This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a system for secure and private cloud storage using multiple encryption algorithms and third-party auditing. The system aims to preserve privacy while enabling public auditing of stored data. It utilizes homomorphic authenticators, random masking, and asymmetric (RSA) and symmetric (AES) encryption algorithms. A third-party auditor can efficiently audit user data in the cloud to ensure integrity without learning the actual data contents, and the system addresses potential data leaks from the auditor. The paper analyzes RSA and AES algorithms to determine which provides better performance and security for the system.
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
This document proposes a method for secure data storage and integrity auditing in the cloud using multi-level encryption and data deduplication. The method first checks for duplicate files using hash comparisons and avoids uploading duplicate data to save storage space. It then encrypts data using AES, DES and RSA algorithms sequentially, generating keys each time. The keys are then re-encrypted using AES and stored on separate servers. This multi-level encryption and distribution of encrypted data and keys across servers makes the data more secure. It also enables proof of storage and authentication of authorized users using time-based keys.
This document discusses big data security issues and encryption techniques. It begins with introducing the authors and providing an abstract about addressing security issues related to data integrity, confidentiality and availability. The main body then covers authentication, data, network and generic security challenges with big data as well as proposed solutions like encryption, logging and honeypot nodes. The document focuses on describing symmetric and asymmetric encryption algorithms including DES, AES, RSA and ECC. It compares the algorithms and concludes that encryption techniques can help secure big data stored in clouds, though current security levels may be improved.
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
This document proposes a three-layer security model for privacy-preserving cloud storage. The model uses encryption techniques like AES and Triple DES to encrypt user data before storing it in the cloud. The encrypted data is then divided into blocks that are distributed across different cloud, fog, and local storage locations. This prevents data leakage even if some blocks are lost or accessed. Computational intelligence paradigms help optimize the distribution of data blocks for efficiency and security. The model aims to provide stronger privacy protection compared to traditional cloud storage security methods.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
This document proposes a three-layer cloud storage scheme based on fog computing to improve privacy protection. The scheme splits user data into three parts that are stored in the cloud server, fog server, and user's local machine. It uses a Hash-Solomon encoding technique to distribute the data in a way that original data cannot be reconstructed from partial information. The scheme leverages fog computing to both utilize cloud storage and securely protect data privacy against insider attacks. Theoretical analysis and experiments demonstrate that the proposed scheme effectively addresses privacy issues in existing cloud storage models.
The document discusses secure cloud storage. It proposes using the Disintegration Protocol (DIP) to securely store data across multiple cloud servers. DIP distributes data fragments and services across different servers. Access control mechanisms like login credentials and security questions are implemented on DIP. The document also discusses using AES encryption for secure data storage and the Proxy Re-Encryption Scheme (PRE) to allow secure sharing of encrypted data files between cloud users.
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
Cloud computing is a mechanism which provides us resources, information as per user requirement by the help of internet. Cloud is used to store important content material for a longer period of time which requires trust and safety of content that is stored in cloud. The main issue of cloud computing is security of data. Many techniques proposed earlier were beneficial for static archived data. Some encryption techniques were introduced later for dynamic data which includes masking technique, bilinear property with dynamic auditing. This paper proposed an effective auditing protocol to maintain the dynamic operations on data with RSA, MD5 and ID3 algorithms for enhancing data safety. The analysis and simulation results are effectual and protected as it incurs least communication cost and least computation cost of the auditor.
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
This document summarizes a research paper that proposes a system for secure and private cloud storage using multiple encryption algorithms and third-party auditing. The system aims to preserve privacy while enabling public auditing of stored data. It utilizes homomorphic authenticators, random masking, and asymmetric (RSA) and symmetric (AES) encryption algorithms. A third-party auditor can efficiently audit user data in the cloud to ensure integrity without learning the actual data contents, and the system addresses potential data leaks from the auditor. The paper analyzes RSA and AES algorithms to determine which provides better performance and security for the system.
