IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Vibgyor a sustainability assessment tool for residential buildingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Vibgyor a sustainability assessment tool for residential buildingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Aiding visually challenged individual for object detection and navigation usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Investigation and computational analysis of divergent orifice in fuel injecto...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Power quality improvement of grid interconnected distribution system using fs...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Similar to A survey on data security in cloud computing issues and mitigation techniques (20)
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
A survey on data security in cloud computing issues and mitigation techniques
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 26
A SURVEY ON DATA SECURITY IN CLOUD COMPUTING: ISSUES AND
MITIGATION TECHNIQUES
Satarupa Biswas1
, Abhishek Majumder2
1
Department of Computer Science and Engineering, Tripura University
2
Department of Computer Science and Engineering, Tripura University
Abstract
Cloud is considered as the future of information technology. Cloud computing refers to internet based computing where virtual
servers provide software, hardware, infrastructure, devices and platform. Users can make them utilized on a pay-as-you-use basis.
Many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored
data. Therefore, issues related to the security of data in the cloud have become very vital. In this paper, different data security issues
have been discussed. Moreover, some already existing schemes for countering the problem of data security have also been discussed.
Finally, a comparative study has been carried out among the schemes with respect to data security issues.
Keywords- Cloud computing, Data security, Servers, Database, Multi-Clouds Database Model (MCDB)
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Now-a-days, Cloud Computing is the most popular up-coming
concept in Information Technology (IT). The name Cloud
Computing gets derived from the cloud like structure that was
used to represent internet. It is the style of computing where
massively scaled IT related capabilities are provided as a service
across the internet to multiple external customers and are billed
by consumption. It is a recent technology, where users need not
to have their own hardware, software, storage space etc.
Everything will be provided by the cloud itself. Google,
Microsoft, Yahoo, IBM and Amazon have started providing
cloud computing services. Amazon is the pioneer in this field.
Cloud Computing provides the facility to access shared
resources and common infrastructure offering services on
demand over the network to perform operations. But the
location from where the users accessing the requisite data are
not known. With Cloud Computing, users can access their
databases from anywhere in the world only when they remain
connected to the internet.
Today’s world relies on cloud computing to store their public as
well as personal data. That data may be required by them or
others at any instant of time. As a result, data security in cloud
computing has drawn lots of attention from the research
community.
The rest of the paper is organized as follows. Section 2 gives an
overview on delivery and deployment models of cloud
computing. Section 3 discusses the issues related to data
security in cloud computing. Some of the techniques for
mitigating the problem of data security in cloud computing have
been described in section 4. In section 5, a comparative study of
data security mitigation algorithms that are discussed in section
4, have been carried out considering the data security issues.
Finally, section 6 presents the conclusion.
2. OVERVIEW
Cloud Computing is an idiom that involves hosted services over
the internet. Cloud Computing provides the facility to access
shared resources and common infrastructure, offering services
on demand over the network to carry out operations that meets
changing business needs. Cloud Computing allows consumers
and businesses to use applications without installation and can
access their personal files at any computer with internet access.
The location of physical resources and devices being accessed
are usually not known to the end user. It also provides facilities
for users to develop, deploy and manage their applications in the
cloud, which requires virtualization of resources that maintains
it. There are a small number of differences between traditional
hosting and cloud computing. Cloud Computing is sold on
demand. All the services in the cloud are managed by the
provider. Users can determine the amount of services they take
and can log on to the network from any computer in the world.
2.1 Delivery Models
The architecture of Cloud computing can be categorized
according to the three types of delivery models [13][15]:
Infrastructure as a Service (IAAS): Consumers are
allocated computing resources in order to run virtual
machines that consist of operating systems and
applications that are provided as an on-demand service.
