International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Gestao da Inovacao - Processo e Projeto de InovacaoKenneth Corrêa
Segunda aula da disciplina de Gestão da Inovação oferecida como parte do curso de Gestão da Informação, do Conhecimento e Novas Tecnologias, cobrindo os processos de inovação e a elaboração de um projeto
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Gestao da Inovacao - Processo e Projeto de InovacaoKenneth Corrêa
Segunda aula da disciplina de Gestão da Inovação oferecida como parte do curso de Gestão da Informação, do Conhecimento e Novas Tecnologias, cobrindo os processos de inovação e a elaboração de um projeto
E-BOOK: ASSESSORIA DE IMPRENSA RESPONSÁVEL NA ERA DIGITALComunique-se
Veja mais estudos em: blog.comunique-se.com.br
Publicado pelo Depto. de Estado dos EUA esse e-Book traz as experiências de uma profissional que ocupou diversos cargos de comunicação no governo norte-americano. Saiba as regras que mudaram para as Assessorias de Imprensa na Era Digital e como utilizar a comunicação em situações de crise.
Todo el mundo “conoce” el concepto de inteligencia, pero ¿todos hablamos de lo mismo?, incluso
distinguimos en el lenguaje coloquial ente inteligente para los estudios y actividades intelectuales
en general, y listo para los negocios, las vida diaria.
A lo largo de la historia han sido numerosos los autores que han intentado definir el concepto de
inteligencia, pero muy pocos coinciden en sus definiciones, esto indica que existen dificultades para abarcarla y que su naturaleza es muy compleja.
Para iniciarse en el mundo de las Inteligencias Múltiples, os comparto este artículo: páginas 7 y 8, de la Revista Pasillos 2013 del IES Tierra de Campos de Villalpando.
El artículo ha sido elaborado bajo mi supervisión con los alumnos de la Asignatura de Psicología de 1º de Bachillerato.
Enlace de la revista:
http://es.calameo.com/read/002564893ea405d06d882
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Aes based secured framework for cloud databasesIJARIIT
A Cloud database management system is a distributed database that delivers computing as a service (Caas) instead of
a product. Improving confidentiality of information stored in a cloud database .It is a very important contribution to the cloud
database. Data encryption is the optimum solution for achieving confidentiality. In some normal methods, encrypt the whole
database through some standard encryption algorithm that does not allow in SQL database operations directly on the cloud. This
formal solution affected by workload and cost would make the cloud database service inconvenient. I propose a novel
architecture for adaptive encryption of public cloud database. Adaptive encryption allows any SQL operation over encrypted
data. The novel cloud database architecture that uses adaptive encryption technique with no intermediate servers. This scheme
provides cloud provider with the best level of confidentiality for any database workload. I can determine the encryption and
adaptive encryption cost of data confidentiality from the research point of view. Index Terms Adaptive encryption Technique, AES (Advanced encryption Standard), Metadata.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving Data Storage Security in Cloud using HadoopIJERA Editor
The rising abuse of information stored on large data centres in cloud emphasizes the need to safe guard the data. Despite adopting strict authentication policies for cloud users data while transferred over to secure channel when reaches data centres is vulnerable to numerous attacks .The most widely adoptable methodology is safeguarding the cloud data is through encryption algorithm. Encryption of large data deployed in cloud is actually a time consuming process. For the secure transmission of information AES encryption has been used which provides most secure way to transfer the sensitive information from sender to the intended receiver. The main purpose of using this technique is to make sensitive information unreadable to all other except the receiver. The data thus compressed enables utilization of storage space in cloud environment. It has been augmented with Hadoop‟s map-reduce paradigm which works in a parallel mode. The experimental results clearly reflect the effectiveness of the methodology to improve the security of data in cloud environment.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Kp3419221926
1. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1922 | P a g e
Secure User Data in Cloud Computing Using Encryption
Algorithms
Anshu Parashar*, Rachna Arora**
*(Assistant Professor, HCTM, Kaithal, Haryana)
** (Research Scholar, HCTM, Kaithal, Haryana)
ABSTRACT
Cloud Computing is transforming
information technology. As information and
processes are migrating to the cloud, it is
transforming not only where computing is done,
but also fundamentally, how it is done. As
increasingly more corporate and academic worlds
invest in this technology, it will also drastically
change IT professionals’ working environment.
