This document proposes a method to improve data storage security in cloud computing using Identity-Based Cryptography (IBC) and Elliptic Curve Cryptography (ECC). IBC reduces key management complexity and eliminates the need for certificates by using a user's identity as their public key. ECC provides data confidentiality through encryption and data integrity is provided by Elliptic Curve Digital Signature Algorithm (ECDS). The proposed method involves a Private Key Generator (PKG) that generates user keys, a Trusted Cloud (TC) that stores encrypted user data, and users who encrypt data using IBC and ECC before storing it on the TC. This is intended to provide secure and flexible data storage in cloud computing.
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloudijtsrd
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so every time if user wants to modify data, it is necessary to decrypt data. The most used technique for providing security in cloud storage is Homomorphic encryption. In the homomorphic encryption technique, there is no need to decrypt whole data whenever user wants to update data. In the existing system used the mixed homomorphic scheme which reduce noise level in homomorphic encryption technique. The existing system focus on data corruption and data modification but what if system failure and power failure occurs. The user data may be loss in any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code. By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system. Bhargavi Patel ""Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25104.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25104/enhancing-availability-of-data-in-mixed-homomorphic-encryption-in-cloud/bhargavi-patel
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloudijtsrd
In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so every time if user wants to modify data, it is necessary to decrypt data. The most used technique for providing security in cloud storage is Homomorphic encryption. In the homomorphic encryption technique, there is no need to decrypt whole data whenever user wants to update data. In the existing system used the mixed homomorphic scheme which reduce noise level in homomorphic encryption technique. The existing system focus on data corruption and data modification but what if system failure and power failure occurs. The user data may be loss in any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code. By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system. Bhargavi Patel ""Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25104.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25104/enhancing-availability-of-data-in-mixed-homomorphic-encryption-in-cloud/bhargavi-patel
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the user’s data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the user’s data can’t be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
Study On Traffic Conlict At Unsignalized Intersection In Malaysia IOSR Journals
The research conducted is traffic conflict at unsignalized intersections . The purpose of this research
is to study accident data used as an identification of hazardous location leads to less accurate countermeasures.
It is because accidents are not always reported especially accident involving damage only and this situation can
reduce good comparative analysis. To overcome these lacks of accident data, many ways of employing nonaccident
data have been suggested. One of the ways using non-accident data is traffic conflicts, which is defined
as critical incidents not necessarily involving collisions. The traffic conflict technique was originally set up to
provide more reliable data and information of traffic problems at intersections which actually would replace the
unclear and incomplete recorded data accident. The conflict study was done at the selected unsignalized
intersection where types of traffic conflict can be identified and classified. Various road users involved in the
conflict at the unsignalized intersection were also observed. Then conflicts data captured were analyzed using
the computer program to observe for any conflicts at the intersections. The linear regression graph was used to
show the relationship between conflict and accident data where two different equations were derived from the
graph. This equation may be used to make a prediction for the relationship that might exist between those two
variables at another location.
The CFD Analysis of Turbulence Characteristics in Combustion Chamber with Non...IOSR Journals
Abstract : Co-Axial jets have applications in areas where the mixing of two fluid jets are necessary, the two
fluid jets can be effectively mixed by producing the turbulence flow. Turbulence is a chaotic behavior of the fluid
particles that comes in to picture when the inertia force of the flow dominates the viscous force and it is
characterized by the Reynolds Number. Co-axial jets are effective in producing the turbulence. In the present
study the free compressible turbulent coaxial jet problem will be computed using CFD, and compare with
different non circular coaxial jets based on constant hydraulic diameter and mass flow rate. Turbulence
characteristics of combustion chamber with circular coaxial and non circular coaxial jets are determined and
compared.
Keywords: Coaxial Jet, Turbulence Modeling, Fuel injector, Combustion chamber.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the user’s data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the user’s data can’t be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
Study On Traffic Conlict At Unsignalized Intersection In Malaysia IOSR Journals
The research conducted is traffic conflict at unsignalized intersections . The purpose of this research
is to study accident data used as an identification of hazardous location leads to less accurate countermeasures.
