systems pp [4] Attila A. Yavuz and Peng Ning Michael K. Reiter Efficient Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter. [5] Anagha D. Dhongade, Prof.N.L.Bhale Secure Logging Techniques: A Survey International Journal of Emerging Technology and Advanced Engineering Website: Page No: 43
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationDecentralized Information Accountability Framework for Information Sharing In Cloud Environment
Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationSecuring Network Audit Logs on Untrusted Machines. Bruce Schneier. schneier@counterpane.com
Securing Network Audit Logs on Untrusted Machines Bruce Schneier schneier@counterpane.com Counterpane Systems 101 East Minnehaha Parkway, Minneapolis, MN 55419 (612) 823-1098 Fax: (612) 823-1590 RAID Louvain-la-Neuve
More informationDistributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
More informationCloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
More informationSecure Log Data Storage in Cloud by Using AES Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 7, July 2015, PP 1-6 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Secure
More informationMerkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationHYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, er.aman_jot@yahoo.co.in 2 Assistant Professor,
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationJournal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationPrivacy Patterns in Public Clouds
Privacy Patterns in Public Clouds Sashank Dara Security Technologies Group, Cisco Systems, Bangalore email: krishna.sashank@gmail.com January 25, 2014 Abstract Internet users typically consume a wide range
More informationIdentifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationAN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, jpav23@gmail.com) 2 (Asst. Professor, MRIT, Hyderabad, India, a.naveen21@gmail.com)
More informationEvaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
More informationSecuring Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
More informationA survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
More informationA PKI-BASED SECURE AUDIT WEB SERVICE
A PKI-BASED SECURE AUDIT WEB SERVICE Wensheng Xu, David Chadwick, Sassa Otenko Computing Laboratory, University of Kent, Canterbury, CT2 7NZ, England {w.xu, d.w.chadwick, o.otenko}@kent.ac.uk ABSTRACT
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationHow To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.
More informationCloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationProviding Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationCapture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department
More informationEnabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationA New Cloud Paradigm: Data Protection as a Service (DPASS)
A New Cloud Paradigm: Data Protection as a Service (DPASS) KholeSagar R. 1,Walunj Ajit S. 2,Gulave Rahul K. 3,Nikam Umesh P. 4 Student, Department of Computer Engineering, SavitribaiPhule Pune University,
More informationHow To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
More informationInformation Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
More informationLecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationAnalysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
More informationFuzzy Keyword Search over Encrypted Stego in Cloud
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh
More informationDATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY Epuru Madhavarao 1, M Parimala 2,Chikkala JayaRaju 3 Abstract Cloud computing enables highly scalable services to be easily consumed over the
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationPUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY
PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY G.SHAIK ABDULLAH 1, B.MUTHULAKSHMI 2 1 2 Post Graduate Student, Assistant Professor 1&2 Department of Computer Science
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationDATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationData Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationAnalysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
More informationSecure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
More informationSPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
More informationCryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationHow To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationPublic Auditing for Shared Data in the Cloud by Using AES
Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer
More informationMonalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
More informationMIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
More informationA Novel Event-Oriented Architecture for Logging and Auditing in
A Novel Event-Oriented Architecture for Logging and Auditing in Distributed Systems 1 Elnaz B. Noeparast, 2 Reza Ravani 1 Department of Computer Engineering, Islamic Azad University, Central Tehran Branch,
More informationSHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
More informationA REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationProject Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
More informationSoftware Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
More informationA Study on Secure Electronic Medical DB System in Hospital Environment
A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133
More informationAN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College
More informationDIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationEfficient Integrity Checking Technique for Securing Client Data in Cloud Computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationData Protection on Progress Databases and Progress 4GL Environment
Proceedings of the 8 th International Conference on Applied Informatics Eger, Hungary, January 27 30, 2010. Vol. 1. pp. 345 352. Data Protection on Progress Databases and Progress 4GL Environment Attila
More informationData Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab pankaj.sareen1480@gmail.com Dr. Tripat Deep Singh Assistant Professor, Department
More informationAn Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationIS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationEnabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationOCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More information