SlideShare a Scribd company logo
1 of 12
Download to read offline
David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 319–330, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2232
An Comparison with Property Based Resource
Attestation to Secure Cloud Environment
Mr. Ravindra K. Gupta1
, Mr. Rajat Pali2
, Dr. Shailendra Singh3
,
Mr. Gajendra Singh4
, Mr. Ashutosh k. Dubey5
ravindra_p84@rediffmail.com1
M.Tech Scholar, CSE, SSSIST, Sehore2
rajat14pali@gmail.com
Professor (CSE), NITTTR, Bhopal3
ssingh@nitttrbpl.ac.in
HOD(CSE/IT),Sssist,Sehore4
AP, CSE, TITR, Bhopal, India5
ashutoshdubey123@gmail.com
ABSTRACT
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and
the traditional approach. It also proof that our method shows good result in comparison to the
previous one.
KEYWORDS
Cloud environment, Two Way security, Sharing, Java
1. INTRODUCTION
Cloud computing is a paradigm of computing that aims at providing dynamically scalable
computing resources over the Internet as a service. Users do not need to bother about the
management of technology infrastructure. They simply use the resources on a pay-per-use basis,
commissioning and decommissioning as many instances of computing resources as needed.
Cloud Architectures solve such difficulties. Applications built on Cloud Architectures run in-the-
cloud where the physical location of the infrastructure is determined by the provider. They take
advantage of simple APIs of Internet-accessible services that scale on demand, that are industrial-
strength, where the complex reliability and scalability logic of the underlying services remains
implemented and hidden inside-the-cloud. The usage of resources in Cloud Architectures is as
needed, sometimes ephemeral or seasonal, thereby providing the highest utilization and optimum
bang for the buck.
320 Computer Science & Information Technology (CS & IT)
The applications are upgraded very easily through internet. The user no needs to do it manually
using the upgraded version software. The motive of Cloud Computing is serving On Demand
means when the need arises; it’s very easy to get extra resource instantly. Any small amount of
resource can be used from the cloud.
The advantages of cloud computing over traditional computing include: agility, lower entry cost,
device independency, location independency, and scalability [1].In order to solve the problem of
data integrity checking, many schemes are proposed under different systems and security models
[2], [3], [4], [5], [6]. In all these works, great efforts are made to design solutions that meet
various requirements: high scheme efficiency, stateless verification, unbounded use of queries
and retrievability of data, etc. Considering the role of the verifier in the model, all the schemes
presented before fall into two categories: private auditability and public auditability. Although
schemes with private auditability can achieve higher scheme efficiency, public auditability allows
anyone, not just the client (data owner), to challenge the cloud server for correctness of data
storage while keeping no private information.
We provide here an overview of cloud computing. The rest of this paper is arranged as follows:
Section 2 describes the security consideration; Section 3 describes about recent scenario; Section
4 shows the proposed approach; Section 5 shows the result analysis. Section 6 describes
Conclusion.
2. SECURITY CONSIDERATION
With the PaaS (Platform as a Service) model the vendor offers a complete development
environment in which application developers can then create and deploy their code. This
approach means that instead of building a server environment to run an application and installing
a development environment to create applications on that server, the customer can simply connect
to a PaaS cloud provider and by using a PaaS complianct development tool, start creating
applications that can be deployed worldwide without any delay. The vendor will typically provide
code building blocks so that the customer can build applications rapidly and the development
environment can either be web-based or by using a development environment on the local
computer.
Distributed applications can be challenging to adapt to a cloud environment. For example,
consider the situation where you have a n-tier, on-premises, distributed line-of-business
application and you want to migrate this application to the cloud. For security reasons, you decide
to keep the data tier in a Private Cloud environment but to migrate the business and presentation
tiers to the Public Cloud.
Computer Science & Information Technology (CS & IT) 321
Figure 1: N-Tier Cloud Application
Some of the challenges that you may face from this type of migration include:
• Security, particularly authentication, cryptography, access control and firewall ports
• Replacing synchronous operations with asynchronous ones
• Performance management
• Exception management and error reporting
A well-architected distributed application should be able to make the transition from an on-
premises environment to a cloud-based configuration relatively painlessly. However, poor
architecture and design can result in performance degradation and poor security can result in
compromise of some or all components of the application.