It is because accidents are not always reported especially accident involving damage only and this situation can
reduce good comparative analysis. To overcome these lacks of accident data, many ways of employing nonaccident
data have been suggested. One of the ways using non-accident data is traffic conflicts, which is defined
as critical incidents not necessarily involving collisions. The traffic conflict technique was originally set up to
provide more reliable data and information of traffic problems at intersections which actually would replace the
unclear and incomplete recorded data accident. The conflict study was done at the selected unsignalized
intersection where types of traffic conflict can be identified and classified. Various road users involved in the
conflict at the unsignalized intersection were also observed. Then conflicts data captured were analyzed using
the computer program to observe for any conflicts at the intersections. The linear regression graph was used to
show the relationship between conflict and accident data where two different equations were derived from the
graph. This equation may be used to make a prediction for the relationship that might exist between those two
variables at another location.
The CFD Analysis of Turbulence Characteristics in Combustion Chamber with Non...IOSR Journals
Abstract : Co-Axial jets have applications in areas where the mixing of two fluid jets are necessary, the two
fluid jets can be effectively mixed by producing the turbulence flow. Turbulence is a chaotic behavior of the fluid
particles that comes in to picture when the inertia force of the flow dominates the viscous force and it is
characterized by the Reynolds Number. Co-axial jets are effective in producing the turbulence. In the present
study the free compressible turbulent coaxial jet problem will be computed using CFD, and compare with
different non circular coaxial jets based on constant hydraulic diameter and mass flow rate. Turbulence
characteristics of combustion chamber with circular coaxial and non circular coaxial jets are determined and
compared.
Keywords: Coaxial Jet, Turbulence Modeling, Fuel injector, Combustion chamber.
Chebyshev Collocation Approach for a Continuous Formulation of Implicit Hybri...IOSR Journals
In this paper, an implicit one-step method for numerical solution of second order Initial Value
Problems of Ordinary Differential Equations has been developed by collocation and interpolation technique.
The one-step method was developed using Chebyshev polynomial as basis function and, the method was
augmented by the introduction of offstep points in order to bring about zero stability and upgrade the order of
consistency of the new method. An advantage of the derived continuous scheme is that it can produce several
outputs of solution at the off-grid points without requiring additional interpolation. Numerical examples are
presented to portray the applicability and the efficiency of the method.
Parametric Optimization of Single Cylinder Diesel Engine for Pyrolysis Oil an...IOSR Journals
Abstract: An experimental study has been carried out for pyrolysis oil blended with diesel used in single
cylinder diesel engine. Pyrolysis oil is obtained from tire waste by pyrolysis process. Pyrolysis process is a
thermo-chemical decomposition of organic matter in absence of oxygen. Blending of pyrolysis oil with diesel in
maximum possible proportion helps to reduce the consumption of diesel fuel. In this study, the effects of
parameters i.e. injection timing, injection pressure, compression ratio, and load are taken as variable for
optimization. As the experiment required simultaneously optimization of four parameters with five levels,
taguchi method of optimization is used in this experiment. The results of the taguchi experiment identifies that
220 injection timing, injection pressure 200 bar, compression ratio 16 and engine load 20kg are optimum
parameter setting for lowest break specific fuel consumption. Engine performance is mostly influenced by
engine load and is least influenced by Compression ratio.
