Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
Remote Access and Dual Authentication for Cloud StorageIJMER
Cloud computing is an emerging technology, which provides services over internet such as
software, hardware, network and storage. The key role for cloud computing is virtualization which
reduces the total cost and gives reliable, flexible and secured services. However compute service are
chosen between the providers located in multiple data centres. One of the major security concerns
related to the virtualization and the Storage where the outside attackers can use the files in the storage
and the data owners are not capable of knowing attacks. In this paper we proposed a high level
authentication for the cloud user and remote monitor controlled of your cloud storage. Here our model
provides the dual authentication for the cloud and to get the runtime record of the logs and the secured
application controls, the logs are remotely accessed and controlled by the owner of the data.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
Remote Access and Dual Authentication for Cloud StorageIJMER
Cloud computing is an emerging technology, which provides services over internet such as
software, hardware, network and storage. The key role for cloud computing is virtualization which
reduces the total cost and gives reliable, flexible and secured services. However compute service are
chosen between the providers located in multiple data centres. One of the major security concerns
related to the virtualization and the Storage where the outside attackers can use the files in the storage
and the data owners are not capable of knowing attacks. In this paper we proposed a high level
authentication for the cloud user and remote monitor controlled of your cloud storage. Here our model
provides the dual authentication for the cloud and to get the runtime record of the logs and the secured
application controls, the logs are remotely accessed and controlled by the owner of the data.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
Abstract— Cloud computing is so named for the reason that the information being accessed is found in the "clouds", it
does not entail a user to be in a precise place. Organizations found that cloud computing allows them to diminish the cost
of information management, in view of the fact that they are not obligatory to own their own servers. They can use
capacity leased from third parties. It is more important to store and to secure the data in the cloud. It plays a vital role in
the cloud. The data that can be secured by implementing SVAC (Security Virtualization Architecture for Cloud) Firewall
in the virtual environment. An effectual firewall security has been implemented for jamming and filtering the superfluous
requests coming from the clients prior to the request move towards the virtual machine. Next step is to secure the users.
During the demand dispensation, if the abuser requests the sophisticated of information from the cloud, then based on the
compensation prepared by the cloud client, they can access the data from the cloud server. This paper shows the
architecture and the unwanted request can be restricted through SVAC firewall also how the high level of data that can be
accessed by the highly authorized user.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems.
Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
Third Party Public Auditing Scheme for Security in Cloud Storageijtsrd
"By means of cloud storage, users can distantly store their data and enjoy the on demand high quality applications and services from a shared group of configurable computing resources, without the burden of local data storage and maintenance. However, the information that users no longer have physical ownership of the outsourced data makes the data integrity protection in cloud computing a difficult task, particularly for users with constrained computing resources. Moreover, users should be able to just use the cloud storage space as if it is local, without worrying about the need to verify its integrity. Thus, to enable public auditability for cloud storage is of serious importance so that users can rely on a third party auditor TPA to verify the integrity of outsourced data and be worry free. To securely introduce a well organized TPA, the auditing process should bring in no new vulnerabilities to user data privacy, and introduce no additional online burden to user. However we propose a secure cloud storage system supporting privacy preserving public auditing and monitoring. We additional would extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, also integrity of data in cloud. Extensive security and performance analysis show the future schemes are provably secure and highly well organized. Our beginning tryouts would be conducted on Amazon EC2 instance additional demonstrating the fast performance of the design. Heeth Shah | Jill Shah | Ushma Desai ""Third Party Public Auditing Scheme for Security in Cloud Storage"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21687.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/21687/third-party-public-auditing-scheme-for-security-in-cloud-storage/heeth-shah"
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
Abstract— Cloud computing is so named for the reason that the information being accessed is found in the "clouds", it
does not entail a user to be in a precise place. Organizations found that cloud computing allows them to diminish the cost
of information management, in view of the fact that they are not obligatory to own their own servers. They can use
capacity leased from third parties. It is more important to store and to secure the data in the cloud. It plays a vital role in
the cloud. The data that can be secured by implementing SVAC (Security Virtualization Architecture for Cloud) Firewall
in the virtual environment. An effectual firewall security has been implemented for jamming and filtering the superfluous
requests coming from the clients prior to the request move towards the virtual machine. Next step is to secure the users.
During the demand dispensation, if the abuser requests the sophisticated of information from the cloud, then based on the
compensation prepared by the cloud client, they can access the data from the cloud server. This paper shows the
architecture and the unwanted request can be restricted through SVAC firewall also how the high level of data that can be
accessed by the highly authorized user.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
This document is a comprehensive analysis of all the ways that Identity and Access Management (IAM) solutions can be run in and integrate with cloud computing systems.