Performance degradation can come from design errors such as excessive querying of parameters
or heavy use of object properties. In a high-speed, low-latency LAN environment, these factors
have minimal effect; in cloud-based environments, such issues can cause the application to
perform very slowly.
3. RECENT SCENARIO
In 2010, Wei-Tek Tsai et al. [7] provide an overview survey of current cloud computing
architectures, discusses issues that current cloud computing implementations have and proposes a
Service-Oriented Cloud Computing Architecture (SOCCA) so that clouds can interoperate with
each other. Furthermore, the SOCCA also proposes high level designs to better support multi-
tenancy feature of cloud computing.
In 2010, Zhidong Shen et al. [8] proposed a new prototype system, in which cloud computing
system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted
Platform Module (TPM). In this design, better effect can be obtained in authentication, role based
access and data protection in cloud computing environment.
In 2010, Zhidong Shen et al. [9] proposed a method to build a trusted computing environment for
cloud computing system by integrating the trusted computing platform into cloud computing
system. They propose a model system in which cloud computing system is combined with
trusted computing platform with trusted platform module. In this model, some important security
services, including authentication, confidentiality and integrity, are provided in cloud computing
system.
322 Computer Science & Information Technology (CS & IT)
In 2011, Pritesh Jain et al. [10] survey several aspects of cloud computing security concerns.
They concern on the major challenges that faces the cloud computing is how to secure and
protect the data and processes the data of the user. To provide secure and reliable services in
cloud computing environment is an important issue. One of the security issues is how to reduce
the impact of denial-of-service (DoS) attack or distributed denial-of-service (DDoS) in this
environment.
In 2011, Siyuan Xin et al. [11] proposed about the property-based remote attestation mechanism
in Trusted Computing is imported into clouding computing, and a property-based remote
attestation method oriented to cloud computing is designed based on the characteristics of cloud
computing. In this method, through the attestation proxy, the remote attestation of the computing
platform's security property is realized without disclosing the platform’s configuration, and users
can validate the security property of the actual computing platform in the virtual cloud computing
environment.
4. PROPOSED APPROACH
In our proposed approach we consider the security in the cloud side and also the data of the user
is safe. For this we proposed an architecture which is java based. By using this architecture we
can provide security to the cloud environment and to the user. Any normal can register their detail
in this environment and according to the detail Admin of the cloud provide an userid and
password. For the session in the cloud and for data sharing we again request to the admin cloud ,
if admin provide the session and sharing key then the normal user can perform the operation.
User’s data is also safe in this environment, if admin want to see the data of the normal user , then
they can request the normal user to provide a password , so that admin can see the data of the
normal user. Normal user may decline for the above condition also. Admin of the cloud can also
block the user if a cloud provider wants to do so.
We present a secure architecture in which we can enter in two ways, first by computing and
second by admin task. Through the admin task environment we can enter by entering the
appropriate admin password. Admin can create the user, check the time, block or unblock user,
check for space and also compute task.
Admin create a user with their userid, pwd and username. Then the normal user can enter in the
computing environment by entering the proper user id and password. We now provide the steps
for the problem domain of section four.
Secure API and Interfaces:
Analyze the security model of cloud provider interfaces and ensure strong authentication and
access controls and all are implemented in concert with encrypted transmission. We can apply
this type of security by authentication control for the users of the cloud; they can enter by
applying their user id and password which is monitor by the cloud environment. They can
demand the cloud environment according to their choice and need.
Now we discuss our algorithm.
Assumption:
Dnc- demand new cloud
Ec- Exiting Cloud
Dsk- Database Session Key
Computer Science & Information Technology (CS & IT) 323
Algorithm
1. Select adminnormal user
If(admin)
{
Goto step 3;
}
Else
{
Goto step2;
}
2. [Check the Authentication for normal user]
Enter the userid and password.
