In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid
computing, server client computing. Cloud computing describes recent developments in many existing IT
technologies and separates application and information resources from the underlying infrastructure.
Cloud computing security is an important aspect of quality of service from cloud service providers.
Security concerns arise as soon as one begins to run applications beyond the designated firewall and move
closer towards the public domain. In violation of security in any component in the cloud can be disaster for
the organization (the customer) as well as for the provider. In this paper, we propose a cloud security
model and security framework that identifies security challenges in cloud computing.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling of tool produced output. The algorithm is going to make use of after comparing the existing tools efficiency, the throughput time, output format for reusable input and mainly the resource’s consumption. In this paper we are going to study the existing methodology in application and system pen testing, automation tool’s efficiency over growing technology and their behaviour study on unintended platform assignment. Nitin | Dr. Lakshmi J. V. N "Systematic Review: Automation in Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41315.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41315/systematic-review-automation-in-cyber-security/nitin
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Efficient Detection Of Selfish Node In Manet Using A Colloborative WatchdogIJERA Editor
Mobile ad-hoc networks(MANET) are collected many number of nodes.In a mobile ad-hoc network(MANET)
undertakes that all the mobile nodes unitewillingly in order to work accurately.This is a cost –intensive action
for the collaboration and particular nodes can decline to cooperate then it will prominent to a selfish node
behaviour.Thus, it will utterly affect the global network performance.The watchdogs are a well-known device
used for identifying a selfish node.Theprocedure performed by watchdogs can fail,generating false positives
and false negatives this may convince to wrong operation.Whenidentifying selfish node trusting on local
watchdogs only can prime to poor performance,in terms of precision and speed.Thus we propose collaborative
contact based watchdog(COCOWA) as a collaborative method based on the dispersion of selfish nodes
responsiveness when a contact occurs,so the evidence will quickly circulated about selfish nodes. As shown in
the paper,whenidentifying a selfish nodes this collaborative approach decreases the time and rises the precision
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
There are many researchers who have studied the relevance feedback in the literature of content based image
retrieval (CBIR) community, but none of CBIR search engines support it because of scalability, effectiveness
and efficiency issues. In this, we had implemented an integrated relevance feedback for retrieving of web
images. Here, we had concentrated on integration of both textual features (TF) and visual features (VF) based
relevance feedback (RF), simultaneously we also tested them individually. The TFRF employs and effective
search result clustering (SRC) algorithm to get salient phrases. Then a new user interface (UI) is proposed to
support RF. Experimental results show that the proposed algorithm is scalable, effective and accurated
Climatic variability and spatial distribution of herbaceous fodders in the Su...IJERA Editor
This study focused on future spatial distributions of Andropogon gayanus, Loxodera ledermanii and Alysicarpus
ovalifolius regarding bioclimatic variables in the Sudanian zone of Benin, particularly in the W Biosphere
Reserve (WBR). These species were selected according to their importance for animals feed and the
intensification of exploitation pressure induced change in their natural spatial distribution. Twenty (20)
bioclimatic variables were tested and variables with high auto-correlation values were eliminated. Then, we
retained seven climatic variables for the model. A MaxEnt (Maximum Entropy) method was used to identify all
climatic factors which determined the spatial distribution of the three species. Spatial distribution showed for
Andropogon gayanus, a regression of high area distribution in detriment of low and moderate areas. The same
trend was observed for Loxodera ledermannii spatial distribution. For Alysicarpus ovalifolius, currently area
with moderate and low distribution were the most represented but map showed in 2050 that area with high
distribution increased. We can deduce that without bioclimatic variables, others factors such as: biotic
interactions, dispersion constraints, anthropic pressure, human activities and another historic factor determined
spatial distribution of species. Modeling techniques that require only presence data are therefore extremely
valuable.
Micro Extended[X] Enterprises & An Ea Framework Best Suited For Them.IJERA Editor
“SMiXE’s – Small & Micro Extended Enterprises”, in automobile industry, though referred as Small & Micro,
but forms a bulk or a huge base of the automobile Cluster/ Pyramid (see Fig 1 below) in terms of people
employed, work done by them in tot up. It compliments the auto industry in absorbing the cost pressure and at
the same time facilitates the auto industry in segregating the less efficient routine as well as menial work
towards the bottom of the pyramid. Freeing the OEM to focus on their core activities. By their very “Nature &
Need”, SMiXE have to be very “Agile, Cost Competitive and Adaptive” by their “Nature”, as all OEM’s
(Global & Local) are being forced to adapt new, improved, environment friendly and fuel efficient standards.
The environment in which they (SMiXE) exist and to the very market (“Need”) that they cater is very dynamic.
Keeping the above mentioned points and the constraints mentioned below, in this paper we will be evaluating
the best suited EA framework which will enable us in providing a viable EA solution for SMiXE’s.
Framework for Bridges Maintenance in EgyptIJERA Editor
The traditional approaches for bridges maintenance is proven to be inefficient as they lead to random way of
spending maintenance budget and deteriorating bridge conditions. In many cases, maintenance activities are
performed due to user complaints. The objective of this paper is to develop a practical and reliable framework to
manage the maintenance and repair activities of Bridges network in Egypt considering performance and budget
limits. The model solves an optimization problem that maximizes the average condition of the network given the
limited budget using Genetic Algorithm (GA).
