This document summarizes an encryption technique for securing data in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. It then discusses previous encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. The document proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael cipher to encrypt data before uploading it to cloud servers. It describes implementing AES encryption in two steps: 1) using an authentication channel to verify user identities, and 2) encrypting the data using the AES Rijndael algorithm in 9 to 13 rounds depending on the key size. The AES Rijndael algorithm uses byte substitution, shift rows
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloudijtsrd
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so every time if user wants to modify data, it is necessary to decrypt data. The most used technique for providing security in cloud storage is Homomorphic encryption. In the homomorphic encryption technique, there is no need to decrypt whole data whenever user wants to update data. In the existing system used the mixed homomorphic scheme which reduce noise level in homomorphic encryption technique. The existing system focus on data corruption and data modification but what if system failure and power failure occurs. The user data may be loss in any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code. By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system. Bhargavi Patel ""Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25104.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25104/enhancing-availability-of-data-in-mixed-homomorphic-encryption-in-cloud/bhargavi-patel
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Aes based secured framework for cloud databasesIJARIIT
A Cloud database management system is a distributed database that delivers computing as a service (Caas) instead of
a product. Improving confidentiality of information stored in a cloud database .It is a very important contribution to the cloud
database. Data encryption is the optimum solution for achieving confidentiality. In some normal methods, encrypt the whole
database through some standard encryption algorithm that does not allow in SQL database operations directly on the cloud. This
formal solution affected by workload and cost would make the cloud database service inconvenient. I propose a novel
architecture for adaptive encryption of public cloud database. Adaptive encryption allows any SQL operation over encrypted
data. The novel cloud database architecture that uses adaptive encryption technique with no intermediate servers. This scheme
provides cloud provider with the best level of confidentiality for any database workload. I can determine the encryption and
adaptive encryption cost of data confidentiality from the research point of view. Index Terms Adaptive encryption Technique, AES (Advanced encryption Standard), Metadata.
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...Big Data Spain
This session shows how to secure different Big Data sensitive data items such as log files, metastore databases, control files, config files, data directories or data files for different Big Data technologies.
As Hadoop, MongoDB, Cassandra and other massively distributed Big Data stores grow in popularity, so too does the volume of sensitive regulatory data that gets captured for analysis. Cloudera Navigator Encrypt gives peace of mind, knowing the sensitive information used to run massive-scale queries and analytics is secure. Navigator Encrypt works as a last line of defense for protecting data, by providing a transparent layer between the application and file system and securing information as it gets written to disk, ensuring minimal performance lag in the encryption or decryption process. The solution also includes robust key management and process-based access controls, while simultaneously preventing admins or super users like root from accessing data that they don’t need to see allowing users to store their cryptographic keys separate from the encrypted data.
Session presented at Big Data Spain 2015 Conference
15th Oct 2015
Kinépolis Madrid
http://www.bigdataspain.org
Event promoted by: http://www.paradigmatecnologico.com
Abstract: http://www.bigdataspain.org/program/thu/slot-13.html
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloudijtsrd
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so every time if user wants to modify data, it is necessary to decrypt data. The most used technique for providing security in cloud storage is Homomorphic encryption. In the homomorphic encryption technique, there is no need to decrypt whole data whenever user wants to update data. In the existing system used the mixed homomorphic scheme which reduce noise level in homomorphic encryption technique. The existing system focus on data corruption and data modification but what if system failure and power failure occurs. The user data may be loss in any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code. By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system. Bhargavi Patel ""Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25104.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25104/enhancing-availability-of-data-in-mixed-homomorphic-encryption-in-cloud/bhargavi-patel
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Study on Secure Cryptographic Techniques in Cloudijtsrd
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Aes based secured framework for cloud databasesIJARIIT
A Cloud database management system is a distributed database that delivers computing as a service (Caas) instead of
a product. Improving confidentiality of information stored in a cloud database .It is a very important contribution to the cloud
database. Data encryption is the optimum solution for achieving confidentiality. In some normal methods, encrypt the whole
database through some standard encryption algorithm that does not allow in SQL database operations directly on the cloud. This
formal solution affected by workload and cost would make the cloud database service inconvenient. I propose a novel
architecture for adaptive encryption of public cloud database. Adaptive encryption allows any SQL operation over encrypted
data. The novel cloud database architecture that uses adaptive encryption technique with no intermediate servers. This scheme
provides cloud provider with the best level of confidentiality for any database workload. I can determine the encryption and
adaptive encryption cost of data confidentiality from the research point of view. Index Terms Adaptive encryption Technique, AES (Advanced encryption Standard), Metadata.
