Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
1. Done By
Archana G.R USN: 1ME13CS009
Asha U Shetty USN: 1ME13CS010
Deepika .A USN:1ME13CS019
Soujanya.K USN: 1ME13CS045
Under The Guideance Of
Mrs. NISHA CHOUDHARY
Asst. Professor, MSEC, Bangalore
2. Contents
Abstract
Introduction
Problem statement
Existing work
Limitations of existing work
System requirements
- Hardware requirements
- Software requirements
System architecture
Implementation
Applications
References
3. Abstract
Cloud computing is the latest technology in the field of
distributed computing. It provides various online and on-
demand services for data storage, network services,
platform services and etc.
4. Many organizations are unenthusiastic to use cloud services
due to data security issues as the data resides on the cloud
services provider’s servers. To address this issue, there have
been several approaches applied by various researchers
worldwide to strengthen security of the stored data on cloud
computing.
The Bi-directional DNA Encryption Algorithm (BDEA) is
one such data security techniques. However, the existing
technique focuses only on the ASCII character set,
ignoring the non-English user of the cloud computing.
Thus, this proposed work focuses on enhancing the BDEA
to use with the Unicode characters
5. KEY WORDS
Cloud computing
Bi directional DNA encryption algorithm
Scoket programing
Data security issues
7. Introduction
Distributed computing has as of late achieved prevalence and
formed into a noteworthy pattern in IT.
We perform such a orderly audit of distributed computing and
clarify the specialized difficulties confronting in this paper. In
Public cloud the "Pay per utilize" model is utilized. In private
cloud, the figuring administration is disseminated for a solitary
society.
8. In Hybrid cloud, the registering administrations is devoured
both the private cloud administration and open cloud service.
vCloud registering has three sorts of administrations.
Programming as a Service (SaaS), in which client set one up
administration and keep running on a solitary cloud, then
different buyer can get to this administration according to on
request.
Stage as a Service (PaaS), in which, it gives the
stage to make application and keeps up the
application. Framework as a Service (IaaS),
according to term recommend to gives the
information stockpiling, Network limit, lease
stockpiling, Server farms and so on. It is otherwise
called Hardware as a Service (HaaS)
9.
10. Problem Statement
As there is no proper organization of the data in the cloud
we need to segregate the data in the form of
methodological way .
According to the cloud infrastructure data has to be
accessed with in processing time so cloud and data centers
has to be in sync modes.
Coming to data transmission encryption should happen in
such a way that central repository should come to know
each side of client service models.
12. Existing work
Many organizations are unenthusiastic to use cloud
services due to data security issues as the data resides on
the cloud services provider’s servers.
To address this issue, there have been several approaches
applied by various researchers worldwide to strengthen
security of the stored data on cloud computing.
13. Limitations of existing work
The existing technique focuses only on the ASCII
character set ignoring the non-English user of the cloud
computing.
The most serious limitation is the lack of the
authentication.
14. System requirements
Hardware Requirements:
RAM :- 4 GB (min)
Hard Disk :- 20 GB
Software Requirements:
Operating system :- Windows XP or more.
Coding Language :- core java
Data Base :- Oracle 10g
15. Proposed system
Previous section describes the study about the cloud
computing, basics of cloud computing and security
problems occurs in cloud. Then study some papers to
solve these security problems.
Here in this paper, the Bi-serial DNA encryption
algorithm is performing, that providing the two level of
security.
16. Requirement analysis
Service oriented architecture to frame the cloud.
Jax web services with SOAP( simple object access
protocol).
XML bundle of the parsers at both sides.
Data decryption and encryptions at both client and service
sides.
Central repository to keep track on keys and data
decryption on key and data.
18. Design methodology
ROTA enhancement algorithm with this work
Rota: This is a set of identical binary to strings(text) encoded models that
indicates binary data with ASCII text format by converting/translating to
RADIX-64 notations.
Normally Rota models are widely used when ever there is a need of binary
data encoding that needed to be encoded and transferred over the networks
which are framed to deal with string based data. This step is to ensure that
data has to remain without alteration during broadcast. Rota is ordinarily
utilized as a part of a Rota encoding takes the first double information and
works on it by partitioning it into tokens of three bytes. A byte comprises of
eight bits, so Base64 takes 24bits altogether. These 3 bytes are then changed
over into four printable characters from the ASCII standard.
The calculation's name Rota originates from the utilization of these 64
ASCII characters. The ASCII characters utilized for Base64 are the numbers
0-9, the letter sets 26 lowercase and 26 capitalized characters in addition to
two additional characters "+" and '/'.
19. Design methodology
ROTA enhancement algorithm with this work
The initial step is to take the three bytes (24bit) of parallel information and
split it into four quantities of six bits. Since the ASCII standard
characterizes the utilization of seven bits,Rota just uses 6 bits (comparing to
2^6 = 64 characters) to guarantee the encoded information is printable and
none of the uncommon characters accessible in ASCII are utilized. The
ASCII change of 3-byte, 24-bit gatherings is rehashed until the entire
succession of unique information bytes is encoded. To guarantee the
encoded information can be appropriately printed and does not surpass the
farthest point.
At the point when the quantity of bytes to encode is not distinct by 3 (that is,
if there are just a single or two bytes of contribution for the last 24-bit
square), then the accompanying activity is performed: Add additional bytes
with esteem zero so there are three bytes, and play out the change to base64.