The main tasks of the system are bridge inventory, condition assessment, deterioration using markov model, and
maintenance optimization. The developed model takes into account multiple parameters including serviceability
requirements, budget allocation, element importance on structural safety and serviceability, bridge impact on
network, and traffic. A questionnaire is conducted to complete the research scope. The proposed model is
implemented in software, which provides a friendly user interface. The results of the framework are multi – year
maintenance plan for the entire network for up to five years. A case study is presented for validating and testing
the model with Data collected from “General Authority for Roads, Bridges and Land Transport” in Egypt.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid
computing, server client computing. Cloud computing describes recent developments in many existing IT
technologies and separates application and information resources from the underlying infrastructure.
Cloud computing security is an important aspect of quality of service from cloud service providers.
Security concerns arise as soon as one begins to run applications beyond the designated firewall and move
closer towards the public domain. In violation of security in any component in the cloud can be disaster for
the organization (the customer) as well as for the provider. In this paper, we propose a cloud security
model and security framework that identifies security challenges in cloud computing.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling of tool produced output. The algorithm is going to make use of after comparing the existing tools efficiency, the throughput time, output format for reusable input and mainly the resource’s consumption. In this paper we are going to study the existing methodology in application and system pen testing, automation tool’s efficiency over growing technology and their behaviour study on unintended platform assignment. Nitin | Dr. Lakshmi J. V. N "Systematic Review: Automation in Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41315.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41315/systematic-review-automation-in-cyber-security/nitin
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Efficient Detection Of Selfish Node In Manet Using A Colloborative WatchdogIJERA Editor
Mobile ad-hoc networks(MANET) are collected many number of nodes.In a mobile ad-hoc network(MANET)
undertakes that all the mobile nodes unitewillingly in order to work accurately.This is a cost –intensive action
for the collaboration and particular nodes can decline to cooperate then it will prominent to a selfish node
behaviour.Thus, it will utterly affect the global network performance.The watchdogs are a well-known device
used for identifying a selfish node.Theprocedure performed by watchdogs can fail,generating false positives
and false negatives this may convince to wrong operation.Whenidentifying selfish node trusting on local
watchdogs only can prime to poor performance,in terms of precision and speed.Thus we propose collaborative
contact based watchdog(COCOWA) as a collaborative method based on the dispersion of selfish nodes
responsiveness when a contact occurs,so the evidence will quickly circulated about selfish nodes. As shown in
the paper,whenidentifying a selfish nodes this collaborative approach decreases the time and rises the precision
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
There are many researchers who have studied the relevance feedback in the literature of content based image
retrieval (CBIR) community, but none of CBIR search engines support it because of scalability, effectiveness
and efficiency issues. In this, we had implemented an integrated relevance feedback for retrieving of web
images. Here, we had concentrated on integration of both textual features (TF) and visual features (VF) based
relevance feedback (RF), simultaneously we also tested them individually. The TFRF employs and effective
search result clustering (SRC) algorithm to get salient phrases. Then a new user interface (UI) is proposed to
support RF. Experimental results show that the proposed algorithm is scalable, effective and accurated
Climatic variability and spatial distribution of herbaceous fodders in the Su...IJERA Editor
This study focused on future spatial distributions of Andropogon gayanus, Loxodera ledermanii and Alysicarpus
ovalifolius regarding bioclimatic variables in the Sudanian zone of Benin, particularly in the W Biosphere
Reserve (WBR). These species were selected according to their importance for animals feed and the
intensification of exploitation pressure induced change in their natural spatial distribution. Twenty (20)
bioclimatic variables were tested and variables with high auto-correlation values were eliminated. Then, we
retained seven climatic variables for the model. A MaxEnt (Maximum Entropy) method was used to identify all
climatic factors which determined the spatial distribution of the three species. Spatial distribution showed for
Andropogon gayanus, a regression of high area distribution in detriment of low and moderate areas. The same
trend was observed for Loxodera ledermannii spatial distribution. For Alysicarpus ovalifolius, currently area
with moderate and low distribution were the most represented but map showed in 2050 that area with high
distribution increased. We can deduce that without bioclimatic variables, others factors such as: biotic
interactions, dispersion constraints, anthropic pressure, human activities and another historic factor determined
spatial distribution of species. Modeling techniques that require only presence data are therefore extremely
valuable.
Micro Extended[X] Enterprises & An Ea Framework Best Suited For Them.IJERA Editor
“SMiXE’s – Small & Micro Extended Enterprises”, in automobile industry, though referred as Small & Micro,
but forms a bulk or a huge base of the automobile Cluster/ Pyramid (see Fig 1 below) in terms of people
employed, work done by them in tot up. It compliments the auto industry in absorbing the cost pressure and at
the same time facilitates the auto industry in segregating the less efficient routine as well as menial work
towards the bottom of the pyramid. Freeing the OEM to focus on their core activities. By their very “Nature &
Need”, SMiXE have to be very “Agile, Cost Competitive and Adaptive” by their “Nature”, as all OEM’s
(Global & Local) are being forced to adapt new, improved, environment friendly and fuel efficient standards.
The environment in which they (SMiXE) exist and to the very market (“Need”) that they cater is very dynamic.
Keeping the above mentioned points and the constraints mentioned below, in this paper we will be evaluating
the best suited EA framework which will enable us in providing a viable EA solution for SMiXE’s.
Framework for Bridges Maintenance in EgyptIJERA Editor
The traditional approaches for bridges maintenance is proven to be inefficient as they lead to random way of
spending maintenance budget and deteriorating bridge conditions. In many cases, maintenance activities are
performed due to user complaints. The objective of this paper is to develop a practical and reliable framework to
manage the maintenance and repair activities of Bridges network in Egypt considering performance and budget
limits. The model solves an optimization problem that maximizes the average condition of the network given the
limited budget using Genetic Algorithm (GA).