Securing Big Data at rest with encryption for Hadoop, Cassandra and MongoDB o...Big Data Spain
This session shows how to secure different Big Data sensitive data items such as log files, metastore databases, control files, config files, data directories or data files for different Big Data technologies.
As Hadoop, MongoDB, Cassandra and other massively distributed Big Data stores grow in popularity, so too does the volume of sensitive regulatory data that gets captured for analysis. Cloudera Navigator Encrypt gives peace of mind, knowing the sensitive information used to run massive-scale queries and analytics is secure. Navigator Encrypt works as a last line of defense for protecting data, by providing a transparent layer between the application and file system and securing information as it gets written to disk, ensuring minimal performance lag in the encryption or decryption process. The solution also includes robust key management and process-based access controls, while simultaneously preventing admins or super users like root from accessing data that they don’t need to see allowing users to store their cryptographic keys separate from the encrypted data.
Session presented at Big Data Spain 2015 Conference
15th Oct 2015
Kinépolis Madrid
http://www.bigdataspain.org
Event promoted by: http://www.paradigmatecnologico.com
Abstract: http://www.bigdataspain.org/program/thu/slot-13.html
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
“Trade-Off between Detection and Resolution of Two Point Objects Under Variou...IOSR Journals
It is a well-experienced fact that whenever one tries to detect a weak object point in the vicinity of an intense point object, viz., a binary star-SIRUS and its companion weak satellite star, there is always loss of resolution of the optical system. In other words, one wants to improve the defectively of the system, there is always a loss of resolution capabilities of the system. Thus, there is a trade-off between Detection and Resolution of optical systems under various imaging situations. In this first paper of discussion of this trade-off, we have derived the Fourier analytical formulation of this problem. This formulation will be used to find out a compatible trade-off between Detection and Resolution in our further publications
Comparative Assessment of Two Thermodynamic Cycles of an aero-derivative Mari...IOSR Journals
Abstract: This paper explores the gas turbine potentials that are fully enhanced by the use of intercooling and
thermal recuperation as an engineering option available in the design of gas turbines and offered for marine
applications. It examines the off-design performance of two different cycle designs of a 25MW aero-derivative
engine by modelling and simulating each of them to operate under conditions other than those of their design
point. The simple cycle model consists of a single-spool dual shaft layout while the advanced model is
represented by an intercooled-recuperated cycle that runs on a dual-spool and is driven through a three shaft
configuration. In each case, the output shaft is coupled to a power turbine through which the propulsion power
may be transmitted to the propeller of the vessel to operate in a virtual marine environment. An off-design
performance simulation of both engines has been conducted in order to investigate and compare the effect of
ambient temperature variation during their part-load operation and particularly when subjected to a variety of
marine operating conditions. The study assesses the techno-economic impact of the complex design of the
advanced cycle over its simple cycle counterpart and demonstrates its potential for improved operating cost
through reduced fuel consumption as a significant step in the current drive for establishing the marine gas
turbine engine as a viable alternative to traditional prime movers in the ship propulsion industry.
Comparative Study and Analysis of Image Inpainting TechniquesIOSR Journals
Abstract: Image inpainting is a technique to fill missing region or reconstruct damage area from an image.It
removes an undesirable object from an image in visually plausible way.For filling the part of image, it use
information from the neighboring area. In this dissertation work, we present a Examplar based method for
filling in the missing information in an image, which takes structure synthesis and texture sysnthesis together.
In exemplar based approach it used local information from an image to patch propagation.We have also
implement Nonlocal Mean approach for exemplar based image inpainting.In Nonlocal mean approach it find
multiple samples of best exemplar patches for patch propagation and weight their contribution according to
their similarity to the neighborhood under evaluation. We have further extended this algorithm by considering
collaborative filtering method to synthesize and propagate with multiple samples of best exemplar patches. We
have to preformed experiment on many images and found that our algorithm successfully inpaint the target
region.We have tested the accuracy of our algorithm by finding parameter like PSNR and compared PSNR
value for all three different approaches.