Both cloud computing and IAM are relatively new, so the first part of this document defines key concepts and terminology. Next, assumptions that clarify the scope of this document in terms of network topology and functionality are presented and finally a comprehensive list of architectural scenarios are presented, along with an analysis of the costs, risks and benefits of each scenario.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
Third Party Public Auditing Scheme for Security in Cloud Storageijtsrd
"By means of cloud storage, users can distantly store their data and enjoy the on demand high quality applications and services from a shared group of configurable computing resources, without the burden of local data storage and maintenance. However, the information that users no longer have physical ownership of the outsourced data makes the data integrity protection in cloud computing a difficult task, particularly for users with constrained computing resources. Moreover, users should be able to just use the cloud storage space as if it is local, without worrying about the need to verify its integrity. Thus, to enable public auditability for cloud storage is of serious importance so that users can rely on a third party auditor TPA to verify the integrity of outsourced data and be worry free. To securely introduce a well organized TPA, the auditing process should bring in no new vulnerabilities to user data privacy, and introduce no additional online burden to user. However we propose a secure cloud storage system supporting privacy preserving public auditing and monitoring. We additional would extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, also integrity of data in cloud. Extensive security and performance analysis show the future schemes are provably secure and highly well organized. Our beginning tryouts would be conducted on Amazon EC2 instance additional demonstrating the fast performance of the design. Heeth Shah | Jill Shah | Ushma Desai ""Third Party Public Auditing Scheme for Security in Cloud Storage"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21687.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/21687/third-party-public-auditing-scheme-for-security-in-cloud-storage/heeth-shah"
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
In the adaptive video streaming (AVS) literature the term fair sharing has been used to describe equal amounts of bandwidth allocated to adaptive client players. However, we argue that even though bandwidth sharing is an important aspect in some problems the same does not apply to AVS. Here the term relative ‘fair’ sharing is more applicable. The reason is that videos have different quality levels and will require differing amounts of the bandwidth to satisfy their needs. A 90% to 10% sharing may be sufficient for two players, one with high demands and the other with low demands. A 50% sharing may lead the player with the high bandwidth demand to get too little of the needed bandwidth resource. In addition, channel conditions may lead to players requiring different amount of bandwidth. Again, the concept of fair sharing has to be extended to relative ‘fair’ sharing for such scenarios. Hence, bandwidth estimation techniques players use to estimate the network bandwidth is very important in segment selection. A player utilizes one of the many techniques to determine what share of the bandwidth it can utilize among competing players. In this paper we explore some of the techniques used in state of-the-art players in their attempt to obtain a ‘fair’ share of the network bandwidth.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Network as a Service Model in Cloud Authentication by HMAC Algorithm
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2018) ISSN: 0975-0290
3623
Network as a Service Model in Cloud
Authentication by HMAC Algorithm
Bommala Harikrishna
Ph.D Full Time Research Scholar, Research ID: M-7489-2017
Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur
Kadapa, Andhra Pradesh, India- 516360
Email: haribommala@gmail.com
Dr. S. Kiran
Assistant Professor, Department of Computer Science and Engineering,
YSR Engineering College of Yogi Vemana University Proddatur
Kadapa, Andhra Pradesh, India- 516360
Email: rkirans125 @gmail.com
K. Mani Deep
Assistant Professor, Department of Computer Science and Engineering,
Bapatla Engineering College, Bapatla, AP, India- 522101
Email: manideep.karumanchi@gmail.com
-------------------------------------------------------------ABSTRACT---------------------------------------------------------------------
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Keywords – Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 05, 2018 Date of Acceptance: March 23, 2018
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In the year 2009, IT commercial organizations announced
that Cloud was the second place. The role in IT industries
has to sustain data centers and cloud profoundly
infrastructures for rendering like Digital Ocean, Amazon
Web Service, Yard, Wireshark, and Microsoft Azure.
Through internet to service utility computing to software
service by data centers to obtaining the internet to access
the application services. The Hardware as a Service
(HaaS) infers a virtual provider with respect to registering
assets like OSs, organizing, Infrastructure, virtualization
innovation, and [2] capacity administrations. Noblest IaaS
benefit provider by AWS. This association can be
overviewed as the fundamental system for another two
associations, for example, PaaS and SaaS. In Application
as a Service (SaaS), buyers or customers contract
programming encouraged by the expert organization. It
comes to pass web based on installment [6]. If providers
started using the virtual private cloud network (VPCN) for
communication [3]. IT infrastructures such as the spread
of wired/wireless broadcasting network moreover [6] the
variety of toolsets, high speed, and the scope of free
software and so on. The customer has faced with problems
of authentication in a cloud model of service in
Authentication as a Service [9].
