An Approach for Secure Data Transmission in Private Cloud
|
|
|
- Shawn McDaniel
- 10 years ago
- Views:
Transcription
1 An Approach for Secure Data Transmission in Private Cloud Anurag Porwal, Rohit Maheshwari, B.L.Pal, Gaurav Kakhani Abstract In the cloud, the data is transferred among the server and client. Cloud security is the current discussion in the IT world. This research paper helps in securing the data without affecting the network layers and protecting the data from unauthorized entries into the server, the data is secured in server based on users choice of security method so that data is given high secure priority. Index Terms Cloud, Private Cloud, Security, Secure data Transmission. I. INTRODUCTION Cloud computing is a recent trending in IT that where computing and data storage is done in data centers rather than personal portable PC s. It refers to applications delivered as services over the internet as well as to the cloud infrastructure namely the hardware and system software in data centers that provide this service. The sharing of resources reduces the cost to individuals. The best definition for Cloud is defined in [9] as large pool of easily accessible and virtualized resources which can be dynamically reconfigured to adjust a variable load, allowing also for optimum scale utilization. The key driving forces behind cloud computing is the ubiquity of broadband and wireless networking, falling storage costs, and progressive improvements in Internet computing software. The main technical supporting of cloud computing infrastructures and services include virtualization, service-oriented software, grid computing technologies, management of large facilities, and power efficiency. The key features of the cloud are agility, cost, device and location independence, multi tenancy, reliability, scalability, maintenance etc. II. DEPLOYMENT MODELS OF CLOUD The cloud can be deployed in three models. The Fig: 2.1 explain its structure [12]. They are described in different ways. In generalized it is described as below: A. Public Cloud: Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis. This is a general cloud available to public over Internet. B. Private Cloud: A private cloud is one in which the services and infrastructure are maintained on a private network. These clouds offer the greatest level of security and control, but they require the company to still purchase and maintain all the software and infrastructure, which reduces the cost savings. C. Hybrid Cloud: A hybrid cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises". By integrating multiple cloud services users may be able to ease the transition to public cloud services while avoiding issues such as PCI compliance. Manuscript received Feb. 15, Anurag Porwal, Department of Computer Science, Mewar University, Chittorgarh (Rajasthan), India, ,( [email protected]). Rohit Maheshwari, Department of Computer Science, Mewar University, Chittorgarh (Rajasthan), India, , ( [email protected]). B.L.Pal, Department of Computer Science, Mewar University, Chittorgarh (Rajasthan), India, , ( [email protected]). Gaurav Kakhani, Department of Computer Science, Mewar University, Chittorgarh (Rajasthan), India, , ( [email protected]). Fig 2.1: Cloud Computing Types III. SERVICES PROVIDED BY CLOUD: The different types of services provided by cloud are IaaS, PaaS and SaaS. 151
2 An Approach for Secure Data Transmission in Private Cloud A. Infrastructure as a Service (IaaS): IP s manage a larger set of computing resources such as storing and processing capacity. Through virtualization, they are able to split, assign and dynamically resize the resources to build ad-hoc systems as demanded by the customers, the Service providers. They deploy the software stacks that run their services. This is infrastructure as a service. B. Platform as a Service (PaaS): Cloud systems can offer an additional abstraction levels instead of supplying a virtualized infrastructure. They can provide the software platform where systems run on. The sizing of hardware resources is made in a transparent manner. C. Software as a Service (SaaS): There are services of potential interest to a wide variety of users hosted in a cloud system. This is an alternate to locally running application. An example of this is online alternative of typical office applications such as word processor. Client Application (SaaS) Platform (PaaS) Infrastructure (IaaS) Server Fig 3.1: Layers of cloud IV. Motivation Security in Information Technology is the main buzz word discussed in the current times. The hackers or attackers are increased in number and waiting to attack the important data over the new advanced technologies also. Among them cloud computing is one, this is the technology being adopted by every corporate company for reducing their expenditures and increasing their business profits. They are mainly worried for security of data. This leads me to this research area as my interest in security can be used in the advanced technology giving certain best solution to secure data over the cloud. A. Security Issues and challenges Subhashini [2] have described all security related issues present in the cloud computing. The various deployments of the cloud and all the issues present in each deployment are been defined in the paper. They have defined in respect to the service delivery where in each type of SaaS, PaaS, and IaaS. They in particular defined all the security problems in the software as a service of cloud computing. In Issues of SaaS, there are categories based on data, network, web applications and virtualization vulnerabilities. Kresimer Popovic [7] have discussed different security concerns present in the cloud model which is losing confidentiality and integrity of the data while transfer, storage and retrieval. They also discussed on the things that is to be consider where the threats are present in cloud computing like from user to type of services. With the above issues they concluded that we need to take security and privacy in providing cloud services. Balachandra