Keywords: Texture Synthesis, Structure Synthesis, Patch Propagation ,imageinpainting ,nonlocal approach,
collabrative filtering.
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
The major challenging issue in Cloud computing is Security. Providing Security is big issue
towards protecting data from third person as well as in Internet. This mainly deals the Security how it is
provided. Various type of services are there to protect our data and Various Services are available in Cloud
Computing to Utilize effective manner as Software as a Service (SaaS), Platform as a Service (PaaS),
Hardware as a Service (HaaS). Cloud computing is the use of computing resources (hardware and
software) that are delivered as a service over Internet network. Cloud Computing moves the Application
software and databases to the large data centres, where the administration of the data and services may not
be fully trustworthy that is in third party here the party has to get certified and authorized. Since Cloud
Computing share distributed resources via network in the open environment thus it makes new security
risks towards the correctness of the data in cloud. I propose in this paper flexibility of data storage
mechanism in the distributed environment by using the homomorphism token generation. In the proposed
system, users need to allow auditing the cloud storage with lightweight communication. While using
Encryption and Decryption methods it is very burden for a single processor. Than the processing
Capabilities can we utilize from Cloud Computing.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Similar to Encryption Technique for a Trusted Cloud Computing Environment (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Encryption Technique for a Trusted Cloud Computing Environment
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. V (Jan – Feb. 2015), PP 53-60
www.iosrjournals.org
DOI: 10.9790/0661-17155360 www.iosrjournals.org 53 | Page
Encryption Technique for a Trusted Cloud Computing
Environment
Aishwarya Asesh
(School of Computing Science and Engineering, VIT University, India)
Abstract: Cloud computing has reached a certain level of maturity which leads to a defined productive state.
With varying amount of computing power present with everyone, it has become necessity of the hour to use
cloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloud
storage mechanism, the computing power gets distributed rather than being centralised. The whole system uses
the internet communication to allow linkage between client side and server side services/applications. The
service providers may use the cloud platform as a web service platform or a data storage architecture. The
freedom to use any device and location for cloud management is an added advantage for any user. Maintenance
of such systems is also easy as installation of resources aren’t required in each and every system which is using
cloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliability
and security. As in public hosting, the client is totally unaware of the security strategies applied by the service
provider, it creates a necessity for the end user to save the data from expected threats. One cannot totally rely
on the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in the
cloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince the
customer on security factors. This paper describes a schema that ensures encryption of data using Advanced
Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in further
enhancement of the cloud computing standards.
Keywords: AES, Cipher, Encryption, Rijndael, Security
I. Introduction
Cipher is an algorithm used for encrypting and decrypting a message. It becomes difficult for a hacker
if the data present in cloud is in encrypted form, as the data files or encrypted data blocks are useless for any
person unless he knows the perfect method for decrypting it. Generally companies with critical data sets,
encrypt the data using a proper cipher algorithm before sending it to the server. This procedure is considered to
be the safest method for data security in clouds as even the service providers are not able to mess with the data
they receive from client. Various cloud deployment and service models are described in the paper, so that the
ideology of cloud computing can be clearly understood. Some real world issues and potential challenges to data
security is then emphasized. Encryption algorithms used in earlier times like the Caesar, Vigenere, Playfair are
discussed and their advantages, disadvantages are taken into account. The key point is to introduce a more
secure and safe method or process which can strengthen the current system of cloud security services, so that the
people using it may rely completely on them. Advanced Encryption Standards have been used for the encryption
purposes in the proposed system. Rijndael being one of the safest algorithm used for encryption can result into
increase in overall reliability of the cloud environment. The designed and proposed architecture can help to
encrypt and decrypt the file at the user side as well as client side thus providing security to static as well as
dynamic data.
II. Cloud deployment models and service models
Four different cloud deployment models are used currently along with 3 types of integration systems
among them:
Public Clouds
Very common type of cloud deployment model. Customers use the services offered by cloud service
providers. Most of the companies are providing these services today such as sky drive, google drive and iCloud
services. Customers have no idea about the infrastructure and working of the computing mechanism. Consumers
can add data and retrieve the data at any moment when required. Security aspect is taken care by the service
providers.