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
This document proposes a method for secure data storage and integrity auditing in the cloud using multi-level encryption and data deduplication. The method first checks for duplicate files using hash comparisons and avoids uploading duplicate data to save storage space. It then encrypts data using AES, DES and RSA algorithms sequentially, generating keys each time. The keys are then re-encrypted using AES and stored on separate servers. This multi-level encryption and distribution of encrypted data and keys across servers makes the data more secure. It also enables proof of storage and authentication of authorized users using time-based keys.
This document discusses big data security issues and encryption techniques. It begins with introducing the authors and providing an abstract about addressing security issues related to data integrity, confidentiality and availability. The main body then covers authentication, data, network and generic security challenges with big data as well as proposed solutions like encryption, logging and honeypot nodes. The document focuses on describing symmetric and asymmetric encryption algorithms including DES, AES, RSA and ECC. It compares the algorithms and concludes that encryption techniques can help secure big data stored in clouds, though current security levels may be improved.
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
This document proposes a three-layer security model for privacy-preserving cloud storage. The model uses encryption techniques like AES and Triple DES to encrypt user data before storing it in the cloud. The encrypted data is then divided into blocks that are distributed across different cloud, fog, and local storage locations. This prevents data leakage even if some blocks are lost or accessed. Computational intelligence paradigms help optimize the distribution of data blocks for efficiency and security. The model aims to provide stronger privacy protection compared to traditional cloud storage security methods.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
This document proposes a three-layer cloud storage scheme based on fog computing to improve privacy protection. The scheme splits user data into three parts that are stored in the cloud server, fog server, and user's local machine. It uses a Hash-Solomon encoding technique to distribute the data in a way that original data cannot be reconstructed from partial information. The scheme leverages fog computing to both utilize cloud storage and securely protect data privacy against insider attacks. Theoretical analysis and experiments demonstrate that the proposed scheme effectively addresses privacy issues in existing cloud storage models.
The document discusses secure cloud storage. It proposes using the Disintegration Protocol (DIP) to securely store data across multiple cloud servers. DIP distributes data fragments and services across different servers. Access control mechanisms like login credentials and security questions are implemented on DIP. The document also discusses using AES encryption for secure data storage and the Proxy Re-Encryption Scheme (PRE) to allow secure sharing of encrypted data files between cloud users.
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
Cloud computing is a mechanism which provides us resources, information as per user requirement by the help of internet. Cloud is used to store important content material for a longer period of time which requires trust and safety of content that is stored in cloud. The main issue of cloud computing is security of data. Many techniques proposed earlier were beneficial for static archived data. Some encryption techniques were introduced later for dynamic data which includes masking technique, bilinear property with dynamic auditing. This paper proposed an effective auditing protocol to maintain the dynamic operations on data with RSA, MD5 and ID3 algorithms for enhancing data safety. The analysis and simulation results are effectual and protected as it incurs least communication cost and least computation cost of the auditor.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
This document proposes a system called SECRY that uses hybrid cryptography to securely store files on a cloud server. SECRY uses multiple cryptographic algorithms, including AES, Triple DES, and ARC4, to encrypt files into shards that are stored across different database servers. Each file can be accessed with a key image generated using LSB steganography. The system aims to provide secure cloud storage, be cost and time efficient, increase data integrity and confidentiality, eliminate third party access, and enable authentication. Future work could allow larger file uploads and additional file types.
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data.