reddy [4] have discussed about service level agreements that are been issued by user to provider before getting into cloud. This is the only trust a provider will see from user, but it not enough to provide security as it does not answers the problems to the losses of the user, there should be certain changes according to the type of service a user is working and need to be standardized with privileged user access, data segregation, location of data etc. Steve Mansfield [12] has discussed regarding the advantages of having the cloud at the same time the issues present in cloud. When we use in our perimeter area we use many security sides like firewalls DMZ z etc., where as in cloud all are on a remote system without any security. Author mainly points out that we need to have a great deal of trust in the design of system with good authentication and authorization capabilities. Sameera Abdulrahman Almulla [11] have discussed about services in cloud computing, the challenges regarding the information security concerns in respect to confidentiality, Integrity and availability. They discussed security challenges of cloud computing in respect to identity and access management. Patrick Mc. Daniel and Sean W. Smith [10] described about challenges of security and improvements that are to be made over cloud for secure data over cloud. They concentrated mainly on security issues over cloud instances. The instances over cloud will be running on some base system which may compromise and causes a security issue. There are also external adversaries over cloud which may lack protection of instances from third parties. They discussed certain opportunities which are to the great challenges for researchers. The cloud computing security concerns were discussed in detail in [13] the main issues discussed were privacy concerns due to third party users. As the security due to hackers increase over internet and the cloud computing is totally on internet, there are different issues like attacks are discussed on it. In this it also discussed in detail about all the security issues over network, data leakage etc. as shown in below Fig:4.1, According to the IDC finding s, the users of cloud say that security is the main issue in cloud computing. Fig 4.1: Security as a main issue 152
3 B. Security Architectures The above discussion is on certain review literature by many research people on different aspects of security. The aspects went on describing the problems and threats in related to security in cloud. The literature in detail explains about the issues like security for data, virtualization security and prescribed format of SLA etc. There are many research people have keen interest in designing certain security architectures help for secure cloud computing. The following are described below: Gary Anthes [6] has described the various security research works in cloud are discussed. He brought forward the research works done in popular companies like IBM, HP, and Microsoft. There are many security risks involved in cloud computing, and also some good solutions are also been designed by the researchers which are pointed below. 1) Researchers at HP laboratories are prototyping cells as a service to automate security management in cloud. A cell is single administrative domain using security policies containing virtual machines, storage volumes across physical machines 2) IBM research people doing virtual machine introspection which puts security inside protected VM running on same machine. This employs number of protective methods listing the kernel functions. It can make reduce of running virus scanners on system. 3) Microsoft research described about cryptographic cloud storage where the data is secured by user by encrypting format such that the provider cannot get what the data is present. Flavio Lombardi and Roberto Di Pietro has discussed [1] about a secure virtualization technique for ensuring security at hypervisor level. In a general system at base OS level, there is a problem like a user at one guest OS may interact with other Guest OS, which may lead to data loss if they are any attackers. So the new proposal ACPS (Advanced Cloud Protection System) was introduced. This will maintain security by preventing unnecessary logins into the other guest OS by weak passwords or weak SSH. Cong Wang [5] has proposed their work on Data Storage security with respect to Quality of service. They have proposed approach which checks whether their data has been attacked or any integrity loss is done or not over the cloud. They will generate a homomorphism token which will ensure that the data is not lost. It is like a simple hash function which will be enabled to fast recover and storage errors. These works help in securing the cloud systems, Virtualization, Data confidentiality and data storage security, there are still issues need to be discussed in secure data transmission between cloud Provider, service provider and cloud User. The secure data transmission is anyhow achieved by protocols like IPSec, SSL over web and the data over are also through web applications these current methods can be used for secure data transmission. The secure data transmission works designed for storage networks are discussed by Kikuko Kamiasaka [8] who discussed in his paper for secure data transmission over IP Networks by developing Middleware works below application layer and selects suitable security approach based on the cluster of data items available in Application. This was proved that will help in securing the data as well as this works well than IPSec. Sudha M [3] has proposed an idea for secure data transmission in cloud computing using transport layer techniques, the idea proposed in that is used is socket programming for secure data transmission over the client and server. This paper has compared the general secure data transmission by applying socket programming, a key exchange and secure data over cloud. The comparison is done response time and processing time. IV. PROBLEM DOMAIN 1) The main problem is establishing trust in remote execution because a user program runs on a remote host in a data center, which a customer must make sure that his program is executed in its base system instance providing integrity and secrecy. 