SlideShare a Scribd company logo
Abstract
This project explores the development and implementation of a software defined network security system
which is scalable, flexible, resilient, and cost-effective for cloud data centre security service provisioning. A
programmable language, using python (an object oriented programming language) on a software defined
network link for the purpose of providing security to cloud data centre is provided.
A programmable Python security script was written to encrypt the data at the source. In order to provide data
security, using the source and destination socket communication links, implementation across the source and
destination is given. The project focuses on authentication using an AES algorithm on a point to point
connection. However, it does not cover multi-point connections, integrity, and confidentiality of the stored
data in the cloud datacentre. The project contributes to the emerging cloud computing and virtualisation
technology needs. It first decouples security service provisioning from network routing, thus facilitating
operation and management services and later combines hardware and software security devices in a
complementary way, thus achieving excellent flexibility, scalability and cost efficiency.
Some of the major technologies which made the project a success is the advert of virtualisation, virtual
networking, programming APIs, secure socket communication in programming and scripting. These are best
described by the term Infrastructure as a Service (IaaS), Platform as a service (PaaS) and Software as a
Service (SaaS). The project design does not require any modifications to physical switches and routers.
The project illustrates how SDN, Virtualisation and API integration are related to cloud data security. Finally,
it developed an implemented testbed software defined network system. Integrating a cloud database while
providing cloud database security using the python programing script from the source before is uploaded to
the cloud. The thesis provides a detailed understanding of cloud data security using a hybrid security network,
a combination of both hardware, software, and programmable defined security.
Within the project area, several interesting issues for future research are found. Studying the design and
implementation of these networks is important. It minimises the risk of data security breaches across the
three main acceptable standards of information security model designs (authentication/availability, Integrity,
and Confidentiality). The measurement results reinforce the belief that HSNIC is highly applicable to data
centre networks.

More Related Content

What's hot

Ns2 project titles
Ns2 project titlesNs2 project titles
Ns2 project titles
xtreamtechnologies
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titles
Generic Technology
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Shakas Technologies
 
PhD Projects in Cybersecurity Research Ideas
PhD Projects in Cybersecurity Research IdeasPhD Projects in Cybersecurity Research Ideas
PhD Projects in Cybersecurity Research Ideas
PhD Services
 
efficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensingefficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensing
swathi78
 
Network Security Thesis Topics
Network Security Thesis TopicsNetwork Security Thesis Topics
Network Security Thesis Topics
Phdtopiccom
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
chennaijp
 
A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...
finalsemprojects
 
Bachelor Studies Project Details
Bachelor Studies Project DetailsBachelor Studies Project Details
Bachelor Studies Project DetailsAlpana Chaphalkar
 
Pantech Dotnet projects 2017 18
Pantech Dotnet projects 2017 18Pantech Dotnet projects 2017 18
Pantech Dotnet projects 2017 18
Senthil Kumar
 
23
2323
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
Astha Parihar
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu
 

What's hot (18)

Ns2 project titles
Ns2 project titlesNs2 project titles
Ns2 project titles
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titles
 
E2matrix
E2matrixE2matrix
E2matrix
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
PhD Projects in Cybersecurity Research Ideas
PhD Projects in Cybersecurity Research IdeasPhD Projects in Cybersecurity Research Ideas
PhD Projects in Cybersecurity Research Ideas
 
efficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensingefficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensing
 
Network Security Thesis Topics
Network Security Thesis TopicsNetwork Security Thesis Topics
Network Security Thesis Topics
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
 
A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...A secure and efficient id based aggregate signature scheme for wireless senso...
A secure and efficient id based aggregate signature scheme for wireless senso...
 
Bachelor Studies Project Details
Bachelor Studies Project DetailsBachelor Studies Project Details
Bachelor Studies Project Details
 
IEEE 2011 October titles
IEEE 2011 October titles IEEE 2011 October titles
IEEE 2011 October titles
 
Pantech Dotnet projects 2017 18
Pantech Dotnet projects 2017 18Pantech Dotnet projects 2017 18
Pantech Dotnet projects 2017 18
 
23
2323
23
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
 

Similar to Hybrid Security Network for Cloud Information Centre (HSNIC)

Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
Vijay Karan
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
Vijay Karan
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
AJASTJournal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Dr. Richard Otieno
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
IJECEIAES
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET Journal
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
Vijay Karan
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
El35782786
El35782786El35782786
El35782786
IJERA Editor
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
 

Similar to Hybrid Security Network for Cloud Information Centre (HSNIC) (20)

Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
El35782786
El35782786El35782786
El35782786
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 

Hybrid Security Network for Cloud Information Centre (HSNIC)

  • 1. Abstract This project explores the development and implementation of a software defined network security system which is scalable, flexible, resilient, and cost-effective for cloud data centre security service provisioning. A programmable language, using python (an object oriented programming language) on a software defined network link for the purpose of providing security to cloud data centre is provided. A programmable Python security script was written to encrypt the data at the source. In order to provide data security, using the source and destination socket communication links, implementation across the source and destination is given. The project focuses on authentication using an AES algorithm on a point to point connection. However, it does not cover multi-point connections, integrity, and confidentiality of the stored data in the cloud datacentre. The project contributes to the emerging cloud computing and virtualisation technology needs. It first decouples security service provisioning from network routing, thus facilitating operation and management services and later combines hardware and software security devices in a complementary way, thus achieving excellent flexibility, scalability and cost efficiency. Some of the major technologies which made the project a success is the advert of virtualisation, virtual networking, programming APIs, secure socket communication in programming and scripting. These are best described by the term Infrastructure as a Service (IaaS), Platform as a service (PaaS) and Software as a Service (SaaS). The project design does not require any modifications to physical switches and routers. The project illustrates how SDN, Virtualisation and API integration are related to cloud data security. Finally, it developed an implemented testbed software defined network system. Integrating a cloud database while providing cloud database security using the python programing script from the source before is uploaded to the cloud. The thesis provides a detailed understanding of cloud data security using a hybrid security network, a combination of both hardware, software, and programmable defined security. Within the project area, several interesting issues for future research are found. Studying the design and implementation of these networks is important. It minimises the risk of data security breaches across the three main acceptable standards of information security model designs (authentication/availability, Integrity, and Confidentiality). The measurement results reinforce the belief that HSNIC is highly applicable to data centre networks.