Private Clouds
This type of cloud is mainly used by large companies and enterprises. People are given a completely
private environment and they can use the security measures best suited to them. Disadvantages of this model is
2. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 54 | Page
that the cost of such deployment is too high. Mostly used in banks to provide private services to customers and
employers.
Hybrid Clouds
This type of deployment is basically used when we need both the private and public deployment model
simultaneously. The security strategies are independent for both type of services. The cost effectiveness is less
as both type of models are integrated in one system. Best example can be Amazon simple storage service.
Community Cloud
More than one single infrastructure are used by this type of model. More than one organization can
control single service deployment model. The control may be administered by more than a single provider also.
Used when many organizations have a shared interest to use a single cloud model.
IaaS - Infrastructure as a service
Cloud infrastructure services are used to maintain and monitor the cloud data, networking or network
services. The requirements can be based on consumption of resources by the users.
PaaS - Platform as a service
Cloud platform services are used in the development of applications and for providing cloud
components in them. Framework for further development can be achieved using such services.
SaaS – Software as a service
Cloud software services are used to manage third party software by the client side. Such applications
can run directly using the web plugins, no downloads or such installations are required for using such services.
You can see the examples of different cloud models and their usage in Figure 1.
Fig. 1
III. Security concerns
Due to the increasing number of cloud users per day, the amount of data stored by the service providers
is also increasing rapidly. The major concern arises of data theft as all users are storing sensitive information
and service providers are taking care of the security measures used to protect and safeguard the data. It becomes
a major concern to know that which type of security is used by providers to protect what kind of data.
Sometimes even the data usage pattern may give important information to the hackers or data thieves [1].
API changes are frequent from the service provider‟s end but they never inform or intimate the clients
about the changes being made. Therefore the clients are not updated about the kinds of vulnerability their data
may face in future. Customers are just using the data from time to time without any effective safeguard
guaranteed. Along with this problem, people of different countries, use the cloud services at different rendering
speeds, so many a time incomplete or corrupt data gets recorded while uploading to the server [2]. This creates a
big problem whenever the customer tries to get back the data, as the server doesn‟t reply to the request in a
proper manner.
3. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 55 | Page
In case of data access by some random person, the customer might never know that the data was stolen
or leaked, as the service providers have the record of data access and they don‟t share such information with the
users. The situation becomes worst when the data was being shared by multiple user [3]. If you are using a
private cloud then there are less chances of such unalarmed data thefts.
Most of the public data service providers believe that encrypting the data maybe the possible way to
protect the data. But there are many disadvantages of the process as encryption consumes a lot of processing
power. Many a times encryption results in data getting corrupt because of lack of proper server response or
service time. Even if the hacker knows the data access pattern, he may be able to decrypt the data. Cloud
providers can also not be trusted to the very limit as they may sell the encrypted data to some other potential
buyers. The best way to deal is by providing the data in encrypted form to the service providers so that they may
not be able to mine or decrypt any useful information from those encrypted blocks of files.
Data security problems also differ by different countries and places. Such as in America the
distribution of private information is considered safe and thus even big enterprises have transparency in the file
and record sharing aspect whereas on the other side in Europe, people don‟t believe in data transparency and
thus every bit of detail is kept hidden from the normal people [4].
IV. Encryption methods
Data is encrypted by the service provided when the customer/client uploads the data to the servers,
using proper encryption methods they can protect the data to large extent as even if the data is stolen, hackers
will not be able to extract any useful information from the encrypted data block [5]. Three of the famous
encryption algorithms used are:
a) Caesar Cipher
Caesar‟s shift or Caesar‟s code is the most famous and widely used encryption algorithm used to code
data into encrypted block of information. In this we replace the letter of alphabet in the original text to another
letter three places down in the order, for example “ABCD” will be converted in to “DEFG”. In Practical
application it may be difficult to solve, but through brute force this can easily be broken as only 25 possibility of
letters exist. The vulnerability increases as there is a fixed pattern of encoding, so the thief knows what to look
for while decoding the whole text. The advantages are that the algorithm doesn‟t do runtime overhead while
encrypting and decrypting. The amount of time consumed in encryption and decryption is less compared to
other complex algorithms, so there are less chances of data getting corrupted while in the process. Can be best
used when we need low to moderate amount of security and when the time efficiency matters more than the
security aspect.