2) The cloud systems are shared resources, so there must be protection provided in the execution of a cloud instance from others. There must be isolation provided between two instances. 3) There are issues from hackers or attackers where they might get access to the base system by a communication channel and loss of data may happen. There might be chances of releasing a Trojan horse or virus to get the information leaked to his system. 4) The secure data transmission is anyhow achieved by protocols like IPSec, SSL over web and the data over are also through web applications these current methods can be used for secure data transmission but certain issues like Throughput and complexity in coding comes into issue. A. Service level agreements [SLA]: In service level transfer between a service user and provider a SLA is been issued. A SLA [service level agreement] is a document which defines the relationship between two parties: the provider and the recipient. This is clearly an extremely important item of documentation for both parties [4].If used properly it should: Identify and define the customer s needs Provide a framework for understanding Simplify complex issues Reduce areas of conflict Encourage dialog in the event of disputes Eliminate unrealistic expectations Specifically it should explain a wide range of issues. Amongst these are usually the following: 1) Services to be delivered performance, Tracking and reporting problem management legal compliance and resolution of disputes customer duties and responsibilities security IPR and confidential information termination. The SLA is the Legal agreement between provider and client. The provider can gain the trust on his client is only through SLA. 2) These SLA are been used to fulfill the issues of the service user based upon the rules present in it but they would not go for any legal action if the not met that present in agreement, they don t really help the customers fulfilling their losses. The SLA is fully not a good security consideration. 153
4 An Approach for Secure Data Transmission in Private Cloud Security at Transport layer is designed using port numbers where we get end-to-end security on an IP network. As the security is at transport layer, the data is secured at port level but Security at Network layer will use approaches like IPSec protocol, here the IP Packets will be secured before transmission. The different techniques in IPSec Protocol take different time structures based on the steps that should perform. Here we have two problems with this method. First, to encrypt an IP packet we need to change the code of the IP protocol. Second are again the problems of delay and throughput. Here each packet to be encrypted with any one of the different types of implementations of IPSec protocol. When large data is transferred the packets take a long time to get encrypted and loss in throughput. Security Algorithm based on the privacy level of the document, if he needs more security there must be a strong security algorithm to be selected. The security server will secure the document and save it in database. Here all the systems which belong to that network are connected to the same architecture. When any other user wishes to select any document from the data center, he is required to be connected to the same security server to get the original document. This helps in security and privacy of the documents. B. Process at sender: VI. PROPOSED FRAMEWORK A. Security framework for Private cloud: Fig: 6.1 High Level design The Fig 6.1 is the design architecture where a new security layer is designed for private cloud. The new security framework is present in between session layer and transport layer such that it is transparent to application layer and the lower layers. So whenever a data is transferred by the client it is first secured by certain authentication protocols and saved at the server end. With this, the data will be stored in a secured way at server end. Those who want to download the data or view it should be connected or have access through same framework to view the data. This is done in application user level so that the data will be secured and transferred where there is need to disturb any lower layers of the network. VII. DESIGN OF THE SYSTEM A. Security Framework Model Fig 7.2: process at the sender The data at the initiator end (client) will all set his data. He encrypts the data by selecting the appropriate approach from the interface and sends it to the server end. As shown in the above figure, at the client end the data is read, ready to send data. At socket layer, before sending it to the remote end the data will be encrypted for each byte and send encrypted data. The data is carried by the protocol to process the other commands which happens in a network. The data will be secured at the sender end by the security framework which helps in secure data transfer. C. Process at receiver end: The detailed design of the framework is in the below Architecture Fig 7.1. The nodes which are connected to server will be connected to the security layer. When an Application user wants to send data to private cloud, he needs to select a Fig 7.3: process at the receiver Fig 7.1: System Architecture 154