The main tasks of the system are bridge inventory, condition assessment, deterioration using markov model, and
maintenance optimization. The developed model takes into account multiple parameters including serviceability
requirements, budget allocation, element importance on structural safety and serviceability, bridge impact on
network, and traffic. A questionnaire is conducted to complete the research scope. The proposed model is
implemented in software, which provides a friendly user interface. The results of the framework are multi – year
maintenance plan for the entire network for up to five years. A case study is presented for validating and testing
the model with Data collected from “General Authority for Roads, Bridges and Land Transport” in Egypt.
Design and Experimentation of Collector based Solar Dryer with Recirculation ...IJERA Editor
Sun drying system is very common method of preserving agricultural product. Solar energy is used for heating
of air and to dry food substance. In open sun drying food is unprotected from rain, wind-borne dirt and dust,
infestation by insects, rodents and other animal. This process is practically attractive and environmentally sound.
Shell life of agricultural product is improve by drying. This paper present design and construction of active solar
dryer with recirculation technique. It consists of solar collector, drying chamber with netted trays and
recirculation arrangement. Air is allowed through inlet and it is heated up in collector. Then it is circulated in
drying chamber where it is utilize for drying. The design based on geographical location Wardha and
meteorological data were obtained for proper design specification. Locally available materials were used for
construction such as polyurethane glass, mild steel metal sheet, plywood sheet and insulating material.
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud provider must
verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will
present in an unauthorized place (e.g., on the internet or someone’s laptop). In this paper, we propose Division
and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively
approaches the security and performance issues. In DROPS methodology, we have to select the file and then
store the particular file in the cloud account. In order to provide security we are going to implement DROPS
concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments
are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate
each fragments for one time in cloud.
A Framework for Predicate Based Access Control Policies in Infrastructure as ...IJERA Editor
Infrastructure as a Service (IaaS) is the service with which IT of enterprises integrated for on-demand services.
Different deployment models of cloud further makes it flexible so as to meet the requirements of users. As the
customers’ policies are not same, Cloud Service Provider (CSP) needs a flexible architecture to accommodate
the varied requirements of customers with respect to access control. The existing access control models such as
Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) have limitations. The
combination of RBAC and ABAC also could not offer fine grained access control. We also studied the RBAC
model offered by Open Stack and came to know its limitations in catering to diversified needs of customers. The
One Size Fits for All policy cannot provide flexible access control due to the aforementioned reason. Therefore
a more flexible access control model is required. In this paper we proposed a framework with Predicate Based
Access Control (PBAC) in general and then implemented it in Open Stack. Our empirical results revealed that
the proposed framework can improve the granularity with fine grained access control mechanism. Though our
framework is at primitive stage, it shows significant step forward in access control policies for IaaS clouds.
Periodic material-based vibration isolation for satellitesIJERA Editor
The vibration environment of a satellite is very severe during launch. Isolating the satellitevibrations during
launch will significantly enhance reliability and lifespan, and reduce the weight of satellite structure and
manufacturing cost. Guided by the recent advances in solid-state physics research, a new type of satellite
vibration isolator is proposed by usingperiodic material that is hence called periodic isolator. The periodic
isolator possesses a unique dynamic property, i.e., frequency band gaps. External vibrations with frequencies
falling in the frequency band gaps of the periodic isolator are to be isolated. Using the elastodynamics and the
Bloch-Floquet theorem, the frequency band gaps of periodic isolators are determined. A parametric study is
conducted to provide guidelines for the design of periodic isolators. Based on these analytical results, a finite
element model of a micro-satellite with a set of designed periodic isolators is built to show the feasibility of
vibration isolation. The periodic isolator is found to be a multi-directional isolator that provides vibration
isolation in the three directions.
Calculating Wind Farm Production in Al-Shihabi (South Of Iraq) Using WASPIJERA Editor
The Wind Turbine farms are becoming popular in the renewable energy world. In this research, the Wind Atlas
Analysis and Application Program (WAsP) has been used to estimate wind power density in Al-Shihabi (south
of Iraq). All statistical operations on data series are obtained from Field data collected from the wind
measurement towers which installed by the Science and Technology Ministry at Kut city south of IRAQ at three
heights (10, 30, 50 m). The wind turbine selected for this study to be installed in the wind farm are Bonus-
300kw, 600kw The Annual Energy Production (AEP) has been calculate which varies between (746.990 -
759.446 MWH) at 30 m and it s varies between produced AEP (1.576 - 1.600 GWh) at 50 m ,this site classified
as ( class-1).
Analysis of Waste Water Treatment in Kaduna Refining and Petrochemicals Corpo...IJERA Editor
Scientific data and results have to be accurate, precise and reliable and are subject to ever increasing scrutiny by
regulators in industry, the environment and medicine, in validation and also in research and development. Given
our numerous environmental problems, the need for accurate, precise and reliable results cannot be
overemphasized in environmental pollution control. This research was undertaken by visiting the analytical
laboratory involved in environmental pollution control in Nigerian National Petroleum Corporation (NNPC)
Kaduna which is known as Kaduna Refining and Petrochemicals (KRPC). Results were taken within a span of
three years at different times of the year. End of month results were also taken for the two receiving rivers
(River Kaduna & Romi River) and effluent from the refinery. The waste water was analyzed using available
instruments in the Refinery such as PH meter, Dissolved Oxygen (DO) Meter, Conductivity Meter, Gas
chromatography, burette, pipette, Double beam Spectrometer, and Thermometer. The results showed that many
parameters meet the standard of limit set by the Nigerian Standard Organization but there are many vital
parameters whose limits are very low but not measured for lack of instruments. The point of concern here
becomes the availability of suitable analytical instruments for quality control in the waste water treatment.