The best example of IAAS is Amazon.com’s Elastic
Compute Cloud (EC2) service. The requirements of
security beyond the basic infrastructure are carried out
mainly by the cloud consumer.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 27
Platform as a service (PAAS): Cloud consumers are
allowed to write applications that run on the service
provider’s environment. It is a model of service
delivery where the computing platform is provided as
an on-demand service upon which applications can be
developed and deployed. Google Apps engine is an
example of PAAS. The requirements of security are
split between the cloud provider and the cloud
consumer.
Software as a service (SAAS): Cloud consumers are
provided with various software applications that run
over the internet. Google Docs programs are an
example of SAAS. The requirements of security are
carried out mainly by the cloud provider.
2.2 Deployment Models
Deployment models broadly characterize the management and
disposition of computational resources for delivery of services
to consumers, as well as the differentiation between classes of
consumers. Different deployment models are [11] [15] [16][19]:
Public Cloud: A public cloud is one in which the
infrastructure and computational resources that it
comprises are made available to the general public over
the Internet. It is owned and operated by a cloud
provider delivering cloud services to consumers and,
by definition, is external to the consumers’
organizations.
Private Cloud: A private cloud is one in which the
computing environment is operated exclusively for a
specific organization. It may be managed by the
organization or by a third party, and may be hosted
within the organization’s data center or outside of it.
Community Cloud: A community cloud falls between
public and private clouds. It is somewhat similar to a
private cloud, but the infrastructure and computational
resources are exclusive to two or more organizations
that have common privacy, security, and regulatory
considerations, rather than a single organization.
Hybrid Cloud: Hybrid cloud is the most complex
model among all the deployment models. They involve
a composition of two or more clouds (private,
community, or public). Each cloud remains a unique
entity, but is bound to the others through consistent or
proprietary technology that enables application and
data portability among them.
3. DATA SECURITY
Data seeking is done immensely by many cloud consumers,
which can give rise to serious security concerns in cloud
environment. In this section, different issues related to data
security in cloud computing have been described.
There is a critical need to securely store, manage, share and
scrutinize enormous amounts of data. It is very important that
the cloud should be secured enough to maintain the security of
data. Exact physical localization of user data in virtual cloud
atmosphere is among some of the prime challenges in cloud
computing. The major security challenge with clouds is that the
owner of the data may not have complete knowledge of where
their data are stored. Data security involves encrypting the data
as well as ensuring that suitable policies are imposed for sharing
those data. There are numerous security issues for cloud
computing. Some of the major data security issues are [13]:
Data Integrity: It is very essential to maintain the
integrity of data. The stored data in the cloud storage
may suffer from enormous damage occurring during
the transition operations from or to the cloud storage
provider. The risk of attacks from both inside and
outside the cloud provider exists and should be
considered.
Data Intrusion: Data Intrusion is another security risk
that may occur with a cloud provider. If any intruder
can gain access to the account password, then he/she
will be able to do any kind of unwanted changes to the
account’s private documents. Undesirable alteration of
user data may commence due to intrusion.
Service availability: Service availability is another
major concern in cloud services. It is mentioned in
some cloud providers licensing agreement, that the
service may be unavailable anytime due to some
unforeseen reason. If all the valuable business
documents are stored on the cloud and the cloud
suddenly goes down, will it be coming back up with all
of our important documents intact? It is also important
to know whether the company with whom user is
storing his vital information is financially steady and
will not suddenly vanish taking all of the valuable
information with it.
Confidentiality: Confidentiality of data is another
security issue associated with cloud computing. The
data should be kept secured and should not be exposed
to anyone at any cost. The users do not want their
confidential data to be disclosed to any service
provider. But it is not always possible to encrypt the
data before storing it in cloud.
Non- Repudiation: Non-repudiation is a major concern
for data security. It guarantees the transmission of
message between parties and gives the assurance that
someone cannot deny something. Non-repudiation is
often used for signatures, digital contracts, and email
messages. It ensures that a party cannot deny the
genuineness of their signature on a document or the
sending of a message that they originated.