Keyword: Pyrolysis oil, SFC, Taguchi Analysis, CI engine, Diesel
Chemical Examination of Sandbox (Hura Crepitans) Seed: Amino Acid and Seed Pr...IOSR Journals
Abstract: Amino acid composition as well as the seed protein solubility of (Hura crepitans) seeds was studied. The chemical scores for the determined amino acids of the seed in % showed tryptophan, leucine, methionine and isoleucine with 175.71, 175.00, 161.82 and 134.52 as the most abundant amino acids in that order while lysine and phenylalanine with 44.29 and 45.71 respectively were the most limiting amino acids. The ratio of percentage essential and non-essential amino acids in the seed was found to be 79: 21. All the values determined for amino acids were higher than the FAO/WHO standard except for lysine, cysteine and phenylalanine where lower values were obtained. Four solvents (0.1M each of NaOH, Na2CO3, NaHCO3 and NaCl) were used to test for solubility of the seed protein and out of these, 0.1M NaOH was found to be the most effective solvent compared to the deionized distilled water. The protein was found to be more soluble in the alkaline than the acidic medium with PH4 having the lowest protein solubility of 20% while PH8 have the highest solubility of 65% after which increasing pH do not increase solubility and a relative stability established. The outcome of this work is a useful indication of how well protein isolate would perform when they are applied to food and to the extent of protein denaturation due to chemical treatment,
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...IOSR Journals
Abstract: Adipose-derived stem cells (ADSCs), were isolated from discarded human fat tissue, obtained from csection with our recently modified methods, in Stem Cell & Regenerative Medicine Lab, VSBT. Here we develop
two methods to isolate Adipose derived mesenchymal stem cells with enzyme digestion and use of
phosphatidylcholine and deoxycholate. Surface protein expression was analyzed by flow cytometry to
characterize the cell phenotype. The multi-lineage potential of ADSCs was testified by differentiating cells with
adipogenic inducer. ADSCs can be cultured in vitro for up to one month without passage. Also, the flow
cytometry analysis showed that ADSCs expressed high levels of stem cell related surface marker CD105.
ADSCs have strong proliferation ability, maintain their phenotypes, and have stronger multi-differentiation
potential. The molecular basis of ADSC differentiation was studied using bioinformatics tools with an aim to
identify the key proteins involved in differentiation, such that they could be used as potential targets for drug
development for the treatment of obesity. The key proteins involved were found to be PPARG and C/EBPα. The
structures of the proteins were retrieved from MMDB (Molecular Modelling Database) and PDB (Protein Data
Bank) respectively. Key Words: Adipose-derived stem cells, Mesenchymal stem cells, Enzyme digestion, Phosphatidylcholine, Deoxycholate, PPARG, C/EBPα, etc.
Leather Quality Estimation Using an Automated Machine Vision SystemIOSR Journals
In the presented work, it is proposed to design the feature vector of the parameters of leather
material in order to completely define the quality of the leather material. The proposed parameters are holes,
cracks, spots, cuts, and roughness etc.. The defects are localized according to their position on leather surface,
their size and shape. The histogram analysis method is proposed to be developed for use with very low-level
image features, such as color and luminance and is used as an image descriptor for color-matching
requirements. In the present scenario, it is observed that the leather quality is highly sensitive to surface finish
of the leather material. Manually it is not possible always to inspect each area of the leather surface under test
because of heavy lot of material and it is time consuming too. The main problem during the inspection is that
how to achieve the repeatable quality at regular interval. Therefore, in order to get the authentic leather
quality, it is required to have a set of features that could be given some numerical value so that the quality can
be justified in quantified manner. A machine vision system offers a fair solution in order to solve this problem.
In the proposed work, we propose to deduce some mathematical parameters besides size and location that are arranged in a vector so as to determine the leather quality
Mobile computing application risks in ZimbabweIOSR Journals
Abstract: Mobile technology has now become the order of the day. Everyone seems to own one or more mobile
devices. Everyone is so excited because this has made life easier for a lot of people. Though mobile technology
has brought many benefits to people’s lives, its application has some risks that come with it. This paper
therefore looked at mobile computing application areas in Zimbabwe, the risks brought about by mobile
computing application in Zimbabwe and how mobile computing application risks are mitigated in a developing
country like Zimbabwe where the technology level seems to be behind. The study findings showed that mobile
application areas in Zimbabwe include paying bills, social networking and playing games. Most Zimbabweans
revealed that they do not know how to mitigate mobile computing application risks. The study finally
recommended that mobile computing application risks should be taught in schools as well as in televisions and
radios so that everyone is aware of them.
Keywords: application risks, mobile computing, mobile device,mobile technology
Effect of Regular Exercise on Prolactin Secretion: A Pilot StudyIOSR Journals
Abstract:
Introduction: Evidence suggested that exercise may affects release of prolactin hormone. Participation in
exercise may increase secretion of prolactin hormone and may give sharp decrease in secretion of prolactin and
not only that published work demanded that there is no effect of exercise on secretion of prolactin. In this
context the researcher intend to know whether exercise affects positively or negatively or not on the release of
prolactin hormone. Aim: Determine whether participation in exercise may increase the level of secretion of
prolactine hormone or not. Method: Only two female students 29 years aged were participated in this study.