Fig 1: Cloud Computing
There are bunches of components and devices are recently
connected yet, we are confronting numerous sorts of issues
in the web world. Into a neighborhood machine IPV4
arrange designed to get to the cloud and switch setup to
keep up the username and secret word for verification to
center around inquire about for validation for packets [10].
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3624
The analysis shows that to be able to offer secured
neighborhood communique then plaintext passwords and
keyed MD5 authentication is wished. Plaintext passwords
are prone to eavesdropping, at the [11] same time as keyed
MD5 authentication can successfully protect network
protocol exchanges.
II. AUTHENTICATION AS A SERVICE IN
CLOUD FOR USER
Service model cloud for new users has accessed any
resource pooling fully depend on the authentication. In
Generally service provider mention the registration for
privacy info after, providers give customer ID for
identification, and method for authentication for customer
authentication finished for registration done. When service
utilizing in a client, that time asking the authentication and
ID of the client. In AaaS maintained by the strong
authentication in some possibility way of authentication
process has been hacked by the hacker, that reason AaaS
one part of PaaS maintain safe techniques like PSWD,
MFA(Multi-Factor-Authentication), CAPKI (Crypto-
Authentication-Public-Key-Infrastructure), SOO(Sign-On-
One), OTP (One-Time-Password) and SBMM (Scan-Bar-
Code-Mobile-Method).
2.1 weakness of Authentication as a Service in Cloud:
PSWD: PSWD nothing but a password, is a one of
Authentication as a Service. Now a days electronics device
has maintained the password for security. In some
situations is a complication and immediately hold the
renewal password for security reasons.
MFA: Multi-Factor-Authentication is a kind of
Authentication as a Service. MFA was clubbed with
different methods like password, iris, OTP, certificate and
biometrics.
CAPKI: Crypto-Authentication-Public-Key-
Infrastructure is among one of in an Authentications as a
Service. Based on the certificate to authenticate third
party, but don’t share the safe info. The client way of to
manage and inspect are not possible by the CAPKI.
SOO: Sign-On-One is a kind of Authentication as a
Service. If authenticate any one application, then assertion
access through the other side.
MTM: Mobile Trusted Module is proposed by TCG
which Samsung, Nokia, Ericson etc., which based on SIM
with authentication for Smartphone.
2.2 Dangerous Attack for Authentication:
An inflow of data packet through the internet from source
to destination in that time the third party attacking the
packets during the network.
Active Attacks: In computing security, an active attack is
characterized by the attacker attempting to interrupt into
the gadget. At some stage in an energetic attack, the
intruder will introduce statistics into the device, in addition
to doubtlessly trade records in the gadget.
Dos Attacks: The attacks paintings via asking for such a
lot of resources from a server that the server cannot reply
to valid requests. As Dos assault that originates from a
single tool.
Distributed Attacks: Inside the beyond, recoveries had
been limited to the processing energy of only one
machine. It has to calculate the energy of the machine by
using DNA and around the globe to decrypt passwords.
Close in Attacks: One kind of close in assaults is social
engineering attacks wherein the attacker uses information
of the other persons and attempts to take advantage of
them with the aid of sending an e-mail or telephone and
tries to acquire confidential facts [18] about their bank
bills and so forth. In close-in-assaults, the attacker tries to
gain records from bodily entities or community
components by way of getting bodily near.
DDoS Attacks: Now and again protection specialists can
purpose command and manage laptop structures inner a
botnet, disrupting operations. But, figuring out command
and manipulate devices takes time. Even postulate those
are recognized then eliminated, partial botnets are
designed in imitation of slip off regarding a failed
command [19].
III. ARCHITECTURE FOR CLOUD WITH
GNS3
GNS3 (Graphical Network Simulator), the remarkable
network simulation software permits you after be part of
then cooperate virtual network topologies after actual
networks [12]. This exquisite feature of GNS3 brings
CCNA, CCNP then CCIE labs [4] with absence hardware!
Individually, I was plenty severe then got here in imitation
of understand that opportunity inside GNS3. You may
even associate in [1] accordance with digital machines
past VMware then virtual container to this robust section
on software. To tell the Idle computer charge into GNS3
going for walks above the windows platform [5]. Linking
a virtual topology into GNS3 to actual devices is at all
exciting or sturdy then as makes enterprise network setup
nicely.