Cloud Computing solves many problems of
conventional computing, including handling peak
loads, installing software updates, and, using
excess computing cycles. However, the new
technology has also created new challenges such as
data security, data ownership and trans-code data
storage. In this paper we have discussed about
cloud computing security issues, mechanism,
challenges that cloud service provider face during
cloud engineering and presented the metaphoric
study of various security algorithms.
Keywords - Algorithms: AES, Blowfish, DES, RSA,
Cloud Computing, Data Security
I. INTRODUCTION
Cloud Computing is the ability to access a
pool of computing resources owned and maintained
by a third party via the Internet. It is not a new
technology but a way of delivering computing
resources based on long existing technologies such as
server virtualization. The “cloud” is composed of
hardware, storage, networks, interfaces, and services
that provide the means through which users can
access the infrastructures, computing power,
applications, and services on demand which are
independent of locations. Cloud computing usually
involves the transfer, storage, and processing of
information on the „providers‟ infrastructure, which
is not included in the „customers‟ control policy.
The concept Cloud Computing is linked
closely with those of Information as a Service (IaaS),
Platform as a Service (PaaS), Software as a Service
(SaaS) all of which means a service oriented
architecture [1]. Here comes the first benefit of the
Cloud Computing i.e. it reduces the cost of hardware
that could have been used at user end. As there is no
need to store data at user‟s end because it is already
at some other location. So instead of buying the
whole infrastructure required to run the processes and
save bulk of data which You are just renting the
assets according to your requirements.
The similar idea is behind all cloud network
[2].It uses remote services through a network using
various resources. It is basically meant to give
maximum with the minimum resources i.e. the user
end is having the minimum hardware requirement but
is using the maximum capability of computing. This
is possible only through this technology which
requires and utilizes its resources in the best way.
The advantage of cloud computing over traditional
computing include: agility, lower entry cost, device
independency, location independency, and
scalability [1]. In order to solve the problem of data
integrity checking, many schemes are proposed
under different systems and security models [2], [3],
[4], [5], [6]. In all these works, great efforts are made
to design solutions that meet various requirements:
high scheme efficiency, stateless verification,
unbounded use of queries and retrievability of data,
etc. Considering the role of the verifier in the model
all the schemes presented before fall into two
categories: private auditability and public
auditability. Although schemes with private
auditability can achieve higher scheme efficiency,
public auditability allows anyone not just the client
(data owner), to challenge the cloud server for
correctness of data storage while keeping no private
information.
II. SECURITY ISSUES AND CHALLENGES OF
CLOUD COMPUTING
Security is considered as one of the most
critical aspects in everyday computing and it is not
different for cloud computing due to sensitivity and
importance of data stored on the cloud. Cloud
Computing infrastructure uses new technologies and
services, most of which haven‟t been fully evaluated
with respect to the security. Cloud Computing has
several major issues and concerns, such as data
security, trust, expectations, regulations, and
performances issues.
One issue with cloud computing is that the
management of the data which might not be fully
trustworthy; the risk of malicious insiders in the
cloud and the failure of cloud services have received
a strong attention by companies.
Whenever we discussed about security of cloud
computing, there are various security issues arise in
2. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1923 | P a g e
path of cloud. Some of the security concerns and
solutions of them are listed and directed below:
2.1 SECURITY CONCERN 1
With the cloud physical security is lost
because of sharing computing resources with other
companies. No knowledge or control of where the
resources run.
ENSUE: Secure Data Transfer
2.2 SECURITY CONCERN 2
Ensuring the integrity of the data (transfer,
storage, and retrieval) really means that it changes
only in response to authorized transactions. A
common standard to ensure data integrity does not
yet exists.
ENSUE: Secure Software Interfaces
2.3 SECURITY CONCERN 3
Customer may be able to sue cloud service
providers if privacy rights are violated, and in any
case the cloud service providers may face damage to
their reputation. Concerns arise when it is not clear to
individuals why their personal information is
requested or how it will be used or passed on to other
parties.