They were regularly practiced yogic asana and pranayam for 1 hour per day in the evening, 6 days per week,
for 8 weeks. The level of prolactin hormone was assessed by CLI method. In the present study all the
measurements were done at the baseline and 8 weeks of exercise training. Simple percentage calculated from
the mean value to see the quantitative changes in secretion of prolactin due to participation in the exercise
training. Result: Pre test mean was 5.80 and post test mean was 17.63 which imply that 203.96% increase in
secretion of prolactin significantly. Discussion and Conclusion: Level of secretion increased may be due to
multiple neural pathways that influence PRL secretion converges on the hypothalamus from other parts of the
brain; the effect of exercise on the secretion of PRL may also reflect the action of different neural inputs on the
activity of the hypothalamic–pituitary axis.
Key word: Exercise; Prolactin.
Experimental Evaluation of the Effect of Thread Angle on the Fatigue Life of ...IOSR Journals
Abstract : The present work is concerned with fatigue strength, obtained by plotting the S-N Curves for
determining the fatigue life of various thread geometries of bolts under cyclic loading. The stress equations
obtained from Majzoobi are being used for calculations of core stress produced due to cyclic loading,
which is being carried usually by the first thread of the bolt. The higher stress concentration occurs in the root
of first threads.The experimental work has been carried out for five different thread profiles of varying flank
angles, having six samples of each profile. The fatigue testing on each profile has been performed under cyclic
loading, in order to obtain the number of cycles to failure of a particular specimen. The results obtained
experimentally have been compared with the work of Gane . Finally the work is used to obtain the failure life of
bolts, which means which thread profile has higher fatigue life or simply higher strength to failure. As strength
is of direct use to the designer regarding the safety of structures.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Proposed system for data security in distributed computing in using triple d...IJECEIAES
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user’s personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data.
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
F017414853
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July – Aug. 2015), PP 48-53
www.iosrjournals.org
DOI: 10.9790/0661-17414853 www.iosrjournals.org 48 | Page
Improving Data Storage Security in Cloud Computing Using
Elliptic Curve Cryptography
Asst. Prof. Dr. Salim Ali Abbas*
AmalAbdulBaqiMaryoosh*
*
Department Of Computer Science, College Of Education, Al-Mustansiryah University
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which are
providing by cloud computing. The cloud computing is a way to deliver IT services on demand and pay per
usage, and it can stores huge amount of data. But until now many companies don’t wish to use cloud computing
technology due to concerns about data secrecy and protection. This paper aims to provide a secure, effective,
and flexible method to improve data storage security in cloud computing. By using IBC the key management
complexity will decrease and not need to certificate issued, also the use of ECC provides data confidentiality
and use ECDS provides data integrity.
Keywords: Cloud computing, Cryptography, Elliptic Curve, Data storage.
I. Introduction
Cloud computing is a new technology often used virtualized with resources to provide dynamically
scalable service via the internet. In the cloud computing, users can access to the resources by using a various
devices, such as laptops, PCs, smart phone, etc. to access multiple service such as storage, programs, and
application-development platforms, over service that provided by cloud providers via the internet. Through the
last years, Cloud computing improved from simple web applications, such as Gmail and Hotmail, into business
propositions like SalesForce.com, AmazonEC2, etc [1].
Cloud computing may be supply service for reducing IT costs, business management, and maintenance
costs of hardware and software are effective. At the same time, it makes the enterprises able to access to
professional IT solutions. Data storage center in cloud computing can be reliable and secure, because the
world’s most advance data center is helping the users save the data. The users must not concern about virus
attack, data loss, and other problems when they used the cloud in correct form[2].
User with cloud computing can use the cloud services anywhere, everywhere, on-demand and based on
pay per use principle. Cloudcomputing has two types of models: services models (SaaS, PaaS, and IaaS), and
deployment models(Public, Private, Community, and Hybrid cloud). Also the cloud computing is contains five
essential characteristics (On-Demand, BroadNetwork Access, Rapid Elasticity, Measured Service,and Resource
pooling).There are many companies that provide cloud services such as Amazon, Google,
Microsoft,SalesForce.com, etc.
