SlideShare a Scribd company logo
DATA INTEGRITYAND SECURITY
Tunuguntla Hemanth
School of Computer Science and Engineering
Lovely Professional University
ABSTRACT:
Cloud Computing is a type of computing
that uses hardware and software to deliver a
service over Internet. It can be used to
access the applications and files from any
device across the globe over the internet. In
this the information and data are stored in
physical and virtual data servers through a
service provider like Amazon etc.
Data Integrity is one among the foremost
concern for the clients because the data
that’s stored within the large data centres
remains for an extended period of time as
long as because the client’s access with
completeness, accuracy and Integrity.
It refers to the maintaining and assurance
and consistency of required data. In general
the overall summary of Data Integrity
technique is almost same.
The data which is recorded which later
retrieval ensure that the data should be same
as it was originally as recorded.
Data Integrity isn’t to be confused with the
Data Security, the discipline of protecting
the information from the unauthorized
parties. If the changes are the results of the
unauthorized access, it might be going to be
a failure in Data Security.
Cloud Security means the protection of
valuable information from the hackers,
theft, leakage and deletion. These incidents
or attacks that affect the services provided
to the clients by the service providers such
as bank accounts and email accounts etc.
INTRODUCTION:
In the cloud storage architecture, cloud
make it possible to access our information
from anywhere at any time. In Cloud
Computing there are four Cloud Storages:
•Public cloud storage: In publicly cloud
storage system, it can access by any
subscriber with a web connectivity and
access to the cloud space.
•Private cloud storage: In privately cloud
storage system, it’s established for a
selected organizations and limits to access
to those organizations.
•Hybrid cloud storage: In hybrid cloud
storage, it’s combination of the publicly
cloud storage system and privately cloud
storage system. It means where critical
cloud data located in privately cloud while
other data is stored and accessed from
public cloud.
•Mobile cloud storage: In mobile cloud
storage, it stores the separate data within the
cloud and access it from anywhere at any
time.
Cloud has become an alternative and
advanced way of data storage for
organizations for a variety of industries.
New organizations are building up their
infrastructure on the cloud and many older
organizations are moving their
infrastructure from traditional to the cloud
platform. When we perform various
operations in the cloud, we must know that
all the operations are being performed on
the data.
CLOUD ARCHITECTURE:
The main goal of the Cloud Computing is
to have high performance computing power
which is used in research facilities
generally. It is to perform millions and
trillions of computations in fraction of
seconds which is mostly required by the
consumer.
The hardware layer: This layer is
responsible for maintaining the physical
resources of the cloud which comprises of
switches, physical server, routers, cooling
system etc.
The infrastructure layer: Also called the
virtualization layer. It creates a pool like
environment for the devices which works as
a storage and are useful for computational
services by dividing the resources into
parts. Because it contains a key role within
the cloud computing and many of its
attributes works as dynamic resource
assignment.
The application layer: With in the
hierarchy of the cloud architecture this
layer is at the highest level. It comprises of
the layers with the particular cloud
applications.
In this paper the focus on Data Integrity and
Security which are exposing to risk within
the cloud storage services and provided the
information redundancy and data
dependability by using Homomorphic
Encryption.
In this Homomorphic Encryption the
security analysis also depicts us the
suggested model is highly efficient against
the malicious attacks, theft and leakage etc.
It is to achieve storage correctness and the
error localization.
Cloud computing saves the time and money
of the organisation or the company. But
trusting it is more important because the
data is the most important thing for the
organisation. Because the data that they
share in the cloud is directly into the
database or through an application
HOMOMORPHIC ENCRYPTION:
It is a new type of Encryption that requires
a secret key to decrypt. This computes on
encrypted data without decryption. No one
sees results without a secret key.
In this a cryptographic algorithm is
explained for a brief idea on the
secure communication and how it
works. For more efficiency and for
very thick layered security there are
many techniques that combines but
this is helps in establishing a secure
connection.
Example:
If you want to keep your DNA data secret,
but you still want to use some services, let’s
say to find your relatives like you can just
upload the encrypted version of your DNA