If(uid==userid && pwd==password)
{
Enter in the cloud environment
If(dnc)
{
Enter the space
Enter the environment
Enter the cloud type
Enter the name of the cloud
}
Else If(ec)
{
Select cloud1,cloud2….cloudn[Environment]
Add(data)
Delete(data)
Share(data)
}
Else If(dsk)
{
Request(admin)
}
3. Admin (pwd)
{
Request(database);
CreateUser();
Time();
Permission();
Password();
Skey();
Check();
}
Add(data)
{
324 Computer Science & Information Technology (CS & IT)
FileWriter fstream = new FileWriter("out.txt",true);
BufferedWriter out = new BufferedWriter(fstream);
out.write("string");
}
Delete(data)
{
File f1 = new File(file);
and delete the file using delete function f1.delete();
}
Share(data)
{
File folder = new File("C:userfolder");
File[] files = folder.listFiles();
for (int i = 0; i < files.length; i++) {
list.add(i, files[i].toString());
}
Request (database)
{
NUser (permission)
}
CreateUser()
{
[Enter Your UID]
If(Success)
{
Print(“Registration Successful”);
Print(your password is=);
}
else
[enter Missing Parameters]
}
Time()
{
time = System.currentTimeMillis();
}
Permission()
{
If(block)
Permission is blocked
else if(unblock)
Regain Permission
}
Password()
{
Computer Science & Information Technology (CS & IT) 325
[This is used for creating password for data sharing]
getKey();
}
Skey()
{
[This is used for a single session]
getKey();
}
Check()
{
File file = new File("C:");
System.out.println("C:");
System.out.println("Total:" + file.getTotalSpace());
System.out.println("Free: " + file.getFreeSpace());
System.out.println("Usable:" + file.getUsableSpace());
}
getKey()
{
Random random = new Random();
String s1=new String("abcdefghijklmnopqrstvuwxyz");
String s2=new String("ABCDEFGHIJKLMNOPQRSTVUWXYZ");
String s3=new String("0123456789");
int r1 = random.nextInt(26);
String key=new String();
key=String.valueOf(s1.charAt(r1));
r1 = random.nextInt(26);
key=key+String.valueOf(s2.charAt(r1));
r1 = random.nextInt(10);
key=key+String.valueOf(s3.charAt(r1));
r1 = random.nextInt(26);
key=key+String.valueOf(s2.charAt(r1));
r1 = random.nextInt(26);
key=key+String.valueOf(s1.charAt(r1));
r1 = random.nextInt(10);
key=key+String.valueOf(s3.charAt(r1));
System.out.println(key);
return(key);
}
NUser (permission)
{
[Admin can read the data of the user after getting the security key from the normal user]
getKey ();
}
326 Computer Science & Information Technology (CS & IT)
5. RESULT ANALYSIS
According to the survey by Global Industry Analysts & Gartner's, cloud computing is one of the
fastest growing markets, the market size is forecast to touch $222.5 billion by 2015.
Figure 2: Cloud Computing Market Forecast
Now that we have set the context about how Cloud computing is going to be way of life, let's
discuss about what are the issues that may hold back or slow down the progress, what are the
issues that are causing worry lines and making the consumers think.
One of the biggest concerns that the consumers around the world have is of security. We present
a graph [Figure 3] that is taken from IDC Enterprise panel. In this graph we present the
challenges issue of the cloud on demand model. If we analyze then we think about the major
concern which is security.
Figure 3: Source IDC Enterprise Panel
Computer Science & Information Technology (CS & IT) 327
When our data, business process, applications are deployed to Cloud, how secure are our data,
business process & applications going to be. This is one of the top most questions by the
customers. What are security solutions that are provided by cloud service provider, what are the
security solutions that can be built into products, Business applications, and Enterprise
applications by different IT vendors?
We were really pleased to see such a positive reaction from local businesses about the buzz of
cloud computing. As IT professionals, we are always on the lookout for innovative processes that
can help other businesses in our area. We have a strong vision for the future of cloud computing
especially as as industry research has shown that it is being adopted five times faster than
traditional IT. We want to be able to bring SMEs in Coventry forward in terms of this
technological revolution.
• 100% of feedback respondents at the workshop had faith in the security of a cloud system
following our presentation.
• The following chart shows the respondents opinion on cloud’s main benefits:
31
23
23
23
Cloud benefits
Cost
Access
Scalability
Reliability and Security
Figure 4: Cloud Benefits
In our approach we show the cloud security which is in four phase’s session Key, Sharing key,
Block user and User Data Key. By which the security is increases.
328 Computer Science & Information Technology (CS & IT)
Figure 5: Cloud Security in Four phases
In terms of Operation in our application the security is increases according to the operation. When
the operation is less, security is also less. But if the operation is increases security are also
increases.
0
20
40
60
80
100
120
140
Security
Operation
Figure 6: Operation in Cloud security
Area distribution graph is shown in figure 7.
