Data Security in Cloud Computing using Elliptical Curve Cryptography
|
|
|
- Raymond Stevenson
- 9 years ago
- Views:
Transcription
1 Data Security in Cloud Computing using Elliptical Curve Cryptography Mr. Pragnesh G. Patel #1, Mr. S.M.Shah *2 # M.E.C.S.E, Government Engineering College Sector-28, Gandhinagar, Gujarat, India 1 [email protected] * Associate Professor Government Engineering College Sector-28, Gandhinagar, Gujarat, India 2 [email protected] Abstract Cloud computing is a technique used to unite the power of various resources over network in a more efficient and scalable way to the end user. Cloud computing is one of the rapidly growing field of IT among the many business activities of large organization. It provides various resources in the form of services: infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), or software-as-a service (SaaS) as per usage base model. With the advantages, to access the services there is need to share resources and data including crucial information over the network, which lead to the hackers for various security issues. There is a need to provide security to data while they are at data centre or in the network. There are various security threats to the cloud computing and several authentication and encryption methods are available to provide security. In this paper, I have proposed elliptical curve cryptography based encryption and decryption algorithm and implemented the same algorithm in cloud environment and compare it with conventional algorithm. Keywords Cloud Computing, Data Security, Elliptical Curve Cryptography. I. INTRODUCTION This Cloud computing is the next generation evolution in the field of distributed computation. Certainly people can have the whole thing they need on the cloud. Cloud computing is the next expected step in the evolution of on-demand information technology services and products. Cloud computing is internet based computing where software, infrastructure, platform, devices and other resources and hosting to computers are provided as services on a pay-per-asyou-use basis to customers. The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at datacenters. Cloud computing leverages its low cost and simplicity to both providers and users. Machine virtualization has enabled such cost-effectiveness. Users can access these services available on the internet cloud without having any previous knowledge on managing the resources involved. IT companies with creative ideas for new application services are no longer required to make large capital expenses in the hardware and software infrastructures. By using clouds as the application platform, IT companies are freed from the trivial task of setting up basic hardware and software infrastructures. Thus, they can concentrate more on the core business processes rather than spending time on gaining knowledge on resources needed to manage their business processes. In cloud computing, all or partial data of the users are transferred over the network and/or stored in the cloud using various data centre. So there is a greater risk of various security vulnerabilities of user s data which include their personal data such as bank account detail, credit card number. So we need some mechanism to protect these data not only on the data centre but also over the communication network. II. BASICS OF CLOUD COMPUTING A. What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) which create cloud. Cloud computing is a disruptive technology that has the potential to enhance collaboration, agility, scaling, and availability, and provides the opportunities for cost reduction through optimized and efficient computing [1]. Cloud computing can also be defined as it is a new service, which are the collection of technologies and a means of supporting the use of large scale Internet services for the remote applications with good quality of service (QoS) levels [2]. B. Types of Cloud Computing In cloud computing, everything is provided in the form of services. There are three basic types of services [3]. 1) Software as a Service (SaaS): It provides capabilities to use various software applications running on a cloud infrastructure. The software applications are accessible throw client interface like web browser. The 479