Example:
Text: ABCDEF
Encrypted text: DEFGHI
b) Vigenere Cipher
This cipher increases the level of security from Caesar cipher. Encryption is done using a sequence of
different Caesar ciphers based on the letter of the keyword. The shift values are different in this type of
encryption as many patterns of shifts are used to encrypt a text. A table is used to refer to the keyword
description and thus it makes it easy to encrypt a text. The possibility of the code word being broken reduces.
We make a table using the plaintext and keyword. Then we match the corresponding letters of both the Keyword
and Plaintext to get a defined algorithm or set of rules for encryption.
Example:
Plaintext: KILLERBOY
Key: RATRATRAT
Cipher text: BIECEKSOR
Plaintext: HOWAREYOU
Key: BOY
Cipher text: ICUBFCZCS
Thus as you can see this has a very difficult chances of getting decrypted. When developed, this was
considered indecipherable cipher. But if someone gets to refer the key table then it becomes easy to compute the
original text message or data. So the risk factor for sensitive data storage using this method still remains unused.
4. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 56 | Page
c) Playfair Cipher
Playfair Cipher is also known as symmetric encryption method as generally matrices of 5x5 dimension
is used in this kind of encryption. This encryption encrypts pairs of letters rather than a single unit and thus is
much more complex than the Vigenere cipher. As frequency determination doesn‟t work for this method, so
breaking or decrypting such ciphers is tougher. The probability of correct decryption increases to 600 instead of
just 26 as in simple encryption methods. A matrix is formed using keyword and letters of the alphabet. Then the
original text is broken in 2 letter pairs each. Then a particular encryption algorithm is used to encrypt the text.
Example:
Plaintext: THISISAMESSAGE
Key: PAPER
Cipher text: UG KN KN BJ FX OE FR
Plaintext: HOWAREYOU
Key: JOLLY
Cipher text: PC ZL SD AL VZ
The main problem while using such kinds of cipher algorithms is the time complexity involved in the
process. As the time consumed is quiet high when the data to be encrypted is large.
V. Proposal
Chances of data theft increases as one tries to upload/send the data to the server or otherwise when
client requests for the data from the service provider/server. Thus data security becomes essential while the data
block is in transmission state. Even when the data is static, it is best suited to keep it in encrypted form, as the
data leakage chances gets reduced by a large extent [6].
The following step plan is used in order to achieve this target of encryption and decryption (at a later
stage) with the best ratio of security and time complexity:
a) Authorization Step:
Encryption key and other parameters need to be provisioned with dynamic security strategies. For this
purpose we use Extensible Authentication Channel which acts like an extended version of normal authorization
by giving secure transmission for encryption keys [7]. For general authentication of user we use a challenge
handshake mechanism which prevents unwanted users from entering the data warehouse system.
b) Encryption Step:
For Encryption of data, the algorithm should be tested for high level of security. Advanced
Encryption Standard algorithm – Rijndael is chosen by the Nation Institute of Standards and
Technology – United States. Being much more secured than DES and triple DES, this algorithm is a perfect
balance between security standards, performance and efficiency [8]. Algorithm is based on standard symmetric
key formulation. Encryption and Decryption is done using blocks of data. Iterative refinement is used in this
algorithm as Rijndael uses a dynamic number of rounds based on the key or block size. The best part lies in the
fact that for added security more rounds can be added at a later stage. So security standards can be increased
based on the vulnerability of data [9]. The whole process is based on iterative block formation and operations
are carried in different intermediate stages.
VI. Implementation
A. Authentication Channel
A secure mechanism is used to verify the authenticity of the user. When customer tries to get the data,
the „challenge‟ signal mechanism is used to bypass the user through the channel, thus a secured login is
guaranteed.
Challenge handshake signal security is implemented using the following steps:
1. As soon as a client/customer wants some data, the mechanism creates and sends a „challenge‟ signal to the
client, thus verifying the data request.
2. A hash table is available with client, the client/customer replies back to the challenge signal with the correct
hash value.