From Hearing Aids, Prostheses and Cochlear Implants to "Bionic" Feedback Phon...IJERA Editor
In Otorhinolaryngological medical practice therapeutic devices are used that are highly invasive and immersive.
For aural and oral communication these could be hearing aids, prosthetics, implants or radio-electronic
appliances that build up a bionic environment with apparent tendencies for virtualization. The popularization of
such devices promotes the extensive use of Brain Computer Interfaces to both the scientific community and the
consumer market. The use of bionic devices clinched with synapses of the nerves does not merely mingle input
activity to brain activity, but also it provides a virtual channel for augmenting and manipulating speech
communication, language communication and even further musical communication. The effects of bionic aural
and oral communication when learning practices for the impaired in hearing are applied is encountered in terms
of ability for speech perception and linguistic competence.
A Hybrid method of face detection based on Feature Extraction using PIFR and ...IJERA Editor
In this paper we proposed a face detection method based on feature selection and feature optimization. Now in
current research trend of biometric security used the process of feature optimization for better improvement of
face detection technique. Basically our face consists of three types of feature such as skin color, texture and
shape and size of face. The most important feature of face is skin color and texture of face. In this detection
technique used texture feature of face image. For the texture extraction of image face used partial feature
extraction function, these function is most promising shape feature analysis. For the selection of feature and
optimization of feature used multi-objective TLBO. TLBO algorithm is population based searching technique
and defines two constraints function for the process of selection and optimization. The proposed algorithm of
face detection based on feature selection and feature optimization process. Initially used face image data base
and passes through partial feature extractor function and these transform function gives a texture feature of face
image. For the evaluation of performance our proposed algorithm implemented in MATLAB 7.8.0 software and
face image used provided by Google face image database. For numerical analysis of result used hit and miss
ratio. Our empirical evaluation of result shows better prediction result in compression of PIFR method of face
detection.
The Case Study of an Early Warning Models for the Telecare Patients in TaiwanIJERA Editor
To propose a practical early warning analysis model for the telecare patients, this study applied data mining
technology as a basis to investigate the classification of patient groups by disease severity and incidence using
data contained in a telecare database regarding the number of a clinic. The ultimate purpose of this study was to
provide a new direction for telecare system planning and developing strategies.
The subject of this case study was a private clinic which is providing telecare system to patients in Taiwan, and
we used three data mining techniques including discriminant analysis, logistic regression and artificial neural
network to construct an early warning analysis model based on several factors such as: Demographic variables,
pathological signals, health management index, diagnosis and treatment records, emergency notification signal.
According the results, the telecare system can build stronger physician-patient relationship in advance through
previously paying attention to patients’ physiological conditions, reminding them to do self-management, even
taking them to the hospital for observation. A comparison of discriminative rates showed that the artificial neural
network model had the highest overall correct classification rate, 85.52%, and thus is a tool worthy of
recommendation
An Overview of the Entrepreneurial Process in Distance Education (DE) of UNESAIJERA Editor
This article presents a panoramic view of entrepreneurship of Distance Education (DE) at UniversityEstácio de
Sá (UNESA) of Brazil. It is based on field research, interviews and bibliographical research on the processes of
teaching and learning in Distance Education (DE), especially those used in academic education. The aim of this
article is to show the existence of the entrepreneur process in the Distance Education of University Estácio de Sá
(DE-UNESA). To this end, the article takes a qualitative approach denoting interpretative grounds and connects
the entrepreneurial process with the DE-UNESA. It presents a graphic illustrating the entrepreneurial process
model by adding the factor-educator or educational. In addition, describes information about DE-UNESA
backdrop developer of a continuous educational entrepreneurship.
Experimental Study on Two-Phase Flow in Horizontal Rectangular Minichannel wi...IJERA Editor
An experimental study was conducted to investigate two-phase air-water flow characteristics, in horizontal
rectangular minichannel with Y-junction. The width (W), the height (H) and the hydraulic diameter (DH) of the
rectangular cross section for the upstream side of the junction are 4.60 mm, 2.50 mm and 3.24 mm, while those
for the downstream side are 2.36 mm, 2.50 mm and 2.43 mm. The entire test section was machined from
transparent acrylic block, so that the flow structure could be visualized. Liquid single-phase and air-liquid twophase
flow experiments were conducted at room temperature. The flow pattern, the bubble velocity, the bubble
length, and the void fraction were measured with a high-speed video camera. Pressure profile upstream and
downstream from the junction was also measured for the respective flows, and the pressure loss due to the
contraction at the junction was determined from the pressure profiles. Two flow patterns, i.e., slug and annular
flows, were observed in the fully-developed region apart from the junction. In the analysis, the frictional pressure
drop data, the two-phase frictional multiplier data, bubble velocity data, bubble length data and void fraction data
were compared with calculations by some correlations in literatures. In addition, new pressure loss coefficient
correlations for the pressure drop at the junction has been proposed. Results of such experiment and analysis are
described in the present paper
Effect of Grain Size and Reaction Time in Characterisation of Aggregates for ...IJERA Editor
Concrete can deteriorate as a result of alkali aggregate reaction, an interaction between alkalis present in
alkaline pore solution originating from the Portland cement and reactive minerals in certain types of aggregates.