2 best example of this is Google Docs, which you can use for creating and storing text documents, presentations, spreadsheets etc. It provides high level of security compare to PaaS and IaaS. 2) Platform as a Service (PaaS): It provides capabilities to deploy consumer-created or acquired applications created using programming languages and tools supported by the provider onto the cloud infrastructure. For example, we can create web based application like e-bay on the cloud platform. It provides middle level of security compare to PaaS and IaaS. 3) Infrastructure as a Service (IaaS): It provides capability to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. For example, it provides the infrastructure for hosting the website & pay as per use. It provides various online data storage for storing large data. It provides less level of security compare to SaaS and PaaS. C. Security Issues of Cloud Computing Security is the critical issues of cloud computing paradigm because all the storage of data or processing of data is done outside the user s computer. There is a greater risk of capturing large amount of data of the organization or hacking the confidential data of the enterprise or end user. Top security threats given by Cloud Security Alliance to Cloud Computing are as follow : 1) Abuse and Nefarious Use of Cloud Computing: Abuse and nefarious use of cloud computing is the top threat identified by the CSA. Attackers can penetrate a public cloud and find a way to upload malware to thousands of computers and use the power of the cloud infrastructure to attack other machines. Sharing infrastructure is a way of life for IaaS providers. Unfortunately, the components on which this infrastructure is based were not designed for that. To ensure that customers don't thread on each other's "territory, monitoring and strong compartmentalization is required. 5) Data Loss/Leakage: Be it by deletion without a backup, by loss of the encoding key or by unauthorized access, data is always in danger of being lost or stolen. This is one of the top concerns for businesses, because they not only stand to lose their reputation, but are also obligated by law to keep it safe. 6) Account, Service & Traffic Hijacking: Account service and traffic hijacking is another issue that cloud users need to be aware of. These threats range from man-in-the-middle attacks, to phishing and spam campaigns, to denial-of service attacks. 7) Unknown Risk Profile: Security should always in the upper portion of the priority list. Code updates, security practices, vulnerability profiles, intrusion attempts all things that should always be kept in mind. A. Existing System III. EXISTING AND PROPOSED SYSTEM We consider the use scenario of cloud computing as shown in Figure 1. This model includes the following players: the Data Owner (DO), the Cloud (CLD), a set of Data Consumers. In this model, data owner outsources their data to the cloud and authorizes a group of data consumers to access the data [4]. 2) Insecure Application Programming Interfaces: As software interfaces or APIs are what customers use to interact with cloud services, those must have extremely secure authentication, access control, encryption and activity monitoring mechanisms - especially when third parties start to build on them. 3) Malicious Insiders: The malicious insider threat is one that gains in importance as many providers still don't reveal how they hire people, how they grant them access to assets or how they monitor them. Transparency is, in this case, vital to a secure cloud offering, along with compliance reporting and breach notification. 4) Shared Technology Vulnerabilities: Fig. 1 Problem model [4] As the system assumes a public key setting, where every user (the data owner and the data consumers) has a public/private key pair, there is also an implicit Certificate Authority (CA), who certifies users public keys. More specifically, the data 480
3 owner outsources their data to the cloud for storage and management (by instructing the cloud for updating the database, e.g., add/delete records); the data owner also takes charge of managing authorization of the data consumers to access her data. While data owner store their data at the data centre, there will be a risk of data hacking during communication from data owner s location to the cloud or from the data centre site or physical control over the data centre. Another problem is that data owner has to authorize all the data consumers who access their data which increase the processing overhead to the data owner. So we propose ecc based encryption technique before storing them to the cloud. of ordered pairs (x, y) with coordinates in the field and such that x and y satisfy the relation given by the equation defining the curve, plus an extra point that is said to be at infinity. The set of points on an elliptic curve with coordinates in a finite field also form a group [b1]. B. System Model To provide the security against the above mentioned threats, we proposed elliptical curve cryptography (ECC) based algorithms. It uses the system modes as shown in figure 2. Fig. 3 Elliptical Curve Elliptic curves are mainly defined over two finite fields: 1) Prime field GF(P) 2) Binary field GF(2m) Fig. 2 System model As shown in the figure 2, different virtual machines are available in the cloud. We consider it as a private cloud and all the instances are performing communication with one another and also communicated to central authority virtual machine monitor (VMM). The proposed ECC based algorithm works on the data whenever data will transfer from the data owner to data centre or from data centre to end user or from one data centre to another data centre. C. Elliptical Curve