Computer Science & Information Technology (CS & IT) 329
Area
Cloud
User
Figure 7: Area Distribution
In terms of security comparison in the old and our new approach we are in higher position,
because of the user data security and the session key security which is not available as per my
knowledge in the today’s cloud environment.
0
5
10
15
20
25
30
35
Category 1 Category 2 Category 3 Category 4
Old
New
Figure 8: Old vs. New (In terms of Security)
6. CONCLUSION
In this paper we proposed a novel approach to provide sharing in the cloud environment with two
way secure user cloud security. We present a secure architecture in which we can enter in two
ways, first by computing and second by admin task. Through the admin task environment we can
enter by entering the appropriate admin password. Admin can create the user, check the time,
block or unblock user, check for space and also compute task. We also present a comparative
330 Computer Science & Information Technology (CS & IT)
study in different scale so that we prove that our method is good in comparison to the previous
security concerns.
REFERENCES
[1] Wikipedia - Cloud Computing. [Online]. http://en.wikipedia.org/wiki/Cloud_computing
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07),
pp. 598-609, 2007.
[3] A. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf.
Computer and Comm. Security (CCS ’07), pp. 584-597, 2007.
[4] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and
Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08),
pp. 90-107, 2008.
[5] K.D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Report
2008/175, Cryptology ePrint Archive, 2008.
[6] M. Naor and G.N. Rothblum, “The Complexity of Online Memory Checking,” Proc. 46th Ann. IEEE
Symp. Foundations of Computer Science (FOCS ’05), pp. 573-584, 2005.
[7] Wei-Tek Tsai, Xin Sun, Janaka Balasooriya , “Service-Oriented Cloud Computing Architecture” ,
2010 Seventh International Conference on Information Technology.
[8] Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , “Cloud Computing System Based on Trusted
Computing Platform”, 2010 International Conference on Intelligent Computation Technology and
Automation.
[9] Zhidong Shen , Qiang Tong , “The Security of Cloud Computing System enabled by Trusted
Computing Technology” , 2010 2nd International Conference on Signal Processing Systems (ICSPS).
[10] Mr. Pritesh Jain, Prof. Vaishali Chourey, Prof. Dheeraj Rane,” An Analysis of Cloud Model-Based
Security for Computing Secure Cloud Bursting and Aggregation in Real Environment”, International
Journal of advanced Computer Research(IJACR) Volume 1, September 2011.
[11] Siyuan Xin, Yong Zhao, Yu Li,“ Property-Based Remote Attestation Oriented to Cloud Computing” ,
2011 Seventh International Conference on Computational Intelligence and Security.

More Related Content

What's hot

IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multipleKiran Kumar
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 

What's hot (20)

IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Fog doc
Fog doc Fog doc
Fog doc
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 

Similar to An Comparison with Property Based Resource Attestation to Secure Cloud Environment

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Journals
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Publishing House
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 

Similar to An Comparison with Property Based Resource Attestation to Secure Cloud Environment (20)

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
489 493
489 493489 493
489 493
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

An Comparison with Property Based Resource Attestation to Secure Cloud Environment

  • 1. David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 319–330, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2232 An Comparison with Property Based Resource Attestation to Secure Cloud Environment Mr. Ravindra K. Gupta1 , Mr. Rajat Pali2 , Dr. Shailendra Singh3 , Mr. Gajendra Singh4 , Mr. Ashutosh k. Dubey5 ravindra_p84@rediffmail.com1 M.Tech Scholar, CSE, SSSIST, Sehore2 rajat14pali@gmail.com Professor (CSE), NITTTR, Bhopal3 ssingh@nitttrbpl.ac.in HOD(CSE/IT),Sssist,Sehore4 AP, CSE, TITR, Bhopal, India5 ashutoshdubey123@gmail.com ABSTRACT In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the data then it take permission from the client environment. This provides a way to hide the data and normal user can protect their data from the cloud provider. This provides a two way security which helps both the cloud and the normal user. For the above concept we propose a java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one. KEYWORDS Cloud environment, Two Way security, Sharing, Java 1. INTRODUCTION Cloud computing is a paradigm of computing that aims at providing dynamically scalable computing resources over the Internet as a service. Users do not need to bother about the management of technology infrastructure. They simply use the resources on a pay-per-use basis, commissioning and decommissioning as many instances of computing resources as needed. Cloud Architectures solve such difficulties. Applications built on Cloud Architectures run in-the- cloud where the physical location of the infrastructure is determined by the provider. They take advantage of simple APIs of Internet-accessible services that scale on demand, that are industrial- strength, where the complex reliability and scalability logic of the underlying services remains implemented and hidden inside-the-cloud. The usage of resources in Cloud Architectures is as needed, sometimes ephemeral or seasonal, thereby providing the highest utilization and optimum bang for the buck.