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3625
Fig 2: Cloud with GNS3
In cloud, internet network based on applications so,
networking is a configured with an IP address in IPV4 in
local system [16]. That IP address configure within Cloud.
In business market simulation routers have so many, but
GNS3 provide routers like 1720,1710,2660,3675 and 7200
and so on. But unique ideal number generally generates
for each every time in a router for every user [13]. On
GNS3 connection with cloud based upon IP address with
the port number and configure router. On each and every
router has a open by using putty software.
3.1 Message Digest Key Authentication Routing
Authentication:
In attacker’s security reason for using MD-5
Cryptography-Key-Algorithms.MD-5 algorithm partition
into the modules, each module block size of input 512 bits.
At the end of the last block of module join the 64 bits. The
genuine input date, length recording purpose used the 64
bits. If the last block is less than 512 bits, some extra bits
are 'padded' to the end. Each block contains sixteen words
of 32 bits each [11]. It is the representation as A0, A1,
A2, A3… A15.
The buffer is part of MD-5, creates 4 words and each
holds 32 bits long. The listed below
i. ONE: 01 23 45 67 (A)
ii. TWO: 89 ab CD ef (B)
iii. THREE: fe dc ba 98 (C)
iv. FOUR: 76 54 32 10 (D)
Trigonometry Sin function is calculate to enhancement on
future utilizing so maintain the MD-5 table T.
Tj = abs(sin(j + 1)) * 232.
We consider ‘T’ has 64 elements.
Element number j is indicated as Tj.
AUXILIARY OF MESSAGE DIGEST KEY
AUTHENTICATION ROUTING
AUTHENTICATION:
It’s used to logical operator , , 7, and, xor to the input
data. Each function takes 3 32-bits and gives the output
one 32-bit.
P(L,M,N) = (L and M) or (not(L) and N) (F)
Q(L,M,N) = (L and N) or (M and
not(N)) (G)
R(L,M,N) = L xor M xor N (H)
S(L,M,N) = M xor (L or not(N))(I)
MD-5 have four rounds, each participate 16 operations
below is one operation.
There are four rounds, each involves 16 basic operations
Fig 3: Message Digest Key Authentication Routing
Authentication algorithm for single operation.
Message Digest Hash function algorithm generates a hash
value to observing the OSPF routing packets and
authenticate a password. The packets are transmitted
within hash value attached to take a KEY-ID and non-
decreasing the linear number [7]. The Receiver should
know the same password of the sender, computes its own
hash value. Third-party modifies the message without
permission of the sender but, don’t worry about the
original message because of the hash value of should be
same sender and receiver [15]. Multiple passwords allow
the router so each password contains unique key-id. So all
passwords are collaborating or migrate easy and secure is
more. However, they do need to be the same between
neighbors. The Authentication type area, that's
configurable on a router per-interface foundation, [14]
identifies the authentication set of rules. MD5
authentication at the sending router.
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3626
Fig 4: Message Digest Key Authentication Sending and
Receiver Router C3645.
IV. GNS3 WITH CLOUD IMPLEMENTATION
BY PROPOSED ALGORITHM AND
EXPERIMENT
In this research and analyzing work, by the outside
network to internal network request from connection to
destination system in flood attackers. Before starting the
implementation of Cloud with GNS3 authentication by
using the md5 cryptography algorithm, has required the
open source latest version GNS3 [8] with browser the
router and Loopback Network Adapter with IP address
assigning with virtual cloud configure with nodes in NIO
Ethernet. In ISO, Cisco C3745 dynamics GT96100-FE
router images are downloaded in GNS3 open source
website. In router configure with Ethernet, Fast Ethernet
and Serial. Each router has a unique idle number [4]. In
Gns3 with the cloud router has contains Telnet 127.0.0.1:
port numbers 5000, 5001, 5003 and so on and inner
configure python 3.6.3 version.
Fig 5: Configure Cloud with Network as a Service.
After completion of configuration check the cloud is
connected or not, then open which router is connect the
cloud by using putty.
R1# ping 8.8.8.8 repeat 20
Sending 5, 100-byte echo to 8.8.8.8 time out to reach 2
seconds.
! , ! ! ! , ! ! ! ! ! ! ! ! , ! ! ! , !
The Success rate is 80 percent (16/20), round-trip
min/avg/max = 74/81/124 ms.