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
Now days rapidly increased use of cloud computing in the many organization and IT industries and provides latest software solution with minimum cost. So the cloud computing give us number of benefits with minimum cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the main factor in the cloud computing environment, The evolving essence is Cloud computing, that is beneficial in cost effective parts, such as capability inflexible computing, decreasing the time period to market and insufficient computing power. By using the complete ability of cloud computing, data are transmitted, processed and stored on the outside cloud service providers. The fact is that, the owner of the data is feeling extremely unconfident to locate their data outer to their own control. Security and Confidentiality of data stored in the cloud are key setbacks in the area of Cloud Computing. Security and Confidentiality are the key issues for cloud storage. This paper proposes a KIST encryption algorithm to concentrate on the security and Confidentiality issues in cloud storage and also compressed cipher text data in order to protect the data stored in the cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
This document discusses a proposed system for reliable and efficient revocation and data sharing using identity-based encryption over cloud. The system aims to securely store and share data in the cloud while allowing revocation of user access. It proposes using identity-based encryption where a user's public key is generated from unique identity information like their email address, without needing to pre-share keys. When a user's authorization expires, they can be revoked to prevent future access. The system encrypts files with keys generated from user identities before uploading to cloud servers. Authorized users can download and decrypt data, while unauthorized users and servers cannot access plaintext.
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
This document proposes a method for secure sharing of personal data on cloud storage using key aggregation and cryptography. It discusses how traditional cloud storage raises privacy and security issues due to outsourcing of data. The proposed method uses key-aggregate encryption to encrypt data files and generate a single aggregate key, reducing the need to exchange keys for individual files. This allows data owners to selectively and securely share a large number of encrypted files with data users by distributing the aggregate encryption key. When data users search for files, a trapdoor is generated and sent to the cloud for searching over authorized encrypted files. The method aims to enable secure, efficient and flexible sharing of encrypted personal data on cloud storage.
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
The document summarizes a proposed system for multi-keyword search over encrypted data in cloud computing. It aims to retrieve the top k most relevant documents matching a user's query while preserving data privacy. The system uses Lucene indexing to build an index of keywords extracted from outsourced documents. When documents are added or removed, the index is updated. A top-k query technique ranks document relevance and returns the top matching results. Encryption is done using the Blowfish algorithm before documents are outsourced to the untrusted cloud server. This allows efficient search over the encrypted data based on keyword queries.
This document summarizes various data encryption techniques for securing data in cloud computing. It discusses hybrid encryption algorithms that combine Caesar cipher, RSA, and monoalphabetic substitution. It also describes the DES algorithm and its structure. Finally, it explores identity-based encryption (IBE) where a third party generates public keys based on user identifiers like email addresses. The document concludes that data security is an important issue for cloud computing and more research is still needed to enhance security features using cryptographic techniques.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
This document discusses data security issues in cloud computing and proposes using cryptography and steganography techniques to address them. It first provides background on cloud computing, including its advantages and risks related to data security. It then discusses various cryptography algorithms like symmetric/private key cryptography and asymmetric/public key cryptography that can encrypt data. Steganography techniques for hiding encrypted data in cover files like images, audio and video are also covered. The document reviews several existing studies that combine cryptography and steganography approaches to enhance cloud data security. It proposes a three-step model using RSA encryption and steganography to securely store and share data in the cloud.
This document proposes and compares several privacy-preserving encrypted keyword search schemes for cloud storage. It introduces three main participants in such schemes: users, a key server, and a cloud service provider (CSP). It then describes three specific schemes - Public Key Encryption with Keyword Search (PEKS), Efficient and Privacy Preserving Keyword Search (EPPKS), and Secure and Privacy Preserving Keyword Search (SPKS). PEKS allows searching on encrypted keywords but requires the user to decrypt files. EPPKS offloads some computation to the CSP but is not resistant to statistical attacks. SPKS enables partial decryption by the CSP, reducing user computation costs while preserving privacy and flexibility. The document argues that SPKS provides the
This document describes a USB driver embedded controller that was developed using embedded C. It functions as a USB host to allow data transfer from an application system to a USB storage device like a pen drive. The controller uses a PIC microcontroller with a USB interface and can store data input through a keypad in its memory. When a USB storage device is connected, it transfers the stored data files to the device. This embedded controller provides advantages over traditional data logging systems as it is portable, low cost, and does not require a computer to be mounted near the application system. The document discusses the implementation of the controller and the development of the USB device driver in more detail.