  • 2. 320 Computer Science & Information Technology (CS & IT) The applications are upgraded very easily through internet. The user no needs to do it manually using the upgraded version software. The motive of Cloud Computing is serving On Demand means when the need arises; it’s very easy to get extra resource instantly. Any small amount of resource can be used from the cloud. The advantages of cloud computing over traditional computing include: agility, lower entry cost, device independency, location independency, and scalability [1].In order to solve the problem of data integrity checking, many schemes are proposed under different systems and security models [2], [3], [4], [5], [6]. In all these works, great efforts are made to design solutions that meet various requirements: high scheme efficiency, stateless verification, unbounded use of queries and retrievability of data, etc. Considering the role of the verifier in the model, all the schemes presented before fall into two categories: private auditability and public auditability. Although schemes with private auditability can achieve higher scheme efficiency, public auditability allows anyone, not just the client (data owner), to challenge the cloud server for correctness of data storage while keeping no private information. We provide here an overview of cloud computing. The rest of this paper is arranged as follows: Section 2 describes the security consideration; Section 3 describes about recent scenario; Section 4 shows the proposed approach; Section 5 shows the result analysis. Section 6 describes Conclusion. 2. SECURITY CONSIDERATION With the PaaS (Platform as a Service) model the vendor offers a complete development environment in which application developers can then create and deploy their code. This approach means that instead of building a server environment to run an application and installing a development environment to create applications on that server, the customer can simply connect to a PaaS cloud provider and by using a PaaS complianct development tool, start creating applications that can be deployed worldwide without any delay. The vendor will typically provide code building blocks so that the customer can build applications rapidly and the development environment can either be web-based or by using a development environment on the local computer. Distributed applications can be challenging to adapt to a cloud environment. For example, consider the situation where you have a n-tier, on-premises, distributed line-of-business application and you want to migrate this application to the cloud. For security reasons, you decide to keep the data tier in a Private Cloud environment but to migrate the business and presentation tiers to the Public Cloud.
  • 3. Computer Science & Information Technology (CS & IT) 321 Figure 1: N-Tier Cloud Application Some of the challenges that you may face from this type of migration include: • Security, particularly authentication, cryptography, access control and firewall ports • Replacing synchronous operations with asynchronous ones • Performance management • Exception management and error reporting A well-architected distributed application should be able to make the transition from an on- premises environment to a cloud-based configuration relatively painlessly. However, poor architecture and design can result in performance degradation and poor security can result in compromise of some or all components of the application. Performance degradation can come from design errors such as excessive querying of parameters or heavy use of object properties. In a high-speed, low-latency LAN environment, these factors have minimal effect; in cloud-based environments, such issues can cause the application to perform very slowly. 3. RECENT SCENARIO In 2010, Wei-Tek Tsai et al. [7] provide an overview survey of current cloud computing architectures, discusses issues that current cloud computing implementations have and proposes a Service-Oriented Cloud Computing Architecture (SOCCA) so that clouds can interoperate with each other. Furthermore, the SOCCA also proposes high level designs to better support multi- tenancy feature of cloud computing. In 2010, Zhidong Shen et al. [8] proposed a new prototype system, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted Platform Module (TPM). In this design, better effect can be obtained in authentication, role based access and data protection in cloud computing environment. In 2010, Zhidong Shen et al. [9] proposed a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. They propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.