Potential reactivity of aggregates with regard to alkalis present in concrete mix can be determined by Mortar Bar
method, Chemical Method and Petrographic analysis. Of these the chemical method though is quick and does
not require a large quantity of material for testing yet have its own inherent limitations. It does not ensure
completion of reaction as the observations are limited to 24hour only and also does not assess the effect of
varying the combination of coarse and fine aggregates. A study on chemical method by allowing the reaction for
a prolonged time up to 96 hours and also on different grain size ranged matrix was carried at Central Soil and
Materials Research Station, New Delhi. Simultaneously the test results of the modified method are compared to
the existing Mortar Bar method, Chemical Method and Petrographic analysis The outcome of the studies clearly
reflects that the grain size play an important role in the reaction, the reaction time has a demarked impact on
reactivity, in the cases having a high value of silica release the choice of reduction in alkalinity as an indicator
of degree of reaction is not reliable, instead measuring remaining Na2O concentration in Sodium hydroxide
solution after the reaction seems to be much more meaningful in justifying the silica release.
A case study on Machine scheduling and sequencing using Meta heuristicsIJERA Editor
Modern manufacturing systems are constantly increasing in complexity and become more agile in nature such
system has become more crucial to check feasibility of machine scheduling and sequencing because effective
scheduling and sequencing can yield increase in productivity due to maximum utilization of available resources
but when number of machine increases traditional scheduling methods e.g. Johnson‟s ,rule is becomes in
effective Due to the limitations involved in exhaustive enumeration, for such problems meta-heuristics has
become greater choice for solving NP hard problems because of their multi solution and strong neighbourhood
search capability in a reasonable time.
A Critical View on Pedagogical Dimension of Architectural Education in IndiaIJERA Editor
The built environment is becoming more complex in terms of its quality and structure. In such circumstances
architectural education pedagogical strategies has to be modified to address social, political, economical and
environmental issues and challenges. Innovative interdisciplinary strategies in architecture education have to be
organized in a way which leads to better architecture and urban environments. Pure theoretical approaches are to
be related to practice which can be done with pedagogy comprising real-life examples in respect to new models
and collaboration between architecture education and non-academic partners. This paper discusses the status of
current architectural education in India.It examine the student‟s perception regarding teaching and learning in
schools of architecture from the state of Maharashtra It is aimed to highlight the need for paradigm shift in
pedagogy in schools imparting architectural education in India to enhance learning in architecture education.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Proposed system for data security in distributed computing in using triple d...IJECEIAES
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user’s personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Similar to E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Challenges (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
block diagram and signal flow graph representation
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Challenges
1. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 63 | P a g e
E-Mail Systems In Cloud Computing Environment Privacy,Trust
And Security Challenges
Maha Attia1
, Mona Nasr2
, Ahmed Kassem3
1
Engineering Institute, CIC Deputed of Faculty of Computers & Information, Helwan Univ.
2
Faculty of Computers & Information, Helwan Univ.
3
Faculty of computers & Information, Helwan Univ.
ABSTRACT
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile.
Keywords: Cloud Computing, Software as a Service, Cloud Security, Mail Security, Mail System,
Cryptography, Authenticating.
I. INTRODUCTION
The cloud computing is a common
technology in developing software, it gains a lot of
popularity as it has many benefits. Cloud can enhance
collaboration, agility, scaling, and provision of cost
reduction through optimized and efficient
computing.Cloud computing is a model for enabling
timely, on-demand network access to a shared pool of
configurable computing resources and services that
can be rapidly provisioned and released with minimal
management effort or service provider interaction.
Cloud computing as explains the
development of many existing technologies and
approaches to computing into something different.
Cloud distributes application and information
resources from the underlying infrastructure, and the
mechanisms used to provide the service over the
internet ,the capability provided to the user is to use
the provider's applications operating on a cloud
infrastructure. The applications are accessible from
multiple client devices through a thin client interface
such as a web browser.
Costs Reduction is one of the advantages
when using cloud computing. Cloud Computing
decrees hardware, implementation, operation and
software licensing costs, that means lower capital and
operating costs. This definite advantage for start-out
businesses. Also, charges based on used resources
only.
Mobility makes the ability to access data and
system any time any anywhere, using PC, PDA,
mobile device and internet browser. Scalability of
cloud computing provides the advantage of the easy
scalability of increasing or decreasing the size of
one’s service according to the exact requirements.
Technology in cloud computing allows getting the
value of access to shared IT resources benefit from
advanced technologies that would otherwise be
unaffordable.
Collaboration is an additional advantage of
cloud computing multiple users can collaborate
easily. This makes it possible to collaborate with
members in different locations and in different time
zones. Data Reliability in cloud computing makes
data loss prevention method to avoid the issue of
destroying your valuable data on a personal computer
for hardware or software loss reasons, Also, the
ability to have a value of disaster recovery and
backup systems.
Cloud Computing enables Business Agility
as it rapidly solves problems using IT resources
without long-term commitment and pattern of agility
at a much lower cost. Performance is increased
because of using system updates, latest version
availability, and reliable high-performance hardware
systems
In cloud computing as a service, a user does
not manage or control the underlying cloud
infrastructure containing network, servers, operating
systems, storage, or even individual application
capabilities, with the possible exception of limited
user-specific application configuration settings.