4. MITIGATION ALGORITHMS
In this section some of the data security algorithms have been
discussed. Users are benefited by the cloud service providers,
which may give rise to new security risks. Users storing their
data in cloud are not aware of the physical location of their data.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 28
Attacks on the data storage can directly affect the security of the
user’s valuable data including application data or sensitive data.
Many cloud service providers provide storage as a service. They
take the data from the users and store them on large data
centers. The data stored in the cloud may get lost or modified
due to some security breaches that may be caused by many
factors. Several algorithms for ensuring data security have been
proposed.
Pradeep Kumar et al. [1] proposed a scheme for security in
cloud computing using Hidden Markov model (HMM) [17] and
Clustering. This scheme performs intrusion detection based on
the probability of the behavior. Clustering is used for providing
only those data that are required by the user. Cluster provides a
compact view of data in cloud environment. It is used for fraud
detection and is utilized to reduce the data seeking time [18]. In
[1], HMM model monitors the user behavior continuously and
informs the administrator with the help of filter network.
Firewall gateway is used here to block the SSH service, which is
used for gaining access to the server from anywhere in the
world. It simply drops the packets that come from any IP
address which is not inside its knowledge. It is the
responsibility of the system administrator to keep the data safe.
The system administrator immediately takes the action if any
malicious activity related to data mining is detected by the filter
network after getting input from the HMM. In this scheme, the
cloud computing environment has a plug-in attached with it. It
can help the proposed model to backup as well as recover data
in case of emergency. It can be easily connected with any other
cloud environment if needed. As a result, the load on the servers
of a cloud could be minimized. So, an intruder can be easily
caught even if he has the stolen ID and/or password. This
environment has classified the data into two categories. One
category includes normal data seeking from the database. On the
other hand, Second category involves seeking sensitive data that
must be kept protected from unauthenticated access.
Palivela Hemant et al. [2] have introduced a new prototype
system where a central server will save all the information in its
router table that can be useful for back tracking the server or
user. The router table contains cloud id, user id, the actual server
id to which the user is connecting, server name, total time of
synchronization, packet size, lease time, source ip and
destination ip. It also contains the packets per second transfer
rate which is the actual amount of data flow. There will be
application level firewalls which will not only check the
undesirable web sites based on their ip addresses but they will
also keep track if the packets are malicious. They can record the
activities of the user. The user side contains personal firewall
and the connectivity between user and the central server will be
encrypted using SSL encryption standards. When any user
wants to connect to a particular server then his/her information
gets stored in the table. In case, the user is unable to connect to
the server, the server can be easily backtracked from the central
server’s routing table. Many of the security requirements are
fulfilled in this model due to double encryption.
Shuai Han et al. [5] proposed a third party auditor scheme in
cloud computing for ensuring data storage security. Third party
auditor (TPA) provides trustful authentication for the user who
stores their data in the cloud. TPA is powerful than the cloud
consumers and makes every data access be in control. Users
cannot completely rely whether their data is safe on the cloud
providers. TPA can review and interpret the data stored in the
cloud on behalf of the users upon request. It can provide a log
report to the users. The authors have proposed a new
architecture for cloud storage, where the third party auditor and
the cloud service provider have been combined together. The
traditional network architecture [7] consists of three entities
which are users, Cloud service provider and TPA. Users have
large data files to be stored in the cloud. They are active
participants and can be individual consumers or organizations.
Cloud service provider has sufficient storage space as well as
computation resources for maintaining the data stored by the
users. In this scheme RSA has been used to encrypt the data
flow between servers in the advance cloud service provider. It
uses Bilinear Diffie-Hellman algorithm for exchanging keys.
Users and cloud service provider can communicate with each
other using a message header without a third party auditor. Each
of the cloud storage servers can add, identify and update the
message header for users whose copy will be sent to the trustful
organization server for the first time. A pair of keys is allocated
to each user for accessing the cloud. In this scheme, users add a
message header before sending it to the cloud. The data packets
are encrypted with the allocated keys using RSA algorithm.