  • 4. 322 Computer Science & Information Technology (CS & IT) In 2011, Pritesh Jain et al. [10] survey several aspects of cloud computing security concerns. They concern on the major challenges that faces the cloud computing is how to secure and protect the data and processes the data of the user. To provide secure and reliable services in cloud computing environment is an important issue. One of the security issues is how to reduce the impact of denial-of-service (DoS) attack or distributed denial-of-service (DDoS) in this environment. In 2011, Siyuan Xin et al. [11] proposed about the property-based remote attestation mechanism in Trusted Computing is imported into clouding computing, and a property-based remote attestation method oriented to cloud computing is designed based on the characteristics of cloud computing. In this method, through the attestation proxy, the remote attestation of the computing platform's security property is realized without disclosing the platform’s configuration, and users can validate the security property of the actual computing platform in the virtual cloud computing environment. 4. PROPOSED APPROACH In our proposed approach we consider the security in the cloud side and also the data of the user is safe. For this we proposed an architecture which is java based. By using this architecture we can provide security to the cloud environment and to the user. Any normal can register their detail in this environment and according to the detail Admin of the cloud provide an userid and password. For the session in the cloud and for data sharing we again request to the admin cloud , if admin provide the session and sharing key then the normal user can perform the operation. User’s data is also safe in this environment, if admin want to see the data of the normal user , then they can request the normal user to provide a password , so that admin can see the data of the normal user. Normal user may decline for the above condition also. Admin of the cloud can also block the user if a cloud provider wants to do so. We present a secure architecture in which we can enter in two ways, first by computing and second by admin task. Through the admin task environment we can enter by entering the appropriate admin password. Admin can create the user, check the time, block or unblock user, check for space and also compute task. Admin create a user with their userid, pwd and username. Then the normal user can enter in the computing environment by entering the proper user id and password. We now provide the steps for the problem domain of section four. Secure API and Interfaces: Analyze the security model of cloud provider interfaces and ensure strong authentication and access controls and all are implemented in concert with encrypted transmission. We can apply this type of security by authentication control for the users of the cloud; they can enter by applying their user id and password which is monitor by the cloud environment. They can demand the cloud environment according to their choice and need. Now we discuss our algorithm. Assumption: Dnc- demand new cloud Ec- Exiting Cloud Dsk- Database Session Key
  • 5. Computer Science & Information Technology (CS & IT) 323 Algorithm 1. Select adminnormal user If(admin) { Goto step 3; } Else { Goto step2; } 2. [Check the Authentication for normal user] Enter the userid and password. If(uid==userid && pwd==password) { Enter in the cloud environment If(dnc) { Enter the space Enter the environment Enter the cloud type Enter the name of the cloud } Else If(ec) { Select cloud1,cloud2….cloudn[Environment] Add(data) Delete(data) Share(data) } Else If(dsk) { Request(admin) } 3. Admin (pwd) { Request(database); CreateUser(); Time(); Permission(); Password(); Skey(); Check(); } Add(data) {
  • 6. 324 Computer Science & Information Technology (CS & IT) FileWriter fstream = new FileWriter("out.txt",true); BufferedWriter out = new BufferedWriter(fstream); out.write("string"); } Delete(data) { File f1 = new File(file); and delete the file using delete function f1.delete(); } Share(data) { File folder = new File("C:userfolder"); File[] files = folder.listFiles(); for (int i = 0; i < files.length; i++) { list.add(i, files[i].toString()); } Request (database) { NUser (permission) } CreateUser() { [Enter Your UID] If(Success) { Print(“Registration Successful”); Print(your password is=); } else [enter Missing Parameters] } Time() { time = System.currentTimeMillis(); } Permission() { If(block) Permission is blocked else if(unblock) Regain Permission } Password() {
  • 7. Computer Science & Information Technology (CS & IT) 325 [This is used for creating password for data sharing] getKey(); } Skey() { [This is used for a single session] getKey(); } Check() { File file = new File("C:"); System.out.println("C:"); System.out.println("Total:" + file.getTotalSpace()); System.out.println("Free: " + file.getFreeSpace()); System.out.println("Usable:" + file.getUsableSpace()); } getKey() { Random random = new Random(); String s1=new String("abcdefghijklmnopqrstvuwxyz"); String s2=new String("ABCDEFGHIJKLMNOPQRSTVUWXYZ"); String s3=new String("0123456789"); int r1 = random.nextInt(26); String key=new String(); key=String.valueOf(s1.charAt(r1)); r1 = random.nextInt(26); key=key+String.valueOf(s2.charAt(r1)); r1 = random.nextInt(10); key=key+String.valueOf(s3.charAt(r1)); r1 = random.nextInt(26); key=key+String.valueOf(s2.charAt(r1)); r1 = random.nextInt(26); key=key+String.valueOf(s1.charAt(r1)); r1 = random.nextInt(10); key=key+String.valueOf(s3.charAt(r1)); System.out.println(key); return(key); } NUser (permission) { [Admin can read the data of the user after getting the security key from the normal user] getKey (); }