3. The protocol verifies/authenticates the value sent by the client ad thus accepts the request for required
services or data pooling.
B. Encryption Algorithm – Advanced Encryption Standard
Rijndael supports key of variable length like 128 bits, 192 bits and 256 bits. This variation in key
5. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 57 | Page
selection has been recently been in use, so that the hacker may not be able to plunder over the fixed key sizes
[10]. However the block and key sizes can be same, although which is not allowed under AES. Algorithm uses a
dynamic combination of rounds, depending on key/block sizes, as follows:
9 rounds when key/block size is 128 bits
11 rounds when key/block size is 192 bits
13 rounds when key/block size is 256 bits
Rijndael is a substitution linear transformation block cipher, not requiring a network support. Three
transformation layers used in this are linear layer, non-linear transform and key schedule mechanism. Different
steps involved in Rijndael AES can be seen in the following Figure 2.
Fig. 2
6. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 58 | Page
Following steps are involved:
i. Byte Substitution:
Each byte is just simply substituted in this step. One Substitution Box of 16x16 bytes is used, which
contains the permutation of all 256 8 bits. Each byte of state is then replaced by byte starting from row (left 4-
bits) & column (right 4-bits). Example: byte {69} is replaced by byte in row 6 column 9, which has value {8A}.
S-box is constructed using defined transformation of values in GF (256).The construction of S-box is done using
a simple math formula of a non-linear function: 1/x.
ii. Shift Rows:
A circular byte shift in performed in each of the following
1st
row is unchanged
2nd
row does 1 byte circular shift to left
3rd row does 2 byte circular shift to left
4th row does 3 byte circular shift to left
Decryption of inverts is done using shifts to right. Since state is processed by columns, this part ony
involves permutation bytes among the columns.
iii. Mix Columns:
Each column is processed independently. Each byte is replaced by a value dependent on all 4 bytes in
the column. Effectively a matrix multiplication in GF (28
) using prime polynomial m(x) =x8
+x4
+x3
+x+1 can
express each column of the new state as 4 equations. Each equation is used to derive each new byte in column.
Decryption requires use of inverse matrix with larger coefficients, hence is a little harder.
iv. Add Round:
XOR state with 128-bits of the round key is used. Again processed by column (though effectively a
series of byte operations). Inverse is used for decryption of identical parts. Since XOR is its own inverse, with
reversed keys. Add Round is therefore the iterative step.
VII. Data analytics and trade off in this mechanism
Data analysis was performed on the data being encrypted by using the mechanism. When a large
amount of data is processed, there is a probability of some data getting corrupt during the compression and
coding process. As you can see in Fig. 3.
X axis represents the line of data filter
Y axis represents the data timeline after processing
Z axis is the time complexity line
As we see two bands of data passing through the filter where it gets encrypted. Bits of data is passed in
a continuous wave. Encryption in general is power and resource consuming. So due to this reason the data flow
doesn‟t happen 100% accurately and thus some bits are missed during the encryption process. This creates
problem at a later stage when the client requests for the data [11]. It becomes difficult for the system to render
whole data files back to the user.
A proper upgrade for overcoming this problem can be by using the correct error handling system. Error
correction and detection can be used in a proper manner and at a proper time in between this whole process [12].
Data backup servers should be maintained by the service providers so that the error correction can be done in the
best way possible, and the discrepancies in data bits can be removed.
7. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 59 | Page
Fig. 3
VIII. Conclusion
Cloud computing is the need of the hour for today‟s computing requirements as the advantages of using
the services are far more than the disadvantages or trade-offs we need to do. The vulnerability of data is the
biggest concern for the public who store sensitive information in the cloud servers. Many of the issues have
risen as a result. Shared data computation and multiple access are two major issues faced by the cloud service
providers. Flexibility of choice of security measures should be given to the consumer/client so that they can
benefit from the system by deciding about the perfect security strategy they need, based on the type of data
stored in clouds.
If possible, consumers should upload the data in pre-encrypted form. This will eliminate the chances of
service providers or other intermediate persons to hassle with the sensitive information which might be present
in the uploaded data. In the SLA - Service Level Agreement the service provider should clearly mention and
describe the security measures taken by them to protect the data of the user. Third party security service
providers can also be used by the cloud storage provider so that they can manage separate departments. This
way the risk of an immediate attack by a hacker can be reduced by a large extent. Backup data servers should be
maintained so that in case of any discrepancy in data the backup may be used to get back the original details of
the file. Simple encryption techniques need to be enhanced and new ways to handle cloud data should be
introduced.