There are many concerns about the data security in cloud computing should be taken into account such
as violation of the confidentiality and privacy of customers’ data via unauthorized parties [3]. The major
concern is if the data secure when it save in cloud?.Therefore, we have dedicated our work to design a new
architecture to improve data security in cloud computing by using Identity-Based Cryptography (IBC) and
Elliptic Curve Cryptography (ECC) with a Trusted Cloud (TC).
This paper organized as follows: Section 2 displays some works that related to the field of data security
in cloud computing. Section 3explain where data storage in cloud computing. Section 4 displays data security
lifecycle. Section 5 explain the IBC concept. Section 6review the general concept of ECC. Section 7illustrates
the implementation of the proposed system. Section 8shows our work conclusion.
II. Literature Survey
Several works related to our work, which presents the security of data in cloud computing as follow:
In 2009Mohammed Abdelhamid propose techniques to enhance users’ privacy based on RSA
algorithm.This proposal allowing users to authorize access to their remotely-storeddata [4].
In 2011Syam Kumar P and Subramanian R propose an effective and safe protocol by use ECC and
Sobol sequence. This protocol provide integrity and confidentiality of data. Moreover, their system also supports
dynamic data operations, which performed by the user on data stored in cloud while maintaining same security
assurance [5].
In 2012 Abbas Amini propose system for secure storage in cloud computing. This proposal use RSA
algorithm for data integrity, and use AES algorithm to achieve confidentiality of the stored data [6].
In 2012K.Govindaand Dr.E.Sathiyamoorthy propose a manner of secure data storage and identity
anonymization in private cloud by use GDS (Group Digital Signature). They use the concept of key exchange
2. Improving Data Storage Security In Cloud Computing Using…
DOI: 10.9790/0661-17414853 www.iosrjournals.org 49 | Page
with Diffie-Hellman protocol and strong RSA algorithm for the keys generation in addition to the process of
signature, encryption and decryption [7].
In 2014SwarnalataBollavarapu and Bharat Gupta propose data storage security system in cloud
computing. This system use algorithms like RSA, ECC and RC4 for encryption and decryption techniques [8].
III. Data Storage and Date Location
Cloud computing store data in a wide range distributed systems to offer more secure and reliable data
storage center. Customers no longer needed to concern on virus attack, data loss, and other problems. The
information is managed by the most professional team, and most advanced data center in the world is helping
users to save data. Cloud computing requires large amounts data storage, also requires to meet economy, high
reliability, and high availability, etc. As a result, cloud's systems need to support large data sets, and process
mode of write one time and read many [9].
The security must be taken in mind in a design stage of cloud storage,it must contains redundancy and
dynamic data as well as the separation. Data stores in the cloud redundantly by keeping redundant copies of data
at many various locations, Redundancy is one of the more essential methodsto protect the security of data
storage. While dynamic means that the customer’s data usually may be changed.Separation means the time of
storing customer’s data in the cloud. The customer can access only to own data in order to ensure the
independence of the data;data that is changed by the other customers do not affect the current customer [10].
To secure data, firstly, must know where its location, there may be a significant differences between
the regulatory policies in various countries. Cloud's user may be implicated in illegal practices without knowing.
Some governments suesenterprises which let for specific kinds of data to cross geographical boundaries. Cloud
computing customers should treats this problem by understanding the regulatory requirements for every country
they will be operating in. Currently, CSPs choice is left to the customer to choose the location of the data center.
For example, Amazon provides two locations one in Europe and the other in US [11].