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3627
Fig 6: Cloud connection by Putty with Router.
4.1 Steps for Router Configuration:
Step 1: open all routers using putty.
Step 2: enable router configuration.
Step 3: configuration terminal in router.
Step 4: By using Ethernet, Fast Ethernet, Serial
and ATM any one configure the interface.
Step 5: set the IP address and subnet mask.
Step 6: save the all configuration.
Above steps configuration to all the routers, after ping
individual IP address. Calculate the individual min/ avg
/max.
Fig 7: Connecting all Routers with IP address Success
Rate.
4.2 Proposed Algorithm Implementation for Ospf
Authentication-Key with Message Digest Algorithm
Cloud:
Algorithm: pre-requests are VPCS =VP{VP1,VP2,. ..
VPn}, Routers R := {series C3745 routers, r1, r2, r3 …rn}
and Cloud C:= {Cloud-1, Cloud-2….. Cloud-n}. below
steps from 1 to 13.
1. Routing = {OSPF}, O={Non-Securing and MD5
Securing}.
2. Set D = Routing x O where
3. Loop { for all d belongs to D} :
4. Loop { r m belongs to R, where i belongs to
{1,2,3,…m}
5. Set up and config d on ri
6. Start server with IPx port,
7. Loop {for all VPCSj = VP, where j = 1,2,…n}
8. Establish connection to Cloud at IPx port.
9. Set up all R x Routing { r1,r2… rn with OSPF}
10. Set up D with Router
11. Loop { r m belongs to R, where i belongs to
{1,2,3,…m} and inner dm belongs to D is {OSPF
x O}
12. Loop do simulation.
13. Stop
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3628
Commands to Establishment for Ospf Authentication
Message Digest Algorithm:
1. Enables the routers( the initial router has not
secure configure the authentication)
2. Configuration with terminal
3. Interface with Ethernet.
4. Configuration each router IP address with subnet
mask.
5. Set the router OSPF version.
6. Set the network with sub network mask.
7. Set and configure the OSPF with MD5 with key {
1 to 255} and OSPF password { max 16
characters}
8. Setting and configuration, authentication with
MD5.
9. Verification show the IP OSPF neighbor.
10. Show the OSPF interface
11. Finally, debug the IP OSPF packets.
Below figure 8 shows that Router 4 is authenticated by
MD-5 Cryptography Algorithm. Its have youngest key id
is 1.
Fig 8: Message Digest Authentication enables in Router
4:
Fig 9: Message Digest Authentication enables router R2.
Above figure 9 shows that Router 2 is authenticated by
MD-5 Cryptography Algorithm. In R2 router has Key id is
3.
7. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3629
Fig 10: Authenticate for IP address OSPF packets.
Above figure 10 shows the packet secure communication
from source IP(192.168.0.1) to destination IP(192168.0.2).
Here source router is Hari and destination router id
Krishna.
In Hari router received rid: 192.168.0.2 aut : 2 keyid:1 seq
: 0x3C7ECC80 from FastEthernet0/0.
In Krishna router received rid: 192.168.0.2 aut : 2 keyid:1
seq : 0x3C7EC77 from FastEthernet0/0.
Fig 11: Clock offset, root delay, root dispersion and peer
dispersion without uthentication.
In above figure : 11 shows that, the designing
authentication as a service model packets transmitted by
using the OSPF routing protocol, packets reached the
destination without using the authentication algorithm in
R2 reference is 10.0.0.1.Now by using Network Time
Protocol to analyzing the Clock offset, root delay, root
dispersion and peer dispersion of the time calculated.
8. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3630
Fig 12: Clock offset, root delay, root dispersion and peer
dispersion with Authentication.
In above figure: 12 shows that, the designing
authentication as a service model packets transmitted by
using the OSPF routing protocol, packets reached the
destination by using authentication algorithm. In R2,
receive packet from 10.0.0.1 to 10.0.0.2 on
FastEthernet0/0 by using the Network Time Protocol to
analyzing the Clock offset, root delay, root dispersion and
peer dispersion of the time calculated.
The below table: 1 mention values are calculated by using
NTP in OSPF routing in the Cloud.
Time
Clock
offset
Root
delay
Root
dispersion Peer dispersion
without authentication 12.94 19.96 24.31 11.34
with authentication 8.844 15.69 15.98 7.11
Table 1: The result offset, root delay, root dispersion, peer
dispersion
Graph 1: Graph for with authentication and without
authentication
The above graph shows that in without authentication, the
root delay, time offset, root dispersion and peer dispersion
is increasing. By using a proposed implementation
cryptography algorithm the root delay, and root delay, root
dispersion and peer dispersion ratio are reduced.