In the proposed mechanism server data can only be used by the client after successful signal
verification by the server side data handler. Thus this takes care of any unauthorised access to cloud data. So
sharing of data may be performed as required. Use of Advanced Encryption Standards justify the security
reasoning of the whole encryption mechanism. Moreover Rijndael security can be further increased by adding
more key rounds to the system, thus one can encrypt the data to the desired limit. The proposed mechanism can
thus help the in getting a secured cloud computing environment.
Acknowledgements
This paper is dedicated to my parents and my sister, who stood by me in every frame of life. This work
would not have been possible without their love and support.
References
Journal Papers:
[1]. Venkata Karthik Gullapalli and Aishwarya Asesh, Data Trawling and Security Strategies, ISSN – 2278-8727, IOSR Journal of
Computer Engineering, Volume 16, Issue 6, Ver. 1, Nov - Dec 2014.
[2]. Z. Lan, V. Varadharajan and M. Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”,
Information Forensics and Security, IEEE Transactions on, vol. 8, no. 12, (2013), pp. 1947-1960.
[3]. A. A. Soofi and M. I. K Fazal-e-Amin, “A Review on Data Security in Cloud Computing”, International Journal of Computer
Applications, vol. 94,no.5,(2014), pp.12-20.
[4]. D. E. Goldberg and J. H. Holland, Genetic Algorithms and machine learning, Guest Editorial, Machine Learning 3: 95-99, 1988
Kluwer Academic Publishers - The Netherlands.
[5]. I. Foster and C. Kesselman (eds). The Grid: Blueprint for a Future Computing Infrastructure. Morgan Kaufmann, San Francisco,
USA, 1999.
8. Encryption Technique for a Trusted Cloud Computing Environment
DOI: 10.9790/0661-17155360 www.iosrjournals.org 60 | Page
[6]. K. Keahey, I. Foster, T. Freeman, and X. Zhang. Virtual workspaces: Achieving quality of service and quality of life in the Grid.
Scientific Programming, 13(4):265-275, October2005.
[7]. I. Raicu, Y. Zhao, C. Dumitrescu, I. Foster, M. Wilde. “Falkon: a Fast and Light-weight tasK executiON framework”, IEEE/ACM
SuperComputing 2007.
[8]. Aishwarya Asesh, Tested Paradigm to Include Optimization in Machine Learning Algorithms, ISSN: 2278-0181, IJERT
International Journal of Engineering Research & Technology, Vol. 4 Issue 02, February-2015.
Books:
[9]. R. Buyya, K. Bubendorfer. “Market Oriented Grid and Utility Computing”, Wiley Press, New York, USA, 2008.
[10]. I. Foster, C. Kesselman, J. Nick, S. Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed
Systems Integration. Globus Project, 2002.
Theses:
[11]. E. Marinelli, "Hyrax: Cloud Computing on Mobile Devices using MapReduce", Master Thesis Draft, Computer Science Dept.,
CMU, September 2009.
Proceedings Papers:
[12]. I. Foster, C. Kesselman, L. Pearlman, S. Tuecke, and V. Welch. “The Community Authorization Service: Status and Future,” In
Proc. of Computing in High Energy Physics (CHEP), 2003.
[13]. M. S. Abolghasemi, M. M. Sefidab and R. E. Atani, “Using location based encryption to improve the security of data access in
cloud computing”, Paper presented at the Advances in Computing, Communications and Informatics (ICACCI), 2013 International
Conference on. (2013, 22-25 Aug. 2013).
[14]. H. Shuai and X. Jianchuan, “Ensuring data storage security through a novel third party auditor scheme in cloud computing”, Paper
presented at the Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on. (2011, 15-17 Sept.
2011).
[15]. D. E. Irwin, J. S. Chase, L. E. Grit, A. R. Yumerefendi, D. Becker, and K. Yocum. Sharing networked resources with brokered
leases. In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX2006), Boston, USA, June2006.