IV. Data security lifecycle
The data security lifecycle is the path which the data going through from the stage of creation to
destruction. It consists of the following stages[12, 13]:
a. Create stage:When creating data, it can be manipulation, user's access rightsmay be changed by intruders
or incorrectly classified, which leads to loss the control of data. Organizations should be use data tags and
classification techniques, like user labeling of data, to reduce the incorrect classification of data.
b. Store stage: The security system of SP is unknown because SPs are third-parties, so data should be
protected from manipulation by intruders over network, unauthorized access, and data leak. There should be
guarantee that the data, all its copies, and backups, are stored only in geographic locations allowed by
Service Level Agreement (SLA).
c. Use and Share stage: Through the use stage, which includes transition among CSP, data processing, and
customer, Sensitive data must be secured from that mingle with data of other customers during data traffic
in the network. If the data is shared among multiple customers or organizations, the SP must ensures
consistency and integrity of data. The SP must also protect all of its cloud service customer from malicious
activities carried out by the other customers.
d. Archive stage:As in the storage stage, must protect data from unauthorized access by hackers and
malicious customers. In addition to keeping a backup copy of the data and retrieval when needed to prevent
data premature destruction or loss. Data which in live production database, the CSP encrypts the data before
stored, as for the data that will be archived the cloud customer encrypted it before being sent to CSP to
reduce the ability of a malicious CSP or customers from accessing archived data.
e. Destroy stage: The biggest challenges facing the destruction stage is data permanence. Data that were
destroyed must be erased, non-refundable, and disposal physically. CSPs Must be uses several techniques to
guarantee that the data is completely destroyed, these techniques are disk Erasing, physical data destruction
techniques, like crypto-shredding and degaussing.
V. Identity-Based Cryptography (IBC)
IBC is one of the types of public key cryptography, which was initially proposed by Adi Shamir in
1984 to reduce the need for certificate authorities to distribute public key certificate. In IBC use users' identifier
information such as phone number, email, IP addresses, or domain name as a public key rather than used digital
certificates. Shamir implemented an identity based signature (IBS) by used RSA algorithm to allow users to
3. Improving Data Storage Security In Cloud Computing Using…
DOI: 10.9790/0661-17414853 www.iosrjournals.org 50 | Page
verification from digital signatures. Although he tried to implement an identity based encryption (IBE), but he
was unable to reach a solution and IBE remained open problem for many years. Until 2001, Franklin, Boneh,
and Cocks independently proposed scheme to solve IBE problem by using bilinear pairings and have provable
security. IBC allow to any two users to communicate securely, and verification of signatures each other without
exchanging any type of keys [14, 15, 16].Figure (1) view IBS and IBE schemes.
Figure 1: IBE and IBS Schemes
The Identity-basedcryptography systems containthePrivate Key Generator (PKG) that act as a trusted
third party, which create a master private key (Mk) and a master public key (Ps), then PKG will publish the
master public key and keeps a master private keysecret. Any user can generate his public key by combining a
master public key and his identity. The user must connects the PKG with his identity to obtain his private key
(Pr). PKG will use the master private key and user’s identity to generateuser’s private key[17].
VI. Elliptic Curve Cryptosystem
Elliptic curve cryptography (ECC) is one of the public key encryption algorithms which is depend on
elliptic curve theory over finite fields. It used to make cryptographic keys smaller, faster, and more efficient.
The functions and characteristics of an elliptic curves have been studied in mathematics for 150 years. Their use
has been suggested in cryptography for the first time by Neal Koblitz and Victor Miller in 1985, separately [18].
ECC has begun to obtain acceptance of many of the accredited organizations, and many of the security protocols
since the beginning of 1990 [19].
6.1 Elliptic Curve Arithmetic
The main attraction of ECC is that it provides an equal level of security, but much smaller key size
compared with RSA. We can defined an elliptic curve by equation all its coefficients and variables take values
in the set of integers within the range from 0 to p-1, which is performed calculations modulo p. When use an
elliptic curve for cryptography, the coefficients and variables are restricted in a finite Abelian group
[20, 21].
The group that has a finite number of elements, it's known as a finite groupand the number of elements in 𝔾 is
known as the order of 𝔾 [22].ECC equation over 𝔽 𝟐 𝒎is:
6.2 Elliptic Curve Discrete Logarithm Problem (ECDLP)
Assume that E is an elliptic curve over some finite field 𝔽q, and P a point of order n on E. ECDLP on
E is to find the integer d ∈ [1,n–1], if such an integer exists, so that
Q = dP, where dP = P + P + ...+P
We can say about the group (𝔾) is an Abelian group or commutative group if achieved the following condition: m ∙ n=n ∙ m for all m,n in𝔾.
d times
4. Improving Data Storage Security In Cloud Computing Using…
DOI: 10.9790/0661-17414853 www.iosrjournals.org 51 | Page
The discrete logarithm problem (DLP) is does not look like ECDLP, and that ECDLP is considerably
more difficult than the DLP. This is due to the lack of known subexponential-time algorithm to solve ECDLP in
general [23].