Security is one of the key areas and is most
often mentioned by corporate decision-makers as they
consider cloud computing for the future. Figure 1
displays the top cloud computing security concerns
.Specifically, safety of data during transfer when
stored as reviling of sensitive data my occurs. The
valid security architecture in place will ensure that
data is kept completely separate from the encryption
keys that enable access. Security rules in cloud
computing for the most part, not different than
OPEN ACCESSRESEARCH ARTICLE
2. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 64 | P a g e
security rules in any IT environment. Because of the
cloud service models applied, the operational models,
and the technologies used to enable cloud services,
cloud computing present different risks to an
organization than traditional IT solutions.
Figure 1: The Top Cloud Computing Concerns [1]
Cloud computing is about appropriately
losing control while maintaining accountability even
if the operational responsibility falls upon one or
more third parties. An organization's security posture
described by the maturity, effectiveness and
completeness of the risk-adjusted security controls
executed. Certain controls executed in one or more
layers ranging from the facilities to the network
infrastructure, IT systems, and all the way to the
information and applications. Additionally, controls
implemented at the people and process levels, such as
separation of duties and change management,
respectively. In this research is a model for e-mail
security is proposed. The model is based on web
service and cloud computing. This paper is organized
as the follows; Section two overviews Cloud
Computing Security; Section three reviews the related
work; Section four demonstrate the proposed Secure
Mail using Cloud Software as a Service (SMCSaaS)
model; Section five views operation comparison
between model and traditional e- mail systems;
Section six discusses the conclusion.
II. CLOUD COMPUTING SECURITY
Cloud Computing Security Challenges
The ENISA 2012 Cloud Risk Assessment
considers security benefits offered by the Cloud
computing model. These have to be weighed against
the risks that this model brings with it. Although they
are not strictly necessary for assessing the risks, they
have been kept in this document to put the risks into
perspective.
Security measures increase cost-benefit
analysis when deployed on a larger scale. For the
same amount of investment in security gains
excellent protection. That includes all types of the
defensive standard such as filtering; patch
management, hardening of virtual machine instances
and hypervisors, etc. Other benefits of scale include
different locations, edge networks timeliness of
response, to incidents and risk management.
Security is a priority attention for many
cloud customers; many of them will make a decision
based on the status for confidentiality, integrity,
flexibility and the security services offered by the
cloud provider. That is a strong driver for cloud
providers to improve security practices.
Rapid and custom scaling of resources: the
ability of the cloud provider to dynamically allocate
resources for filtering, traffic management,
authentication, encryption, etc., to defensive
measures has obvious advantages for resilience.
Benefits of resource consolidation: Although
the consolidation of resources surely has an impact on
security it has the advantage of physical parameters
and physical access control and the easier and
cheaper application of many security-related
processes.
III. RELATED WORK
This part explains the traditional key
management architectures used in mail security.
3.1 Symmetric Key Cryptography
Cryptography Architecture [2] uses the same
key to encrypt data. Symmetric key use same key for
encryption and decryption. Key manager generates
the unique key for every message the key stored in a
database with the list of recipient. When the message
received the recipient, authenticate to the Key
Manager to retrieve the key from the database, the
recipient address matched with authorized recipients
list. If everything checks out, after validation the
decryption key sent to the recipient to decrypt the
message.
3.2 Asymmetric Key Cryptography
Asymmetric cryptography is the
cryptographic system that uses pairs of keys; public
keys can be distributed to requesters paired with
private keys which are known only to the owner.
One of the popular cryptographic systems
used to secure email is Public Key Infrastructures
(PKI)introduced by Diffie and Hellman in 1976[3].
The asymmetric cryptography, which
contains a pair of keys to allow secure
communication between parties, the trusted party
require to verify public key, PKI authenticating all
public key. PKI systems trust user’s key instead of
trusting users, the traditional PKI system, all entities
in the system trust a central party called the
Certification Authority (CA). CA guarantees public
and private keys belong to the claimed owner.
Traditional email systems using Public Key
Infrastructure (PKI) for Encryption and Digital
3. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 65 | P a g e
Signature on message communications flow when
sending or receiving emails, the following diagram
show digital signature operation
Public Key Infrastructure must share the
private key between users before secure
communications.
Figure 2: PKI Entity and Operations [4]
registration authority server then receive
signed certificates from Certificate Authority Server
this process consumes time and requires expensive
infrastructure. Online server requirements certificate
leaked and complexly in exchanging keys and
complex system management described in the
following Mail Send and revive Flow Process.
The PKI Mail Send Flow Process New
Email Message in Figure 3 that merged encryption
mechanism using the following sequence
Receive Sender Information Identification
Receive Recipient Information Identification
Signing Message using Digital Signature and
Sender Identified Information
Email Message Digitally Signed
Encrypting Email Message using Encryption
Mechanism and Recipient Identified Information
Output Process Digitally Signed and Encrypted
Message.
Send Message
Figure 3: Mail Send Flow
The PKI Mail Receive Flow Process in
figure 4 that merged encryption mechanism using the
following sequence
Receive Encrypted Email Message
Receive Recipient Information Identification
Decrypting Email Message using Recipient
Identified Information
Email Message Decrypted
Decrypted Message.
Digital signature was received Inside
Unencrypted Message.