to the database and they provide matching
services for you and return the results. Even
you have relative or not you get some result
encrypted back. Only you can see the result.
All the data is encrypted, and the service
provider does not know nothing about it.
Real lifetime applications of these is I-Dash
application etc. These focus text on
Genomic data.
Explanation on Homomorphic
Encryption:
There are two zones which requires a safe
zone. Outside of the safe zone all the data
should be encrypted. The encryption
doesn’t have to be done by yourself because
there is public key encryption that use a
public key. Even the results outside the safe
zone are encrypted.
Popular Schemes:
TFHE: It is one of the most efficient
schemes now a days. It focuses on logic
gates and bits. It is like redesigning logic
circuit.
BGV, BFV: They perform exact arithmetic
vectors of numbers.
Five Stages in Homomorphic Encryption:
1. Setup
2. Key Generation
3. Encryption
4. Evaluation
5. Decryption
Set-Up:
In the setup we need to choose the scheme
and some security parameters and
performance parameters functionality.
Key Generation:
After setting up the parameters we can do
the key generation and here the secret key
is the one that we need to protect.
And the other three are generated from the
secret key and they all are considered to be
public. So we can these keys to anyone and
they can never compromise your data.
These are required for computation and the
public key is used for encryption and
decryption as well.
Encryption:
It is a high-level view where we encrypt
vector of numbers. Many of it becomes
Ciphertext which becomes two
polynomials.
Evaluation:
It is the stage where we really write a
program. Like if there is a algorithm in the
HE. We can write it down in HE and
happens in evaluation. It is just a
computation on a secure data.
Decryption:
After the computation is done, we decrypt
the data.
SIMD Computation:
A single instruction multiple datum, when
you issue a single instruction or operation it
applies to all the data independently. It is
called as a single instruction multiple data.
We use that with homomorphic Encryption.
NOTATIONS PRELIMINARIES:
f - The information file to be stored.
A - The dispersal matrix, which indicates a
collection n= m + k vectors.
G - The encoded file matrix.
f key(.) – function
ver - A version number
Let F = (F1, F2, F3, …. Fm) and Fi = (f1i,
f2i…... fli) T ( I ∈ {1, . . . , m}).
Here T denotes that every Fi is represented
as a column vector, and data vector size
denoted l in blocks. Of these blocks are
elements of GF (2p).
The systematic layout with parity vectors is
achieved with the data dispersal matrix A,
derived from a matrix derived from a β2m-
1 … βmm-1 … βm+1m-1 βnm-1 where βj
(j ∈ {1, . . ., n}) are same elements that are
chosen randomly from GF (2p).
After a series of basic row transformations
then the matrix is often written as:
1 0 . . . 0 P11 P12 . . .P1k 0 1 . . .
0 P21 P22 . . . Pmk
A = 0 0 . . . 1 Pm1 Pm2 . . . Pmk
By multiplying F by A, the user obtains the
encoded file is:
G = F.A = (G (1), G(2),..., G(m), G(m+1), .
. ., G(n)) =
(F1, F2, . . ., Fm, G(m+1), . . ., G(n)),
Where G(j) = (g1(j), g2(j), . . ., gl(j)) T (j ∈
{1..., n}).
It is noticed and also the multiplication then
reproduces the information file vectors of F
and also the remaining part (G(m+1), . . .,
G(n)) are k parity vectors generated which
are supported on F.
Algorithm 1 Token Precomputation
1: procedure
2: Select parameters l, n and performance f,
φ;
3: Select the amount t of tokens;
4: Select the amount r of index per
confirmation;
5: produce pass key Kprp and challenge key
kchal;
6: for the vectors G(j), j ← 1, n, do
7: for round i← 1, t d
8: Derive αi = fkchal and kprp from Kprp
9: compute
10 ends for
11: end for
12: store all the vis locally
13: end procedure.
FUTURE WORK:
Cloud Computing is in continual
development, while people are enjoying the
numerous benefits that cloud computing
brings, security in clouds may be a key
challenge.
• Much vulnerability in clouds still exists
and hackers still proceed to exploit these
security holes.
• During this paper I have examined that the
security and safety vulnerabilities in clouds
from three perspectives), included related
real-world exploits, and introduced
countermeasures to those security breaches.
• Within the future, further efforts in
studying cloud security risks and also the
countermeasures to cloud security breaches
must continue.
CONCLUSION:
In this paper, I have examined the issues
and concern with security in cloud
computing. As we rely on erasing and
correcting the code in the file that support
the redundancy of the vectors using the
Homomorphic Encryption. The fact is that
the security and the privacy suggest that the
student’s intention to use the cloud services
positively related to their privacy
perception.
REFERENCES:
1. Book By: K. D. Bowers, A. Jules,
and A. Opera, “High-availability &
Integrity for Cloud Storage”
2. Algorithm from academia-
Research on Cloud Computing.
3. From You Tube
(https://www.youtube.com/watch
?v=SEBdYXxijSo).