6.3 Security of Elliptic Curve Cryptography
ECC algorithm is one of the most powerful asymmetric algorithms for a particular key length, so that it
is attractive especially for security applications where integrated circuit space and computational power is
limited, such as PC (personal computer) cards, smart cards, and wireless devices. ECC algorithm security is
relies on the difficulty of solving ECDLP. Currently it seems that ECC that be implemented on 160-bit nearly
offer the same level of security in the resistance against compared with 1024-bit RSA attacks. That led to
improved performance and better storage requirements [21]. Table (1)presents a comparison of the approximate
parameter size between strength elliptic curve systems and RSA.
Table 1: Comparative Bit Lengths [23]
VII. The Proposed Method
The proposed method contain three parts: Private Key Generator (PKG), Trusted Cloud (TC), and
User. The PKG is use to generate users’ keys. The user rent infrastructure from TC to save his data. This
proposal aims to provide more secure method to secure users’ data protection, reduce the complexity of
management by using IBC, and providedata confidentiality by using ECC over binary field and data integrity by
using Elliptic curve digital signature algorithm (ECDS).The main idea of this proposal is combine the security
of IBC and ECC with Trusted Cloud (TC). The use of IBC will significantly decrease the key management
complexity and not need to certificate issued. Also the use of TC has many benefits such as decrease the denial
of service attack (DOS) on CSPs, this important attraction because TC will save users’ data. All these parts
increase the strength and resistance of the system. Figure 2 explain the general structure of the proposed system.
Figure 2: General Structure of Proposed System
5. Improving Data Storage Security In Cloud Computing Using…
DOI: 10.9790/0661-17414853 www.iosrjournals.org 52 | Page
The Proposed Algorithm includes the following steps:-
a. Setup: the PKG do the following functions:
1. Chooses the curve E over 𝔽 𝟐 𝒎in the form
wherea and b are the curve parameters.
2. Chooses the base point P in E(𝔽 𝟐 𝒎) whose order n should be very
large.
3. Selects a random number smaller than the base point P order as a private number, this number will be a
master private key Mk.
b. Extract: when user wants to get his private and public key from PKG, he must send his identity (IDU) to
PKG. Then the PKG will compute the hash value to the identity of user (IDU) and use it with master
private key Mk to generate user private key, and use this private key to generate user public key.
QU = H (IDU)
PrU = Mk*QU
PUU = PrU*P
Then send copy from user private to user, and copy of user public key to user and TC.
c. Encryption: the user can encrypt his file by using the public key to generate his ciphertext as follow:
1. The userencodes his file to points Pm.
2. The user encrypts his file as follows:
a. Selects a random integer number J.
b. Calculates the ciphertextCm consists of the pair of points
Cm = {J*P, Pm + J*PU}
c. The user sends Cm to TC.
d. Decryption: When user want to retrieve his encrypted fileCm from TC, he will decrypted the message by
computes:
Pm + J*PU – Pr(J*P)
Pm + J(Pr*P) – Pr(J*P) = Pm
Then he decodes Pmto get the original filem.
e. Signing and Verifying: The usermust signing the filem by using his private key Pr as follows:
The TC when receive the user’s file,it must verify the signature based on the public key PUU of user as
follows:
VIII. Conclusions and Future Research Directions:
This paper propose a more flexible and effective scheme to address data storage security problemsin
cloud computing. The use of IBC provide key management and not need to certificate issued, and ECC led to
protect data security and confidentiality before it stores in cloud servers, also the use of ECDS provide data
integrity. Future researches might consider in future such as use the hierarchal identity-based cryptography
(HIBC) instead of IBC and compare the result with this proposal.