Trustful organization servers which are maintained by trustful
organization’s that perform as a watchdog for every access keys
in cloud service provider, comprises of few number of servers.
The users and cloud service provider cannot get any
authentication information from trustful organization without a
certain module. The Trustful organization server is responsible
for maintaining all the keys which are stored in cloud storage
servers.
According to Mohammed A. Alzain et al. [4], shifting from
single cloud to multi-cloud is very important for ensuring the
security of user’s data. Authors suggested that, there are three
main security factors of data (data integrity, data intrusion and
service availability) that needs to be considered as the major
concern for cloud computing. They have proposed a new model
called Multi-clouds Database Model (MCDB). A technique
named Shamir’s secret sharing algorithm [3], which is based on
polynomial interpolation has been incorporated in the scheme.
According to the algorithm [3], if a data D is shared into n
pieces, in such a way that D is easily reconstruct able from k
pieces, but even complete knowledge of k-1 pieces reveals
absolutely no information about D. The authors have suggested
that Cloud Computing should not end with a single cloud. In
their work, they have compared Amazon cloud service which is
single cloud with their proposed multi-clouds model. This
model guarantees the security and privacy of data in multi-
clouds using multi shares technique instead of single cloud. The
data is replicated among several clouds by using secret sharing
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 29
approach. The operations between the clients and the cloud
service providers are controlled by Database Management
System (DBMS). Data is being stored by cloud service
providers after being divided by MCDB. Division of the data
depends upon the number of cloud service providers.
Mohammed A. Alzain et al. [9] proposed a Multi-clouds
Database Model (MCDB) which uses multi-clouds instead of
single cloud service provider such as in Amazon cloud service.
In addition, it employs Shamir’s secret sharing approach to
ensure security of the stored data in the cloud. Furthermore, it
adopts a triple modular redundancy (TMR) technique which is a
type of passive hardware redundancy. In TMR technique, three
identical modules execute the same task in parallel. If one of the
three models was faulty, the other two models will mask and
hide the result of the faulty module. This technique is used with
sequential method to improve the reliability of the system and
multi shares technique to improve the security of the system.
The sequential voting method decreases the number of
execution cycles. When the data is divided by the cloud
manager, then it will be sent and stored directly into the clouds.
There is no need for storing a copy of the user data in the cloud
manager. It is the function of cloud manager component to
generate and compute the polynomial functions. Thereafter on
the basis of majority voting of the output results that has come
from clouds the faulty cloud inside the super cloud provider is
detected. All the shares from different clouds will go through
voter inside the cloud manager. The result of the voting does not
get affected by the execution of the third cloud’s result, if two
results out of the three clouds were same.
5. COMPARISON
This section presents a comparison among the data security
algorithms, discussed in the previous section, with respect to the
issues discussed in section III.
Table 1: Various Schemes and their support of features
Addressed Security
Risks
[2] [9] [4] [1] [5]
Data Integrity √ √ √ √ X
Data Intrusion X √ √ √ √
Service Availability √ √ √ √ X
Data Confidentiality √ √ √ √ √
Non-Repudiation √ X X √ √
Table 1 is depicting the various security risks that have been
resolved ([2],[9],[4],[1],[5]) by tick sign in the corresponding
field of the table. In [2], hashing is done in SSL technology
which helps to maintain the Integrity of data. In this scheme,
confidentiality is achieved by using dual SSL technology.
Another security risk called data intrusion that may occur with a
cloud service provider (CSP) is kept unsolved in this scheme.
Authentication through conventional SSL can be weak and
subject to man-in-the-middle attacks. In this scheme, service
availability issue is solved using the central server that acts as a
backup server. So, if the server goes down, the failure can be
avoided. Non-repudiation is satisfied using the central server,
which stores all the necessary information about a user in its
routing table.