Receive Sender Information Identification
Signing Message using Digital Signature and
Sender Identified Information
Identify Email Message Digital Signature and
Recipient Information Identification
Message Validation
Receive Message to Recipients Mailbox
Receive
Message
Recipients
Identification
Recipients
Identification
Verify
Digital
Signature
Message
Validated
Encrypt
Received
Message
Message
Decryption
Decrypted
Message
Receive
Digital
Signature
Sender
Identification
Figure 4: Mail Receive Flow
Pretty Good Privacy PGP
Pretty Good Privacy or PGP [5] it was
developed by Philip R. Zimmermann in 1991, has
used to encrypt email over the Internet, and
authenticate email with digital signatures and
encrypted attached files. PGP using public key types
Rivest Shamir Adleman (RSA) and Diffie-Hellman,
RSA uses the MD5 algorithm to generate a hash key.
Diffie-Hellman uses the SHA-1 algorithm to
generate hash code. PGP using the public key known
to all users this key used to encrypt email and private
key uses to decrypt the message, Encrypted message,
and the short key sent to the receiver who have a
private key to decrypt the short key and then uses that
key to decrypt the message.
Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) [6] use
the assumption that finding the discrete algorithm of
random elliptic curve parts concerning a publicly
known base point is unfeasible. The common types of
ECC are Curve Diffie-Hellman (ECDH), Edwards
4. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 66 | P a g e
curve Digital Signature Algorithm (EdDSA) and
Elliptic Curve Digital Signature Algorithm (ECDSA).
The ECC security advantage is that comparable
security to a 3072-bit RSA with a 256-bit ECC. That
required decreasing required computing power to
encrypt and decrypt messages with ECC and that
faster than standard RSA message encryption.
Identity-Based Encryption
Identity-based public key (IBE) [7]proposed
by Adi Shamir on 1984. The purpose of IBE is to
reduce the cost of public key certificate management.
Instead of generating and using public and private
key pair in a public key encryption system like RSA,
the idea of using a username or email address as a
public key, with the identical private key is generated
by Private Key Generator (PKG). Since users public
key is based on some publically available
information, which uniquely represents the user. An
identity-based encryption system can do away with
public key directory maintenance and certificate
management.
Traditional authentication Mechanism
One factor authentication almost using
username and password as the credential for the user,
figure 5 view the authentication process.
Figure 5: One factor Authentication Process
IV. SECURE MAIL USING CLOUD
SOFTWARE AS A SERVICE
(SMCSAAS).
This research proposed Secure Mail using
Cloud Software as a Service (SMCSaaS). This model
is different from the traditional Email. SMCSaaS
similar to SaaS model access using web services, as it
requires two essential features encryption and
sophisticated authentication. SMCSaaS is based on
Identity-Based Encryption (IBE) technology and uses
two-factor authentication instead of single-factor
authentication. Mechanisms like passwords are
vulnerable to many security threats, but two-factor
authentication increases the information security as it
uses two authentication tokens during the
authentication process. Tokens are bound together
and required to be authenticate simultaneously.
The first part of SMCSaaS is IBE that
contains private key generator(PKG). Challenges and
issues on exact Public Key Infrastructure (PKI)
scheme are decreasing process cycle and limit
required resources. Email security process that
handles user identity as a public key with the
corresponding private key is generated by Private
Key Generator in both send and receive email
directions is described in Figure 6.
Figure 6: New Model Mail Flow with Private Key
Generator
The IBE Mail Flow Process mechanism uses
the following sequence
User A composes a new email to User B.
The PKG Server generates a secure random key
based on symmetric encryption requests IBE
public key for the recipient and his identity to
encrypt the email.
The encrypted email is sent to an email server as
normal email delivery and stores the message in
the encrypted form.
User B is authenticated by Private Key Generator
(PKG) server to receive the private key to
decrypt email message.
The decryption cannot be perform without
user identity involvement. The second part of
SMCSaaS is using two-factor authentication for email
accounts. Figures 7 views the two-factor
authentication process.
5. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 67 | P a g e
Figure 7: Two-factor authentication with OTP
Process
The first authentication is a regular
authentication for email system. The second
authentication needs preparation, the preparation is
registration of a new device refer to as token device.
Must be registered once to receive One-Time
password (OTP) on token device. The second
authentication is one time usage password sent to the
token device.
V. DISCUSSIONS
The following table views operation
comparison between SMCSaaS and Symmetric Key
Management and PKI components of traditional e-
mail systems.
Criteria Symmetric
Key
Manageme
nt
PKI SMCSaaS
User
Authenticat
ion
Single
factor
authenticati
on
required
Single
factor
authentica
tion
required
Two-factor
authenticati
on required
Encryption Yes, with
online
connection
required
Yes,
without
previous
requireme
nts
Yes,
without
previous
requiremen
ts
Decryption Yes, online
connection
required
Yes,
previous
enrollmen
t required
Yes
Integration
with
infrastructu
re
Requires
decryption
lookup
Very
Complex
Simple, as
it is non
domain
related
certificate.
Scalability Limited Limited, Scalable
complex Easy, as it
requires
limited
number of
servers.
Key
Infrastructu
re
Required
Complex
infrastructu
re
Required
Complex
infrastruct
ure
Simple
infrastructu
re
Key
Repository
Database
Required Require
large
database
Not
required, as
it doesn’t
need
repository
database
Private Key
Transport
Required Not
required
Require
Secure
connection
Computing
Resources
Requireme
nts
Medium High Low, as it
uses short
key
SMCSaaS security analysis.
This section lists common risks and their
countermeasures in SMCSaaS.