6. Improving Data Storage Security In Cloud Computing Using…
DOI: 10.9790/0661-17414853 www.iosrjournals.org 53 | Page
References
[1]. Jeffrey Voas and Jia Zhang, “Cloud Computing: New Wine or Just a New Bottle?”, Published by the IEEE Computer Society,
2009.
[2]. Sameeh A. Jassim, MSc thesis, “Mediated IBC-Based Management System of Identity and Access in Cloud Computing”, College
of Computer, University of Anbar, 2013.
[3]. SameeraAbdulrahmanAlmulla and Chan YeobYeun, “Cloud Computing Security Management”, Engineering Systems Management
and Its Applications (ICESMA), Presented at 2nd
IEEE International Conference, 30 march 2010.
[4]. Mohamed Abdelhamid, PhD thesis, “Privacy-preserving Personal Information Management”, School of Computer Science, McGill
University, Montreal, August 2009.
[5]. Syam Kumar P and Subramanian R, “An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing”,
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.
[6]. Abbas Amini, MSc thesis, “Secure Storage in Cloud Computing”, Department of Informatics and Mathematical Modelling (IMM),
the Technical University of Denmark, May 2012.
[7]. K.Govinda and Dr.E.Sathiyamoorthy, "Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud",
Published by Elsevier Ltd., Procedia Technology, April, 2012.
[8]. SwarnalataBollavarapu and Bharat Gupta, “Data Security in Cloud Computing”, International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[9]. Sugang Ma, “A Review on Cloud Computing Development”, JOURNAL OF NETWORKS, VOL. 7, NO. 2, FEBRUARY 2012.
[10]. SajjadHashemi, “DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING”, International Journal of Security,
Privacy and Trust Management (IJSPTM) Vol 2, No 4, August 2013.
[11]. Victor Delgado, MSc thesis, “Exploring the limits of cloud computing”, KungligaTekniskaHögskolan (KTH) Stockholm, Sweden,
October 4, 2010.
[12]. UttamThakore, “Survey of Security Issues in Cloud Computing”, College of Engineering, University of Florida, Available at:
http://www.cise.ufl.edu/~sgchen/papers/Survey%20of%20Security%20Issues%20in%20Cloud%20Computing.pdf, Accessed Date:
14 January 2015.
[13]. Albert Caballero and et al, “Open Data Center Alliance:Data Security Framework Rev 1.0”,Open Data Center Alliance, Inc. ALL
RIGHTS RESERVED, 2013.
[14]. Marc Joye and Gregory Neven, “Identity Based cryptography”, IOS Press, 2009.
[15]. JoonsangBaek et al, “A Survey of Identity-Based Cryptography”, Australian Unix Users Group Annual Conference, 2004.
[16]. DivyaNalla and K.C.Reddy, “Signcryption scheme for Identity-based Cryptosystems”, Mathematics of Computation, 2003.
[17]. Liang Yan, ChunmingRong, and Gansen Zhao, “Strengthen Cloud Computing Security with Federal Identity Management Using
Hierarchical Identity-Based Cryptography”, Springer-Verlag Berlin Heidelberg, 2009.
[18]. Ravi Gharshi and Suresha, “Enhancing Security in Cloud Storage using ECC Algorithm”, International Journal of Science and
Research (IJSR), Volume 2 Issue 7, July 2013.
[19]. Chester Rebeiro, M.Sc.thesis, “Architecture Explorations for Elliptic Curve Cryptography on FPGAS”, Department of Computer
Science and Engineering, Indian Institute of Technology, Madras, February 2009.
[20]. William Stallings, “Cryptography and Network Security”,principles and practice 5th
edition,Pearson Education, Inc., 2011.
[21]. Ali MakkiSagheer, MSc thesis, “Enhancement of Elliptic Curve Cryptography Methods”,Computer Science, University of
Technology, 2004.
[22]. Darrel Hankerson, Alfred Menezes and Scott Vanstone, “Guide to Elliptic Curve Cryptography”, Springer-Verlag New York, 2004.
[23]. MajidKhabbazian, MSc thesis, “Software Elliptic Curve Cryptography”,Department of Electrical and Computer Engineering,
University of Victoria, 2004.