In [4] and [9], few major security issues such as, data integrity,
data confidentiality, service availability and data intrusion have
been solved. In [9], TMR technique helps to maintain integrity
by detecting the availability of cloud and it can determine the
faulty cloud. Data integrity is maintained in [4], because [3]
ensures that, if a data D is divided into n pieces. Data D can
only be reconstructed when a sufficient number of shares are
combined together. That is individual shares are of no use on
their own. In [4] and [9], data confidentiality is maintained by
storing the data in multiple cloud service providers and clouds
respectively by using Shamir’s secret sharing approach [3]. In
[9], TMR techniques are used to resolve the Data Intrusion
issues. In this scheme, it is very easy to detect the faulty cloud
and can explore where the intrusion has taken place. Intrusion
can be prevented in [4], because if the hacker hacked the
password from one cloud service provider, they still have to
hack the third cloud service provider for its password. It is very
hard for a hacker to retrieve the password from all the cloud
service providers. Service availability is guaranteed in [4] and
[9], as the data is distributed in different cloud service providers
and clouds respectively. As a result, the risk of data loss gets
minimized. The problem of non- repudiation have not been
taken care of in the schemes [4] [9].
In [5], data intrusion problem have been solved, as, only the
authenticated users can have access to the information. The
users are given permission using the authentication modules
which are given by the trustful organizations. Any intruder
cannot have access to the valuable data without proper
permission. Confidentiality is achieved as the data file is
encrypted with user secret key. After encryption, the data file is
sent for storing in the cloud service provider. Service
availability and data integrity problems are not considered in
this scheme. If the CSP goes down, then the data cannot be
recovered. The risk of attacks exists in the Cloud storage
provider. The data stored in the cloud may suffer from any
damage occurring during transition from or to the cloud storage
provider. But, no such measures have been taken in this scheme
to ensure the integrity of data. Non-repudiation is not possible
here, because when a user sends a request, then the user’s
information is added in cloud storage server’s user list.
In [1], data integrity is maintained by using HMM model which
monitors the user behavior continuously and informs the system
administrator. As a result, the data is safe in cloud environment.
HMM model can be used to detect intrusion based on the
probability of behavior [17]. Firewall gateway is also used in
this scheme [1] to prevent data intrusion. Firewall gateway can
block any anonymous port with a live IP address which is not
inside its knowledge. As a result, intrusion is not possible in this
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 30
scheme. Data can be kept confidential using this scheme, as
every traffic update is sent to the administrator via email
notification. Service availability can be solved with the help of
plug-in, which helps the environment to connect with another
network. Non- repudiation is not possible as the firewall
gateway contains the list of authenticated IP addresses.
6. CONCLUSIONS
Data security is a very critical issue in cloud computing. In
cloud data storage system, users store their data in the cloud
cannot possess the data locally. Users are not aware of the
physical location of their data. It is not clear how safe their data
is and ownership of data is also unclear when these services are
used. Cloud computing companies say that the data stored are
completely safe. But, it is too early to comment on the reliability
issues claimed by them. The stored data may suffer from
damage that occurs during data transition operations from or to
the cloud provider. Data are not always safe when they are
stored inside cloud providers. For addressing these issues
several algorithms have already been proposed and there is a
huge scope for work in the area of data security in cloud
computing.
REFERENCES
[1] Pradeep Kumar, Nitin, Vivek Sehgal, Kinjal Shah, Shiv
Shankar Prasad Shukla and Durg Singh Chauhan, “A
Novel approach for Security in cloud computing using
Hidden Markov model and Clustering”, Proc. of
Information & Communication Technologies (WICT),
pp. 810-815, 2011.
[2] Palivela Hemant, Nitin.P.Chawande, Avinash Sonule,
Hemant Wani. “Development of servers in cloud
computing to solve issues related to Security and
Backup”, Proc. of IEEE international Conference on
Cloud Computing & Intelligence Systems (CCIS), pp.