More Related Content

What's hot

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
MajedahAlkharji
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theory
inventionjournals
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
M021201092098
M021201092098M021201092098
M021201092098
theijes
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
Luisa Francisco
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
IOSR Journals
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
IJCSIS Research Publications
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 

What's hot (19)

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theory
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
M021201092098
M021201092098M021201092098
M021201092098
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 

Similar to Cloud computing term paper

Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
MajedahAlkharji
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Sara Perez
 
Br36413417
Br36413417Br36413417
Br36413417
IJERA Editor
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
IJERA Editor
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
K017115359
K017115359K017115359
K017115359
IOSR Journals
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
 

Similar to Cloud computing term paper (20)

Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
 
Br36413417
Br36413417Br36413417
Br36413417
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
K017115359
K017115359K017115359
K017115359
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

Cloud computing term paper

  • 1. DATA INTEGRITYAND SECURITY Tunuguntla Hemanth School of Computer Science and Engineering Lovely Professional University ABSTRACT: Cloud Computing is a type of computing that uses hardware and software to deliver a service over Internet. It can be used to access the applications and files from any device across the globe over the internet. In this the information and data are stored in physical and virtual data servers through a service provider like Amazon etc. Data Integrity is one among the foremost concern for the clients because the data that’s stored within the large data centres remains for an extended period of time as long as because the client’s access with completeness, accuracy and Integrity. It refers to the maintaining and assurance and consistency of required data. In general the overall summary of Data Integrity technique is almost same. The data which is recorded which later retrieval ensure that the data should be same as it was originally as recorded. Data Integrity isn’t to be confused with the Data Security, the discipline of protecting the information from the unauthorized parties. If the changes are the results of the unauthorized access, it might be going to be a failure in Data Security. Cloud Security means the protection of valuable information from the hackers, theft, leakage and deletion. These incidents or attacks that affect the services provided to the clients by the service providers such as bank accounts and email accounts etc. INTRODUCTION: In the cloud storage architecture, cloud make it possible to access our information from anywhere at any time. In Cloud Computing there are four Cloud Storages: •Public cloud storage: In publicly cloud storage system, it can access by any subscriber with a web connectivity and access to the cloud space. •Private cloud storage: In privately cloud storage system, it’s established for a selected organizations and limits to access to those organizations. •Hybrid cloud storage: In hybrid cloud storage, it’s combination of the publicly cloud storage system and privately cloud storage system. It means where critical cloud data located in privately cloud while other data is stored and accessed from public cloud. •Mobile cloud storage: In mobile cloud storage, it stores the separate data within the cloud and access it from anywhere at any time. Cloud has become an alternative and advanced way of data storage for organizations for a variety of industries. New organizations are building up their infrastructure on the cloud and many older organizations are moving their infrastructure from traditional to the cloud platform. When we perform various operations in the cloud, we must know that all the operations are being performed on the data.
  • 2. CLOUD ARCHITECTURE: The main goal of the Cloud Computing is to have high performance computing power which is used in research facilities generally. It is to perform millions and trillions of computations in fraction of seconds which is mostly required by the consumer. The hardware layer: This layer is responsible for maintaining the physical resources of the cloud which comprises of switches, physical server, routers, cooling system etc. The infrastructure layer: Also called the virtualization layer. It creates a pool like environment for the devices which works as a storage and are useful for computational services by dividing the resources into parts. Because it contains a key role within the cloud computing and many of its attributes works as dynamic resource assignment. The application layer: With in the hierarchy of the cloud architecture this layer is at the highest level. It comprises of the layers with the particular cloud applications. In this paper the focus on Data Integrity and Security which are exposing to risk within the cloud storage services and provided the information redundancy and data dependability by using Homomorphic Encryption. In this Homomorphic Encryption the security analysis also depicts us the suggested model is highly efficient against the malicious attacks, theft and leakage etc. It is to achieve storage correctness and the error localization. Cloud computing saves the time and money of the organisation or the company. But trusting it is more important because the data is the most important thing for the organisation. Because the data that they share in the cloud is directly into the database or through an application HOMOMORPHIC ENCRYPTION: It is a new type of Encryption that requires a secret key to decrypt. This computes on encrypted data without decryption. No one sees results without a secret key. In this a cryptographic algorithm is explained for a brief idea on the secure communication and how it works. For more efficiency and for very thick layered security there are many techniques that combines but this is helps in establishing a secure connection. Example: If you want to keep your DNA data secret, but you still want to use some services, let’s