ENSUE: Data Separation
2.4 SECURITY CONCERN 4
Who controls the encryption/decryption
keys? Logically it should be the customer.
ENSUE: Secure Stored Data
2.5 SECURITY CONCERN 5
In case of Payment Card Industry Data
Security Standard (PCI DSS) data logs must be
provide to security mangers and regulators [6], [7],
[8].
ENSUE: User Access Control
III. PROBLEM FORMULATION
There are various policies issues and threats
in cloud computing technology which include
privacy, segregation, storage, reliability, security,
capacity and more. But most important among these
to concern is security and how service provider
assures it to maintain. Generally cloud computing has
several customers such as ordinary users, academia
and enterprises who have different motivations to
move to cloud. If cloud clients are academia, security
effect on performance of computing and for them
cloud providers have to find a way to combine
security and performance. For enterprises most
important problem is also security but with different
vision. So, we mainly concentrate on USER_CLOUD
security of cloud computing using encryption
algorithm using particular proposed plan.
IV. PROPOSED WORK PLAN
We have proposed different security
algorithms to eliminate the concerns regarding data
loss, segregation and privacy while accessing web
application on cloud. Algorithms like: RSA, DES,
AES, Blowfish have been used and comparative
study among them have also been presented to ensure
the security of data on cloud. DES, AES, Blowfish
are symmetric key algorithms, in which a single key
is used for both encryption/decryption of messages
whereas DES (Data Encryption Standard) was
developed in early 1970s by IBM. Blowfish was
designed by Bruce Schneier in 1993, expressly for
use in performance constrained environments such as
embedded system. AES (Advanced Encryption
Standard) was designed by NIST in 2001. RSA is a
public key algorithm invented by Rivest, Shamir and
Adleman in 1978 and also called as Asymmetric key
algorithm, the algorithm that uses different keys for
encryption and decryption purposes. The key sizes of
all the algorithms are different from each other. The
key length of DES algorithm is 56 bits. The key size
of AES algorithm is 128, 192, 256 bits. The key size
of Blowfish algorithm is 128-448 bits. The key size
of RSA algorithm is 1024 bits.
Using Net beans IDE 7.3, and Java Run Time
Environment, we have implemented our idea in the
form of encryption and decryption algorithms which
have discussed above and also we have made
comparison between them on the basis of their
characteristics.
V. SECURITY ALGORITHM USED IN CLOUD
COMPUTING
5.1 RSA ALGORITHM
The most common Public Key algorithm is
RSA, named for its inventors Rivest, Shamir, and
Adleman (RSA). RSA is basically an asymmetric
encryption /decryption algorithm. It is asymmetric
in the sense, that here public key distributed to all
through which one can encrypt the message and
private key which is used for decryption is kept
secret and is not shared to everyone.
How RSA is going to work in cloud
environment is explained as: RSA algorithm is used
to ensure the security of data in cloud computing. In
RSA algorithm we have encrypted our data to
provide security. The purpose of securing data is that
only concerned and authorized users can access it.
After encryption data is stored in the cloud. So that
when it is required then a request can be placed to
cloud provider. Cloud provider authenticates the user
and delivers the data to user. As RSA is a Block
Cipher in which every message is mapped to an
integer. In the proposed cloud environment, Public
key is known to all, whereas Private Key known
only to user who originally owns the data. Thus
encryption is done by the cloud service provider and
decryption is done by the cloud user or consumer.
3. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1924 | P a g e
Once the data is encrypted with the Public key, it
will be decrypted using the corresponding Private
Key only.
5.2 AES ALGORITHM
Advanced Encryption Standard (AES), also
known as Rijindael is used for securing information.
AES is a symmetric block cipher that has been
analyzed extensively and is used widely now-a-days.
How AES works in cloud environment? AES,
symmetric key encryption algorithm is used with key
length of 128-bits for this purpose. As AES is used
widely now-a-days for security of cloud.
Implementation proposal states that First, User
decides to use cloud services and will migrate his
data on cloud. Then User submits his services
requirements with Cloud Service Provider (CSP) and
chooses best specified services offered by provider.