  • 8. 326 Computer Science & Information Technology (CS & IT) 5. RESULT ANALYSIS According to the survey by Global Industry Analysts & Gartner's, cloud computing is one of the fastest growing markets, the market size is forecast to touch $222.5 billion by 2015. Figure 2: Cloud Computing Market Forecast Now that we have set the context about how Cloud computing is going to be way of life, let's discuss about what are the issues that may hold back or slow down the progress, what are the issues that are causing worry lines and making the consumers think. One of the biggest concerns that the consumers around the world have is of security. We present a graph [Figure 3] that is taken from IDC Enterprise panel. In this graph we present the challenges issue of the cloud on demand model. If we analyze then we think about the major concern which is security. Figure 3: Source IDC Enterprise Panel
  • 9. Computer Science & Information Technology (CS & IT) 327 When our data, business process, applications are deployed to Cloud, how secure are our data, business process & applications going to be. This is one of the top most questions by the customers. What are security solutions that are provided by cloud service provider, what are the security solutions that can be built into products, Business applications, and Enterprise applications by different IT vendors? We were really pleased to see such a positive reaction from local businesses about the buzz of cloud computing. As IT professionals, we are always on the lookout for innovative processes that can help other businesses in our area. We have a strong vision for the future of cloud computing especially as as industry research has shown that it is being adopted five times faster than traditional IT. We want to be able to bring SMEs in Coventry forward in terms of this technological revolution. • 100% of feedback respondents at the workshop had faith in the security of a cloud system following our presentation. • The following chart shows the respondents opinion on cloud’s main benefits: 31 23 23 23 Cloud benefits Cost Access Scalability Reliability and Security Figure 4: Cloud Benefits In our approach we show the cloud security which is in four phase’s session Key, Sharing key, Block user and User Data Key. By which the security is increases.
  • 10. 328 Computer Science & Information Technology (CS & IT) Figure 5: Cloud Security in Four phases In terms of Operation in our application the security is increases according to the operation. When the operation is less, security is also less. But if the operation is increases security are also increases. 0 20 40 60 80 100 120 140 Security Operation Figure 6: Operation in Cloud security Area distribution graph is shown in figure 7.
  • 11. Computer Science & Information Technology (CS & IT) 329 Area Cloud User Figure 7: Area Distribution In terms of security comparison in the old and our new approach we are in higher position, because of the user data security and the session key security which is not available as per my knowledge in the today’s cloud environment. 0 5 10 15 20 25 30 35 Category 1 Category 2 Category 3 Category 4 Old New Figure 8: Old vs. New (In terms of Security) 6. CONCLUSION In this paper we proposed a novel approach to provide sharing in the cloud environment with two way secure user cloud security. We present a secure architecture in which we can enter in two ways, first by computing and second by admin task. Through the admin task environment we can enter by entering the appropriate admin password. Admin can create the user, check the time, block or unblock user, check for space and also compute task. We also present a comparative
  • 12. 330 Computer Science & Information Technology (CS & IT) study in different scale so that we prove that our method is good in comparison to the previous security concerns. REFERENCES [1] Wikipedia - Cloud Computing. [Online]. http://en.wikipedia.org/wiki/Cloud_computing [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007. [3] A. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, 2007. [4] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008. [5] K.D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Report 2008/175, Cryptology ePrint Archive, 2008. [6] M. Naor and G.N. Rothblum, “The Complexity of Online Memory Checking,” Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS ’05), pp. 573-584, 2005. [7] Wei-Tek Tsai, Xin Sun, Janaka Balasooriya , “Service-Oriented Cloud Computing Architecture” , 2010 Seventh International Conference on Information Technology. [8] Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , “Cloud Computing System Based on Trusted Computing Platform”, 2010 International Conference on Intelligent Computation Technology and Automation. [9] Zhidong Shen , Qiang Tong , “The Security of Cloud Computing System enabled by Trusted Computing Technology” , 2010 2nd International Conference on Signal Processing Systems (ICSPS). [10] Mr. Pritesh Jain, Prof. Vaishali Chourey, Prof. Dheeraj Rane,” An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment”, International Journal of advanced Computer Research(IJACR) Volume 1, September 2011. [11] Siyuan Xin, Yong Zhao, Yu Li,“ Property-Based Remote Attestation Oriented to Cloud Computing” , 2011 Seventh International Conference on Computational Intelligence and Security.