V. CONCLUSION
Security is the major aspect in the cloud computing. Every
minute new attacks are generated in the concerned field,
So, it requires the strongest security mechanism, to handle
the all types of attacks. So, this paper proposes the
strongest security mechanism to implement GNS3
simulator. GNS3 supports the authenticating the way of
packets transmitted in the network within the cloud by
using MD5 cryptographic algorithm along with Identity-
Key for verification. The information is routed by using
9. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3623-3631 (2017) ISSN: 0975-0290
3631
the OSPF protocol the service model of the Network as a
Cloud. If choosing any path from the model, then MD5
had hid the packets and authenticated. The design model
using the components of Cisco C3745 routers with
interfacing serials, Fast-Ethernet with connecting putty
terminal. Testing time comparison of time delay, root
dispersion and peer dispersion, so gives best performance
analysis in MD-5. GNS-3 is a graphical community
simulator, which facilitates in, going for walks simulations
at the consumer-designed models.
REFERENCES
[1] X. Wang and S. Zhang, Research about optimization
of campus network security system, Procedia Eng.,
vol. 15, pp. 1802–1806, 2011.
[2] B.Harikrishna, S.Kiran, G.Murali and R.Pradeep
Kumar Reddy, Security Issues In Service Model Of
Cloud Computing Environment, Procedia Computer
Science 87 ( 2016 ) 246 251, Science Direct.
[3] Cataldo Basile, Antonio Lioy, Analysis of Application
Layer Filtering Policies With Application to HTTP,
IEEE/ ACM Transactions on Networking, 1063-6692,
2013 IEEE.
[4] Free CCNA Tutorials. Study CCNA For Free!. Study-
ccna.com. N.p., 2017. Web. 21 Mar. 2017.
[5] Cite A Website - Cite This For Me.
Networkstraining.com. N.p., 2017. Web. 21 Mar.
2017.
[6] B.Harikrishna, N.Anusha, K.Manideep,
Madhusudhanarao, Ch, Quarantine Stabilizing Multi-
Keyword Rated Discover with Unfamiliar ID
Transferover Encrypted Cloud Warning IJERCSE Vol
2, Issue 2, February 2015.
[7] Zili Shao, Chun Xue, Qingfeng Zhuge, Meikang Qiu,
Bin Xiao, Edwin H.-M Sha, ―Security Protection and
Checking for Embedded System Integration against
Buffer Overflow attacks via Hardware/Software‖,
IEEE Transactions on Computers, Vol. 55, NO. 4,
April 2006.
[8] Source: https://docs.gns3.com/.
B. Harikrishna, Efficient Resource Allocation using
Fair Scheduling in Cloud Based Systems, RITS ICA
EM 2012.
[9] Chandra Wijaya 2011 IEEE 355-360.
[10] B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy,
Protection on sensitive information in cloud
Cryptography algorithms, IEEE digital Library
10.1109/CESYS.2016.7889894.
[11] Source: Computer weekly.com
[12] Jason C. Neumann The book of GNS3 Device
Nodes, Live Switches, and the Internet 2015.
[13] Khalid Abu Al-Saud, Hatim Tahir, Moutaz Saleh
and Mohammed Saleh 2010 IAJIT 380- 387.
[14] Check point FireWall-1, version 3.0 White paper
June 1997 http://www.checkpoint.com/products/
whitepapers/wp30.pdf
[15] Wallace, Kevin. CCNP Routing And Switching
ROUTE 300-101 Official Cert Guide. 1st ed.
Indianapolis, IN: Pearson Education, 2015.
[16] Hon Sun Chiu, Kwan L. Yeung, and King-Shan
Lui- J-CAR: An Efficient Joint Channel Assignment
and Routing Protocol for IEEE 802.11-Based Multi-
Channel Multi-Interface Mobile Ad Hoc Networks,
1706 IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, VOL. 8 (4) , APRIL 2009.
[17] Anja Feldmann, Jennifer Rexford, and Ramon
Caceres, ”Efficient Policies for Carrying Web Traffic
Over Flow- Switched Networks” , IEEE/ ACM
transactions on networking, vol. 6, no. 6, December
1998.
[18] Q.Zhao, Y. Mou, and S.H.. Qin, “The design of
Security authentication system based on campus
Network, “ Proc. – Int. Conf. Electr. Control Eng.
ICECE 2010, pp. 3070-3073, 2010.