When migration of data to the chosen CSP happens
and in future whenever an application uploads any
data on cloud, the data will first encrypted using
AES algorithm and then sent to provider. Once
encrypted, data is uploaded on the cloud, any request
to read the data will occur after it is decrypted on the
users end and then plain text data can be read by
user. The plain text data is never written anywhere
on cloud. This includes all types of data. This
encryption solution is transparent to the application
and can be integrated quickly and easily without any
changes to application. The key is never stored next
to the encrypted data, since it may compromise the
key also. To store the keys, a physical key
management server can be installed in the user‟s
premises. This encryption protects data and keys and
guarantees that they remain under user‟s control and
will never be exposed in storage or in transit. AES
has replaced the DES as approved standard for a
wide range of applications.
5.3 DES ALGORITHM
The Data Encryption Standard (DES) is a
block cipher. It encrypts data in blocks of size 64 bits
each. That is 64 bits of plain text goes as input to
DES, which produces 64 bits of cipher text. The same
algorithm and key are used for encryption and
decryption, with minor differences. The key length of
this algorithm is 56 bits; however a 64 bits key is
actually input. DES is therefore a symmetric key
algorithm.
5.4 BLOWFISH ALGORITHM
Blowfish is a symmetric key cryptographic
algorithm. Blowfish encrypts 64 bit blocks with a
variable length key of 128-448 bits. According to
Schneier, Blowfish was designed with the followings
objectives in mind:
a) Fast- Blowfish encryption rate on 32-bit
microprocessors is 26 clock cycles per byte.
b) Compact- Blowfish can execute in less than 5
kb memory.
c) Simple-Blowfish uses only primitive operation
-s, such as addition, XOR and table look up,
making its design and implementation simple.
d) Secure- Blowfish has a variable key length up
to maximum of 448-bit long, making it both
secure and flexible.
Blowfish suits applications where the key remains
constant for a long time (e.g. Communications link
encryption), but not where the key changes
frequently (e.g. Packet Switching).
5.5 IMPLEMENTATION OF ALGORITHMS
Implementation of algorithms has been done
using NetBeans IDE and Java.
Coding examples of algorithms have shown below:
Example Coding 1 for making Cloud data secure
Example Coding 2 for making Cloud data secure
5.6 RESULTS
5.6.1 CHARACTERISTICS AND COMPARISON OF
ALGORITHMS
TABLE 1
Charact
eristics
AES RSA BLOW
FISH
DES
Platfor
m
Cloud
Computi
ng
Cloud
Computi
ng
Cloud
Comput
ing
Clou
d
Com
putin
g
Key Size 128,192,
256 bits
1024
bits
32-448
bits
56
bits
Key
Used
Same
key is
Public
key is
Same
key is
For
encr
4. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1925 | P a g e
used to
encrypt
and
decrypt
the
blocks.
used for
encrypti
on and
private
key, for
decrypti
on
used for
both
encrypti
on and
decrypti
on of
data.
yptio
n
and
decr
yptio
n
same
key
is
used.
Scalabili
ty
Scalable Not
Scalable
Scalable Scal
able
Initial
Vector
Size
128 bits 1024
bits
64 bits 64
bits
Security Secure
for both
provider
and user.
Secure
for user
only
Secure
for both
provider
s and
user/clie
nt side
Secu
rity
appli
ed to
both
prov
iders
and
user
Data
Encrypt
ion
Capacit
y
Used for
encryptio
n of large
amount
of data
Used for
encrypti
on of
small
data
Less
than
AES
Less
than
AES
Authent
ication
Type
Best
authentic
ity
provider
Robust
authenti
cate
impleme
ntation
Compar
able to
AES
Less
auth
entic
ation
type
than
AES
.
Memory
Usage
Low
RAM
needed
Highest
memory
usage
algorith
m
Can
execute
in less
than 5
kb
Mor
e
than
AES
Executi
on Time
Faster
than
others
Requires
maximu
m time
Lesser
time to
execute
Equa
ls to
AES
VI. CONCLUSION AND FUTURE PROSPECTS
In this paper we have proposed encryption
algorithm to make cloud data secure and vulnerable
and we gave concern to security issues, challenges
and made comparison between AES, DES,
BLOWFISH and RSA Algorithms to find the best
one security algorithm, which has to be used in cloud
computing for making cloud data secure and not to
be hacked by attackers.