Sniffing, Packet sniffing allows attackers to capture
data when transmitted over a network. The
countermeasure is using cryptography mechanism to
prevent an attacker to access the data.
Session Hijacking, is the exploitation of a valid
session to have unauthorized access to information or
system. The countermeasure is encryption of the data
passed between the parties as well as using long
random number or chain as the session key prevent
session hijacking.
Eavesdropping, sniffing on network layer attack by
capturing packets from the network transition and
reading data content to access sensitive and
confidential information. The countermeasure is
cryptography mechanism to prevent an attacker to
access the data.
Man in the Middle, attacker, secretly relays and
possibly alters a direct communication between two
parties. The countermeasure is two-factor
authentication provides additional security controls
by using OTP to prevent attackers from access
information even if user password is known.
Phishing occurs when an attacker fraud the user
credential or account information. The
countermeasure is two-factor authentication OTP.
Password Theft or Discovery, in a case of password
theft. The countermeasure is two-factor
authentication mechanism through e-mail password
and OTP requirements.
Replay Attacks, occurs when attacker hacks the
connection between the server and user and takes the
authenticated information or sharing key and then
6. Maha Attia et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -3) July 2016, pp.63-68
www.ijera.com 68 | P a g e
reconnect to the server with that information. The
countermeasure is OTP password that expires after a
very short time.
Social Engineering Attack, is to manipulate and
fraud users to discover confidential information like
user credential. The countermeasure is two-factor
authentication mechanism as OTP.
Token Theft or Discovery, is physical token loss so
the attacker can access authentication token. The
countermeasure is Token deregistration in two-factor
authentication that provides blocking the physical
token.
Brute force attack, the attacker or malware tries to
access system systematically entering is all possible
characters’ combinations. Of OTP in two factor
authentications.
Dictionary attack, in case if Dictionary attack
identity’s user password the attacker cannot access
system because. Of OTP in two factor
authentications.
VI. CONCLUSION
The proposed SMCSaaS imposes extra
security steps to the traditional e-mail system. The
Model overcome the distribution of PKI over Cloud
multi-tenants. The integration between Private Key
Generator (PKG) and two-factor authentication need
uses one-time password to enhance security. Also,
low technical support team is required as less of
platform resources are needed.
Two-factor authentication dramatically
improves the security of email server and personal
information store. This is an extra layer of email
security server to ensure authentication even if
someone hacks the password. Also, Non repudiation
benefit obtained by using OTP.
Private Key Generator (PKG) solve
confidentiality and integrity security problems by
providing policy-based encryption, client mobility.
Also, short key decreases the requirements for
hardware and computing resources without
compromising security. The reason is that generated
key with length 256-bit ECC provide same security
level of key with length 3072-bit RSA in PKI.
REFERENCES
[1]. Results of International Data Corporation
(IDC) survey ranking security
challenges2010.
[2]. Rahul Kale, Neha Gore, Kavita,
NileshJadhav,SwapnilShinde “ Review
Paper on Two Factor Authentication Using
Mobile Phone” InternationalJournal of
Innovative Research and Studies, Vol.
2,Issue 5, pp. 164 - 170, May 2013.
[3]. Stallings., (2003).Cryptography and
Network Security Principles and Practices,
Prentice-Hall of India PrivateLimited, 3rd
Edn.
[4]. John R. Vacca(2004), Public Key
Infrastructure: Building Trusted
Applications and Web Services: CRC Press.
[5]. J. Callas, L. Donnerhacke, H. Finney, D.
Shaw, and R. Thayer. OpenPGPMessage
Format. RFC 4880 (Proposed Standard),
Nov. 2007. Updated byRFC 5581.
[6]. Fabio Alessandro Locati,OpenStack Cloud
Security,Packt Publishing, July 2015.
[7]. Anthony T.Velte, Toby J. Velte& Robert
Elsenpeter. (2010). Cloud Computing A
Practical Approach, Tata McGraw-Hill
Edition.
[8]. Krutz Ronald, Dean Vines & Russell.
(2010). Cloud Security A Comprehensive
Guide to Secure Cloud Computing: Wiley
Publishing.
[9]. Rittinghouse John &Ransome James.
(2009). Cloud Computing Implementation
Management and Security: CRC Press.
[10]. Stanoevska-Slabeva Katarina, Wozniak
Thomas &RistolSanti. 2009. Grid and Cloud
Computing: A Business Perspective on
Technology and Applications: Springer.
[11]. J. Heiser& M. Nicolett. (2008). Accessing
the Security Risks of Cloud Computing:
Gartner.
[12]. Defense Information Systems Agency
(DISA) Security Technical Implementation
Guides (STIGS),
http://iase.disa.mil/stigs/index.html.
[13]. Reese, George, Cloud Application
Architectures, Sebastopol, California:
O’Reilly Media, 2009.
[14]. Daryl C. Plummer. (2010). Cloud
Computing: Defining and Describing an
Emerging Phenomenon: Gartner.
[15]. Miller & Michael. (2008). Cloud
Computing: Web-Based Applications that
Change the Way You Work and Collaborate
Online: Que.
[16]. Ahson Syed, Ilyas Mohammad. (2010).
Cloud Computing and Software Services
Theory and Techniques: CRC Press.
[17]. Ommeren Erik, Duivestein Sander,
DeVadoss John, Reijnen Clemens
&Gunvaldson Erik. (2009). Collaboration in
the Cloud: How Cross-Boundary
Collaboration Is Transforming Business:
UitgeverijKleineUil.