This document summarizes an experimental investigation into the energy stored in a flywheel motor system with multiple human operators. The study developed an experimental setup using elliptical and circular chainwheels connected to flywheels of varying mass. Trials were conducted with male riders of different weights and ages, measuring the revolutions and calculated energy stored for various gear ratios, flywheel masses, chainwheel types, rider weights and ages. The results showed that energy storage increased with rider weight up to 70kg, and was highest for riders aged 25-30 years. Elliptical chainwheels stored approximately 13% more energy than circular chainwheels. The study aims to optimize the performance of human-powered flywheel systems.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
This document proposes a system called SECRY that uses hybrid cryptography to securely store files on a cloud server. SECRY uses multiple cryptographic algorithms, including AES, Triple DES, and ARC4, to encrypt files into shards that are stored across different database servers. Each file can be accessed with a key image generated using LSB steganography. The system aims to provide secure cloud storage, be cost and time efficient, increase data integrity and confidentiality, eliminate third party access, and enable authentication. Future work could allow larger file uploads and additional file types.
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data.
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
Now days rapidly increased use of cloud computing in the many organization and IT industries and provides latest software solution with minimum cost. So the cloud computing give us number of benefits with minimum cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the main factor in the cloud computing environment, The evolving essence is Cloud computing, that is beneficial in cost effective parts, such as capability inflexible computing, decreasing the time period to market and insufficient computing power. By using the complete ability of cloud computing, data are transmitted, processed and stored on the outside cloud service providers. The fact is that, the owner of the data is feeling extremely unconfident to locate their data outer to their own control. Security and Confidentiality of data stored in the cloud are key setbacks in the area of Cloud Computing. Security and Confidentiality are the key issues for cloud storage. This paper proposes a KIST encryption algorithm to concentrate on the security and Confidentiality issues in cloud storage and also compressed cipher text data in order to protect the data stored in the cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes research on personality-based distributed provable data ownership in multi-cloud storage. It discusses how current provable data possession protocols have limitations such as authentication overhead and lack of flexibility. The proposed approach eliminates authentication management by using identity-based cryptography. It aims to provide a secure, efficient and adaptable protocol for integrity checking of outsourced data across multiple cloud servers.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
This document discusses a proposed system for reliable and efficient revocation and data sharing using identity-based encryption over cloud. The system aims to securely store and share data in the cloud while allowing revocation of user access. It proposes using identity-based encryption where a user's public key is generated from unique identity information like their email address, without needing to pre-share keys. When a user's authorization expires, they can be revoked to prevent future access. The system encrypts files with keys generated from user identities before uploading to cloud servers. Authorized users can download and decrypt data, while unauthorized users and servers cannot access plaintext.
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
This document proposes a method for secure sharing of personal data on cloud storage using key aggregation and cryptography. It discusses how traditional cloud storage raises privacy and security issues due to outsourcing of data. The proposed method uses key-aggregate encryption to encrypt data files and generate a single aggregate key, reducing the need to exchange keys for individual files. This allows data owners to selectively and securely share a large number of encrypted files with data users by distributing the aggregate encryption key. When data users search for files, a trapdoor is generated and sent to the cloud for searching over authorized encrypted files. The method aims to enable secure, efficient and flexible sharing of encrypted personal data on cloud storage.
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
The document summarizes a proposed system for multi-keyword search over encrypted data in cloud computing. It aims to retrieve the top k most relevant documents matching a user's query while preserving data privacy. The system uses Lucene indexing to build an index of keywords extracted from outsourced documents. When documents are added or removed, the index is updated. A top-k query technique ranks document relevance and returns the top matching results. Encryption is done using the Blowfish algorithm before documents are outsourced to the untrusted cloud server. This allows efficient search over the encrypted data based on keyword queries.