Cryptography An elliptic curve is the set of solutions in an equation form which can be shown as follows: Y2 + axy + by = X3+ cx2 + dx + e... (1) where a, b, c, d, and e are the real numbers. Sometimes the general equation (1) can be referred to as Weierstrass equation. For our purpose, it is sufficient to limit ourselves to equations of the prime field of the form: Y2 mod p = (X3+ ax + b) mod p The Co-efficients a and b and the variables x and y are all elements of Zp. The set of points on the curve is the collection Prime field has the advantage of reusing the hardware resources. Elliptic curve cryptography (ECC) is a public-key cryptosystem. Every user has a public and a private key. Public key is used for encryption/signature verification. Private Key is used for decryption/signature generation. ECC use modular arithmetic or polynomial arithmetic for its operations depending on the field chosen. Elliptic curves are used as an extension to other current cryptosystems [5]. D. Proposed ECC- Based Algorithm The proposed algorithm is based on the elliptical curve cryptography (ECC). The proposed algorithm contains following main steps: alphabetic table, key generation, encryption, and decryption. Each step is described as follows: Alphabetic table generation: 1. Use an appropriate data structure to store the text to be encrypted. 2. Read the table in row major form and find the character stored in that position. 3. Note the row and column values. 4. Assign these values to the same character in all position it appears. Key generation: Each user of the scheme does the following: 481
4 1.Select an elliptic curve E over GF(p) or GF(2m). The number of points on E should be divisible by a large prime n. 2. Select a point on the curve ei = (xi, yi). 3. Select random number g. 4. Calculate ej= (xj,yj) = g * ei. 5. Announce ei,ej as public key and keep g as a private key. Encryption: 1. Select h a number in plaintext P and calculate pair of points on the text as ciphertext. 2. Ci= h * ei Cj = (xpi,ypj) + h * ej (Where plain text Pi = (xpi,ypj) ) 3. Send (Ci,Cj) Decryption: 1. After receiving ciphertext Ci and Cj calculate P(plain text) with the private key g. (xpi,ypj) = Cj - ( g * Ci) [ (-)sign means adding with inverse.] 2. Read the characters from the co-ordinates (xpi,ypj). Fig. 5 Instances of Cloud As we need to generate the Keypairs, Figure 6 displays generated Keypairs of the instances. E. Implementation Detail and Result We have performed the experiment on the intel corei5 processor with 8 GB RAM and created the cloud environment with the operating system Ubuntu and openstack. We create the various instances by logging into the Ubuntu s open stack dashboard and generate instances and its key pair and run our ECC based encryption algorithm. Fig. 6 Keypairs of Instances We have implemented the ECC based algorithm on one of the terminal of the cloud. Figure 7 shows the images of the implementation results of the ECC based algorithm. Fig. 4 Login for Ubuntu OpenStack Cloud is basically collection of various instances. We create instance in the cloud, Figure 5 displays the list of available instance in the cloud. Fig. 7 Implementation results of ECC based algorithm 482
5 F. Comparison of ECC and RSA- Based Algorithm ECC gives same level of security as RSA and ElGamal cryptosystem gives but with smaller key size. In ECC discrete points on the elliptic curve over a finite field are used as a cyclic group. All type of public key cryptography based schemes can get implemented using elliptic curve cryptography. Elliptic curve cryptography gives same level of security as other cryptographic schemes provide but it has not gained same popularity. It is based on group theory and field theory. Its security is based on elliptic curve discrete logarithm problem. Table-1 shows the comparison of ECC key size and equivalent RSA key size. From the table, we can see that the ECC gives same level of security as RSA with smaller key size. With the smaller key size, processing power also less compare to RSA hence ECC is more beneficial for the small device compare to RSA. ECC key Size RSA Key Size Ratio : : : : : :20 Table 1: Equivalent key size recommended by NIST For the comparison of the ECC based algorithm with the other algorithm, we need to perform the simulation by creating the cloud environment and hence we perform the simulation using the cloudsim toolkit and compare the results of the throughput of ECC based algorithm with other algorithms like DES,3DES and RSA and the results shows that throughput of ECC based algorithm is high compare to other algorithm because keysize is less compare to the other algorithm hence processing time is less. IV. CONSLUSION In this paper, we explain the basics of cloud computing with its characteristics and various deployment model of cloud computing and its advantages and disadvantages. We review the various authentication and encryption mechanism that applied for data security in cloud computing. We propose and