158-163, 2011.
[3] A. Shamir, “How to share a secret”, Communications of
the ACM, Vol. 22, Issue 11, pp. 612-613, 1979.
[4] Mohammed A. Alzain, Ben Soh and Eric Pardede,
“MCDB: Using Multi Clouds to ensure Security in
Cloud Computing”, Proc. of the 2011 IEEE 9th
International Conference on Dependable, Autonomic &
Secure Computing (DASC), pp. 784-791, 2011.
[5] Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu,
“Cloud Computing and Grid computing 360-Degree
Compared”, Grid Computing Environments Workshop,
2008, GCE’08 , pp. 1-10,2008.
[6] Shuai Han , Jianchuan Xing, “Ensuring data storage
security through a novel third party auditor scheme in
cloud computing”, IEEE international Conference on
Cloud Computing & Intelligence Systems(CCIS), pp.
264-268, 2011.
[7] Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou,
“Enabling Public Verifiability and Data Dynamics for
Storage Security in Cloud Computing”, Proceedings of
the 14th European conference on Research in computer
security, pp. 355-370,2009.
[8] Abhishek Mohta and Lalit Kumar Awasthi. “Cloud Data
Security using Third Party Auditor”, International
Journal of Scientific & Engineering Research (IJSER),
Vol. 3, Issue 6, 2012.
[9] Mohammed A. Alzain, Ben Soh and Eric Pardede. “A
new approach using redundancy technique to improve
security in cloud computing”. Cyber Security, Proc. of
International Conference on Cyber Security, Cyber
Warfare & Digital Forensic( Cybersec), pp. 230-235,
2012.
[10] P. Mell and T. Grance. “The NIST definition of cloud
computing”. National Institute of Standards and
Technology 2009.
[11] Zaigham Mahmood,”Data Location and Security Issues
in Cloud Computing”, Proc. of International Conference
on Emerging Intelligent Data and Web Technologies
(EIDWT), pp. 49 – 54, 2011.
[12] Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue,
”Security Issues and Solutions in Cloud Computing”,
Proc. Of 32nd International Conference on Distributed
Computing Systems Workshops, pp. 573-577, 2012.
[13] Mohammed A. AlZain, Eric Pardede, Ben Soh, James A.
Thom, “Cloud Computing Security: From Single to
Multi-Clouds”, Proc of the 45th Hawaii International
Conference on System Sciences (HICSS), IEEE, pp.
5490-5499, 2012.
[14] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi,
“Data Security in Cloud Computing with Elliptic Curve
Cryptography”, Proc. of International Journal of Soft
Computing and Engineering, Vol 2, Issue 3, pp. 138-141,
2012.
[15] Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue ,
“Security Issues and Solutions in Cloud Computing”, in
Proc. of 32nd International Conference on Distributed
Computing Systems Workshops(ICDCSW), pp. 573-577,
2012.
[16] T.M Bhraguram , M.S Sumesh, “Cyber Security
Information Exchange Based on Data Asset De-coupling
factor in Cloud Computing”, IEEE Recent Advances in
Intelligent Computational Systems (RAICS), pp. 089 –
095, 2011.
[17] Abhinav Shrivastava, Amlan Kundu, S Surat, A.K.
Majumdar “Credit Card Fraud Detection Using Hidden
Markov Model”, IEEE Transactions on Dependable And
Secure Computing, vol. 5, issue 1, pp. 37-48, 2008.
[18] Jeffrey W. Seifert, “Data Mining: An Overview”, CRS
Report for Congress, pp.1-16, 2004.
[19] Pavithra S., Badi Alekhya, “Implementing Efficient
Monitoring And Data Dynamics For Data Storage
Security in Cloud Computing”, IRACST - International
Journal of Computer Science and Information
Technology & Security (IJCSITS), pp. 139-143, Vol. 2,
No. 1, 2012.