5 At the receiver end when the data is received, the data will be decrypted and written on the disk. The data will be decrypted by the security approach used at encryption end. This is again worked above transport layer just where the packets arrive at end application. As before the write request is given by the protocols, the security framework decrypts the data and saves on to the disk. In the similar way when the client requests a file from server the same process as mentioned will be happened. This will make sure that data is secure over the network. We can have confidentiality and integrity checks at the receiver end. SIGCOMM Computer Communication Review, vol. 39, Number 1, January 2009, pp [10] Patrick McDaniel, Sean W. Smith, Outlook: Cloudy with a chance of security challenges and improvements, IEEE Computer and reliability societies (2010), pp [11] Sameera Abdulrahman Almulla, Chan Yeob Yeun, Cloud Computing Security Management, Engineering systems management and its applications (2010), pp [12] Steve Mansfield-Devine, Danger in Clouds, Network Security (2008), 12, pp [13] Anthony T. Velte, Toby J.Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach, Tata Mc GrawHill VIII. CONCLUSIONS AND FUTURE WORK In our proposed method, transferred data is encrypted in the upper-layer on top of the transport layer instead of using IPSec or SSL. Thus, the scheme for the performance improvement can be applied without modifying the implementation of IP layer, and efficient secure communications by pre-processing of encryption in the upper-layer are realized. We have used file uploading as service as web application, the security is applied over to the data at the background using the encryption algorithms like AES, Triple DES and DES. Adding secure cloud storage using the proposed cryptographic solution and with a searchable encryption technique for the files to be accessed, it will work as a better approach to the user to ensure security of data. The cloud security using cryptography is already in use for secure data storage which can be enhanced for secure data transmission and storage. In the security application we should apply some pseudo random key generation approaches based on the user prescribed key which should help the user to keep data safe and no other attackers can get the secure data easily. REFERENCES [1] Lombardi F, Di Pietro R. Secure virtualization for cloud computing. Journal of Network Computer Applications (2010), doi: /j.jnca [2] Subashini S, Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications (2011) vol. 34 Issue 1, January 2011 pp [3] Sudha.M, Bandaru Rama Krishna rao, M.Monica, A Comprehensive approach to ensure secure data communication in cloud environment International Jornal Of computer Applications, vol. 12. Issue 8, pp [4] Balachander R.K, Ramakrishna P, A. Rakshit, Cloud Security Issues, IEEE International Conference on Services Computing (2010), pp [5] Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing proceeding of International workshop on Quality of service 2009, pp.1-9. [6] Gary Anthes, Security in the cloud, In ACM Communications (2010), vol.53, Issue11, pp [7] Kresimir Popovic, Željko Hocenski, Cloud computing security issues and challenges, MIPRO 2010, pp [8] Kikuko Kamiasaka, Saneyasu Yamaguchi, Masato Oguchi, Implementation and Evaluation of secure and optimized IP-SAN Mechanism, Proceedings of the IEEE International Conference on Telecommunications, May 2007, pp [9] Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres1, Maik Lindner, A Break in Clouds: Towards a cloud Definition, ACM Anurag Porwal is an Asst. Professor in Chittorgarh (Rajasthan). He has completed his B.Tech.(I.T.) form Rajasthan University and M.Tech.(CSE) from Mewar University Chittorgrah (Raj.). His areas of interest are Ad-hoc Networks, Network Security and Cloud Computing. Rohit Maheshwari is an Asst. Professor in Chittorgarh (Rajasthan). He has completed his B.E. (Hons.) in I.T. form Rajasthan University (2005) and M.Tech. (CSE) from Rajasthan Technical University, Kota. His research interests are in the field of Network Security, Cloud Computing and Algorithms. B.L.Pal is an Asst. Professor in Department of Computer Science and Information Technology at Mewar University, Chittorgarh (Rajasthan).He has completed his B.Tech. (IT) from AAI_DU Allahabad U.P. ( ) and M.Tech. (SIT) from DAVV Indore. M.P. ( ). His research interests are in the field of GIS, Spatial Database Management System and N/W Securities. Gaurav Khakani is an Asst. Professor in Chittorgarh (Rajasthan). He has completed his B.Tech. (I.T.) form Rajasthan University and M.Tech. (CSE) from Mewar University, Chittorgrah. His areas of interest are Ad-hoc Networks and Computer Networks. 155
A Proposed Secure Framework for Safe Data Transmission in Private Cloud
A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred
Security in Data Storage and Transmission in Cloud Computing
Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech
CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION 1 Mrs. C.Theebendra, 2 N.Santhini 1 Assistant Professor in
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services
International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
VIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Scientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
A Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS
CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS Musa Ahmed Zayyad Department of Computer Studies, Hassan Usman Katsina Polytechnic, Katsina E-mail: [email protected] +2348063440008(Nigeria)
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Review of Cloud Computing and future research
Review of Cloud Computing and future research Computer Science, IIS University, India Abstract: Cloud computing is also referred to as the evolutionary offspring of distributed computing, parallel computing,
Migration Improved Scheduling Approach In Cloud Environment
Migration Improved Scheduling Approach In Cloud Environment Ashu Rani [1], Jitender Singh [2] [1] Scholar in RPS College of Engineering & Technology, Balana, Mohindergarh [2] Asst. Prof. in RPS College
Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture
Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
The Analysis of Cloud Computing Major Security Concerns & Their Solutions
Journal of Information & Communication Technology Vol. 6, No. 2, (Fall 2012) 48-53 The Analysis of Cloud Computing Major Security Concerns & Their Solutions Farhat Sharif * Institute of Business and Technology
A Survey on Security Issues in Service Delivery Models of Cloud Computing
A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