On the off chance that there was just a single huge information byte, just the
initial two base64 digits are picked (12 bits), and if there were two critical
info bytes, the initial three base64 digits are picked (18 bits). "=" characters
may be added to make the last piece contain four base64 characters.
22. • KEY COMBINATION
Here in this work, we are using ATGC as a key. Every bit
have 2 bits like A=00, T=01, G=10, and C=11 and by using
ATGC, key combinations is generated and give numbering
respectively that is given into table. From the table 2, we can
generate 64 bit key values and adding ATGC, we can
generate
72-bit key (64 bits of key combination and 8 bits of ATGC).
ATGC key is sending to the receiver side by using Diffie
Hellman key sharing algorithm. In this work, every time the
key value will be randomly changed.
24. DNA DIGITAL CODING
In information science, the binary digital coding encoded by
two state 0 or 1 and a combination of 0 and 1. But DNA
digital coding can be encoded by four kind of base as shown
in table 1. That is ADENINE (A) and THYMINE (T) or
CYTOSINE (C) and GUANINE (G). There are possibly 4!
=24 pattern by encoding format like (0123/ATGC) [4].
Binary value DNA digital coding
00 A
01 T
10 G
11 C
26. Encryption process
To understand the scenario of proposed work flow chart we
consider one example. In this the example plaintext is
આિશષ and performing encryption operation.
Plaintext:
આિશષ
Unicode:
આશિષ
ASCII:
u0e0u0aau02020u0e0u0aau0b6u0e0u0aau0bfu0e0
u0aau0b7
33. Applications
It is use to secure the files in cloud in a high security by
using these codes.
Files cannot by destroyed or erased .
Data will be saved automatically permanently .
34. References
[1] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-
Hellman Key Exchange and AES Encryption Algorithm to Enhance
Data Security in Cloud Computing” 2013 International Conference on
Communication System and Network Technologies (IEEE Computer
Society).
[2] Uma Somani, Kanika Lakhani, ManishaMundra, ”Implementing
Digital Signature with RSA Encryption Algorithm to Enhance the Data
Security of Cloud in Cloud Computing”-2010 IEEE 1st International
Conference on Parallel, Distributed and Grid Computing (PDGC-
2010).
[3] Mehdi Hojabri& Mona Heidari“Union of RSA algorithm, Digital
Signature and KERBEROS in Cloud Computing” International
Conference on Software Technology and Computer Engineering
(STACE-2012).
[4] Ashish Prajapati, Amit Rathod “Enhancing security in cloud computing
using Bi-Directional DNA Encryption Algorithm”, International
Conference on Intelligent Computing, Communication & Devices.
(ICCD-2014), Springer.
35. Literature survey
Use of Digital Signature with Diffie- Hellman Key Exchange and AES
Encryption Algorithm to Enhance Data Security in Cloud Computing
Abstract-
Cloud computing is the relevant technology for this decade. It allows users
to store huge amount of data in cloud storage and use as and when required,
from anywhere in the world, through any kind of terminal equipment. Since
cloud computing relies on internet, cloud data will be forced to contend with
security issues like privacy, data security, confidentiality, and authentication.
In order to get rid of the same, a variety of encryption algorithms and
mechanisms are used. This paper, introduces use of hybrid cryptographic
algorithm blended with digital signature and Diffie Hellman key exchange..
The hybrid algorithm is designed using the combination of Advanced
Encryption Standard (AES) and Data Encryption Standard (DES)
encryption algorithm to protect confidentiality of data stored in cloud.
36. Even if the key in transmission is hacked, the facility of Diffie
Hellman key exchange render it useless, since key in transit is
of no use without user’s private key, which is confined only to
the legitimate user. This proposed architecture of hybrid
algorithm makes it tough for hackers to crack the security and
integrity of the system, thereby protecting data stored in cloud.
37. Improve Cloud Computing Security Using RSA
Encryption With Fermat’s Little Theorem
Abstract: -
Cloud computing (CC) is new technology for hosting and delivering
services over the Internet. It moves computing and data away from desktop
and portable PCs into large data centers.CC is a Internet based computing,
the entire data reside over a set of networked resources, this data can be
accessed through virtual machines like i phone, PC etc.CC help to reduce
hardware, maintenance and installation cost. But security and privacy is the
two major issues in this field and it prevent users for trusting CC. Cloud
computing share distributed resources in the open environment via the
network, so it makes security problems .To keep user data highly
confidentially against un-trusted servers and from malicious attacks is very
important. Encryption is the one of the most secured way using prevent
unauthorized access. Hence we provide a new method for Cloud Computing
Security by applying RSA algorithm and Fermat’s theorem together. Its help
to build a new trusted cloud computing environment. By using Fermat’s
theorem can be speed up the RSA Encryption.
38. Enhancing security in cloud computing using Bi-
Directional DNA Encryption Algorithm
Abstract-
Cloud computing is everywhere. Pick up any magazine or visit
almost any IT website or blog and you will be sure talk about
cloud computing. There are many security issues in cloud
computing like Confidentiality, Integrity and Availability
(CIA). There are many techniques for provide security in cloud
computing. Cloud computing performs large-scale and
Complex computing. Cloud computing provide flexible
solution for using users data everywhere. Here in this paper we
discuss about the types of securities and related security issues
in cloud environment and also her we discuss about the
security techniques to provide better solutions for enhancing
security in cloud computing.