Encryption algorithms play an important
role in data security on cloud and by comparison of
different parameters used in algorithms, we have
found that AES algorithm uses least time to execute
cloud data. Blowfish algorithm has least memory
requirement. DES algorithm consumes least
encryption time. RSA consumes longest memory size
and encryption time. By doing implementation for all
algorithms in IDE tool and JDK 1.7 we have
achieved the desired output for our data on cloud
computing. In today‟s era demand of cloud is
increasing so the security of the cloud and user is on
top concern. Our proposed algorithms are helpful for
today‟s requirement. In future we can provide several
comparisons with our approach with result to show
effectiveness of our proposed framework.
ACKNOWLEDGEMENT
Our Thanks to HCTM, Kaithal for
development of this paper.
REFERENCES
Journal Papers:
[1] Zhidong Shen, Li Li , Fei Yan, Xiaoping
Wu , Cloud Computing System Based on
Trusted Computing Platform,(2010)
International Conference on Intelligent
Computation Technology and Automation.
[2] Mr. Pritesh Jain, Prof. Vaishali Chourey,
Prof. Dheeraj Rane, An Analysis of Cloud
Model-Based Security for Computing
Secure Cloud Bursting and Aggregation in
Real Environment, International Journal of
advanced Computer Research(IJACR)
Volume 1, September 2011.
[3] Rohit Bhadauria, Rituparna Chaki,
Nabendu Chaki and Sugata Sanyal,” A
Survey on Security Issues in Cloud
Computing”. IJRCCT, ISSN 2278-5841, Vol
1, Issue 4, September 2012.
[4] Mohammed, E.M, Ambelkadar, H.S,
Enhanced Data Security Model on Cloud
Computing, IEEE publication, 2012,8th
International Conference on, On page(s):cc-
12-cc-17
[5] Sang Ho.Na, Jun-Young Park, Eui- Nam
Huh, Personal Cloud Computing Security
Framework, Service Computing Conference
(APSSC), Dec 2010 IEEE, On page(s): 671-
675.
[6] Wang,J.K.;Xinpei Jia, Data Security and
Authentication in hybrid cloud computing
model, Global High Tech Congress on
Electronics (GHTCE), 2012 IEEE, On
page(s): 117-120.
[7] Iankoulova, I.; Daneya, M., Cloud
computing security reuirements: A
systematic review, Research Challenges in
Information Science (RCIS), 2012 Sixth
International Conference on, On page(s): 1
- 7.
5. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1926 | P a g e
[8] Cloud Security Alliance, Top Threats to
Cloud
ComputingV1.0,http://www.cloudsecurityall
iance.org/topthreats.
[9] Puneet Jai Kaur, Sakshi Kaushal, Security
Concerns in Cloud Computing,
Communication in Computer and
Information Science Volume169, 2011, pp
103-112.
[10] Pearson, S., Benameur, A., Privacy, Security
and Trust Issues Arises from Cloud
Computing, Cloud Computing Technology
and Science (CloudCom), 2010 IEEE
Second International Conference, On
page(s): 693-702.
Books:
[11] McGraw Hill, Cloud Computing, A Practical
Approach, By Toby Velte, Anthony Velte,
Robert Elsenpeter.
[12] Furht,B., and Escalante,A. (2010).
Handbook of Cloud Computing. New York:
Springer.
Chapters in Books:
[13] Cloud Computing, A Practical Approach,
Chapter 8, Cloud Storage, page(s): 234-253
in (2012) by Toby Velte, Anthony Velte, and
Robert Elsenpeter.
[14] Vamsee Krishna Yarlagadda and Sriram
Ramanujam, Data Security in Cloud
Computing, Vol 2 (1), page(s):15-23 in 2011
Proceeding Papers:
[15] W.J. Book, European Network and
Information Security Agency (ENISA), 29th
IEEE Conference on Cloud Computing
Benefits, Risks and Recommendations.