  • 3. say to find your relatives like you can just upload the encrypted version of your DNA to the database and they provide matching services for you and return the results. Even you have relative or not you get some result encrypted back. Only you can see the result. All the data is encrypted, and the service provider does not know nothing about it. Real lifetime applications of these is I-Dash application etc. These focus text on Genomic data. Explanation on Homomorphic Encryption: There are two zones which requires a safe zone. Outside of the safe zone all the data should be encrypted. The encryption doesn’t have to be done by yourself because there is public key encryption that use a public key. Even the results outside the safe zone are encrypted. Popular Schemes: TFHE: It is one of the most efficient schemes now a days. It focuses on logic gates and bits. It is like redesigning logic circuit. BGV, BFV: They perform exact arithmetic vectors of numbers. Five Stages in Homomorphic Encryption: 1. Setup 2. Key Generation 3. Encryption 4. Evaluation 5. Decryption Set-Up: In the setup we need to choose the scheme and some security parameters and performance parameters functionality. Key Generation: After setting up the parameters we can do the key generation and here the secret key is the one that we need to protect. And the other three are generated from the secret key and they all are considered to be public. So we can these keys to anyone and they can never compromise your data. These are required for computation and the public key is used for encryption and decryption as well. Encryption: It is a high-level view where we encrypt vector of numbers. Many of it becomes Ciphertext which becomes two polynomials. Evaluation: It is the stage where we really write a program. Like if there is a algorithm in the HE. We can write it down in HE and happens in evaluation. It is just a computation on a secure data. Decryption: After the computation is done, we decrypt the data. SIMD Computation: A single instruction multiple datum, when you issue a single instruction or operation it applies to all the data independently. It is called as a single instruction multiple data. We use that with homomorphic Encryption. NOTATIONS PRELIMINARIES: f - The information file to be stored. A - The dispersal matrix, which indicates a collection n= m + k vectors.
  • 4. G - The encoded file matrix. f key(.) – function ver - A version number Let F = (F1, F2, F3, …. Fm) and Fi = (f1i, f2i…... fli) T ( I ∈ {1, . . . , m}). Here T denotes that every Fi is represented as a column vector, and data vector size denoted l in blocks. Of these blocks are elements of GF (2p). The systematic layout with parity vectors is achieved with the data dispersal matrix A, derived from a matrix derived from a β2m- 1 … βmm-1 … βm+1m-1 βnm-1 where βj (j ∈ {1, . . ., n}) are same elements that are chosen randomly from GF (2p). After a series of basic row transformations then the matrix is often written as: 1 0 . . . 0 P11 P12 . . .P1k 0 1 . . . 0 P21 P22 . . . Pmk A = 0 0 . . . 1 Pm1 Pm2 . . . Pmk By multiplying F by A, the user obtains the encoded file is: G = F.A = (G (1), G(2),..., G(m), G(m+1), . . ., G(n)) = (F1, F2, . . ., Fm, G(m+1), . . ., G(n)), Where G(j) = (g1(j), g2(j), . . ., gl(j)) T (j ∈ {1..., n}). It is noticed and also the multiplication then reproduces the information file vectors of F and also the remaining part (G(m+1), . . ., G(n)) are k parity vectors generated which are supported on F. Algorithm 1 Token Precomputation 1: procedure 2: Select parameters l, n and performance f, φ; 3: Select the amount t of tokens; 4: Select the amount r of index per confirmation; 5: produce pass key Kprp and challenge key kchal; 6: for the vectors G(j), j ← 1, n, do 7: for round i← 1, t d 8: Derive αi = fkchal and kprp from Kprp 9: compute 10 ends for 11: end for 12: store all the vis locally 13: end procedure. FUTURE WORK: Cloud Computing is in continual development, while people are enjoying the numerous benefits that cloud computing brings, security in clouds may be a key challenge. • Much vulnerability in clouds still exists and hackers still proceed to exploit these security holes. • During this paper I have examined that the security and safety vulnerabilities in clouds from three perspectives), included related real-world exploits, and introduced countermeasures to those security breaches. • Within the future, further efforts in studying cloud security risks and also the countermeasures to cloud security breaches must continue. CONCLUSION: In this paper, I have examined the issues and concern with security in cloud computing. As we rely on erasing and correcting the code in the file that support the redundancy of the vectors using the Homomorphic Encryption. The fact is that the security and the privacy suggest that the student’s intention to use the cloud services positively related to their privacy perception. REFERENCES:
  • 5. 1. Book By: K. D. Bowers, A. Jules, and A. Opera, “High-availability & Integrity for Cloud Storage” 2. Algorithm from academia- Research on Cloud Computing. 3. From You Tube (https://www.youtube.com/watch ?v=SEBdYXxijSo).