implemented the ECC based algorithm for the data security in the cloud computing. We can apply any encryption or authentication method for data security, but as from the result comparison, for better performance with smaller size of data, elliptical curve cryptography method is better approach compare to RSA and other approach. In future, we can provide client side tool using elliptical curve cryptography based algorithm form small device because it will be more beneficial for smaller device compare to large device as it consume less power compare to other conventional algorithm. V. REFERENCES [1] Security Guidance for Critical Areas of focus in cloud computing v3.0 Prepared by Cloud Security Alliance, [2] Sales force Customer Relationships Management (CRM) system, [3] Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 Prepared by Cloud Security Alliance December [4] Yanjiang Yang, Youcheng Zhang A Generic Scheme for Secure Data Sharing in Cloud International Conference on Parallel Processing Workshops, IEEE [5] William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education India, [6] The National Institute of Standards and Technology (NIST), Information Technology Laboratory definition of Cloud Computing by Peter Mell and Tim Grance, version 15, October 7, [7] Megha Gupta, Syed Imtiyaz Hassan Improving scope of Cloud technology under Open Source Tool UNIASCIT, Vol 2 (1), pp , [8] Ubuntu Cloud Server, [9] D. Sravana Kumar, Ch. Suneetha, A. Chandrasekhar Cryptographic Protocols Using Elliptic Curve Over Finite Fields International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.01 January [10] Sunil Sanka, Chittaranjan Hota, Muttukrishnan Rajarajan Secure Data Access in Cloud Computing IEEE /10, [11] Sherif El-etriby, Eman M. Mohamed, Hatem S. Abdul-kader Modern Encryption Techniques for Cloud Computing:Randomness and Performance Testing ICCIT Fig. 8 Throughput comparison of ECC, RSA, DES & 3DES 483
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
SECURITY ANALYSIS OF CLOUD COMPUTING
Anju Chhibber* Dr. Sunil Batra** International Journal of Advanced Research in SECURITY ANALYSIS OF CLOUD COMPUTING Abstract: Cloud computing is a model that uses the concept of utility computing that
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
Enhancing Security of Cloud Computing using Elliptic Curve Cryptography
Enhancing Security of Cloud Computing using Elliptic Curve Cryptography Abhuday Tripathi MTech Amity University Lucknow Parul Yadav Sr.Lecturer Amity University Lucknow ABSTRACT Cloud computing is a form
CRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services
International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,
Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms
RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques
Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques G K Patra 1, Nilotpal Chakraborty 2 Abstract In today's scenario, a large scale of engineering
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
Scientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Survey on software testing techniques in cloud computing
Survey on software testing techniques in cloud computing V.Priyadharshini #1, Dr. A. Malathi *2 # PhD Research Scholar PG & Research Department of CS Government Arts College (Autonomous) Coimbatore 18.
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES
CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES Snehlata Kothari 1 and Dr. Sanjay Gaur 2 1 Assistant Professor (FCA), Pacific University, Udaipur, India Email: [email protected] 2 Associate
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Cloud Computing Security Issues and Access Control Solutions
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Cloud Computing Security Issues and Access Control Solutions Young-Gi Min 1), Hyo-Jin Shin 2), Young-Hwan Bang 3) Abstract Cloud computing
A Model for Data Protection Based on the Concept of Secure Cloud Computing
International Journal of Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 A Model for Data Protection Based on the Concept of Secure Cloud Computing Gargee Sharma 1, Prakriti Trivedi
NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
Survey on Data security Issues in Cloud Environment
Survey on Data security Issues in Cloud Environment Vasanth.C.Bhagawat Research Scholar/ Computer Science Bharathiar University, Coimbatore Dr. A.Arul L.S.Kumar Prof & Dean, Dept. of. CSE RGIT, Bangalore.
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker
Privacy Patterns in Public Clouds
Privacy Patterns in Public Clouds Sashank Dara Security Technologies Group, Cisco Systems, Bangalore email: [email protected] January 25, 2014 Abstract Internet users typically consume a wide range
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015
RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem Vyas S Department Of Computer Science and Engineering Panimalar Engineering College Chennai, India
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