This document summarizes various data encryption techniques for securing data in cloud computing. It discusses hybrid encryption algorithms that combine Caesar cipher, RSA, and monoalphabetic substitution. It also describes the DES algorithm and its structure. Finally, it explores identity-based encryption (IBE) where a third party generates public keys based on user identifiers like email addresses. The document concludes that data security is an important issue for cloud computing and more research is still needed to enhance security features using cryptographic techniques.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
This document discusses data security issues in cloud computing and proposes using cryptography and steganography techniques to address them. It first provides background on cloud computing, including its advantages and risks related to data security. It then discusses various cryptography algorithms like symmetric/private key cryptography and asymmetric/public key cryptography that can encrypt data. Steganography techniques for hiding encrypted data in cover files like images, audio and video are also covered. The document reviews several existing studies that combine cryptography and steganography approaches to enhance cloud data security. It proposes a three-step model using RSA encryption and steganography to securely store and share data in the cloud.
This document proposes and compares several privacy-preserving encrypted keyword search schemes for cloud storage. It introduces three main participants in such schemes: users, a key server, and a cloud service provider (CSP). It then describes three specific schemes - Public Key Encryption with Keyword Search (PEKS), Efficient and Privacy Preserving Keyword Search (EPPKS), and Secure and Privacy Preserving Keyword Search (SPKS). PEKS allows searching on encrypted keywords but requires the user to decrypt files. EPPKS offloads some computation to the CSP but is not resistant to statistical attacks. SPKS enables partial decryption by the CSP, reducing user computation costs while preserving privacy and flexibility. The document argues that SPKS provides the
This document describes a USB driver embedded controller that was developed using embedded C. It functions as a USB host to allow data transfer from an application system to a USB storage device like a pen drive. The controller uses a PIC microcontroller with a USB interface and can store data input through a keypad in its memory. When a USB storage device is connected, it transfers the stored data files to the device. This embedded controller provides advantages over traditional data logging systems as it is portable, low cost, and does not require a computer to be mounted near the application system. The document discusses the implementation of the controller and the development of the USB device driver in more detail.
This document summarizes an experimental investigation into the energy stored in a flywheel motor system with multiple human operators. The study developed an experimental setup using elliptical and circular chainwheels connected to flywheels of varying mass. Trials were conducted with male riders of different weights and ages, measuring the revolutions and calculated energy stored for various gear ratios, flywheel masses, chainwheel types, rider weights and ages. The results showed that energy storage increased with rider weight up to 70kg, and was highest for riders aged 25-30 years. Elliptical chainwheels stored approximately 13% more energy than circular chainwheels. The study aims to optimize the performance of human-powered flywheel systems.
The document summarizes a computational fluid dynamics (CFD) analysis of the thermal performance of a circular journal bearing. The analysis was conducted using two approaches: 1) iso-thermal, which assumes constant viscosity, and 2) thermo-hydrodynamic, which accounts for viscosity variation with temperature. Higher pressures, temperatures, and oil film forces were observed in the iso-thermal approach compared to the thermo-hydrodynamic approach, which more accurately models the viscosity decrease with increasing temperature. The rise in these parameters increased with journal speed for both approaches, but was greater for the iso-thermal case that neglects viscosity variation effects.
This document presents a model of a photovoltaic array developed in MATLAB/Simulink. The model accounts for the effects of irradiation and temperature on the output current and power. The photovoltaic array is modeled as a current source in parallel with a diode. Equations are provided to calculate the photo current, reverse saturation current, and saturation current as functions of irradiation, temperature, and other parameters. Simulation results show the I-V and P-V characteristics of the photovoltaic module under varying irradiation levels and constant temperature, demonstrating increased current, voltage, and power output with higher irradiation. The model provides an accurate representation of a photovoltaic module for researchers to study the effects of operational factors on
This document summarizes the results of a finite element analysis of vibration effects on an internal combustion engine exhaust valve. The analysis sought to determine the natural frequency of the valve at which resonance might occur. A 3D CAD model of the valve was created and meshed before applying boundary conditions and material properties in ANSYS finite element software. Vibration analysis identified 5 modes of vibration with increasing frequencies up to a maximum of 1511.3 Hz, deemed the natural frequency. While deformations were largest at intermediate frequencies, the analysis concluded that vibrations near the natural frequency could damage the valve. Therefore, reducing deformation through constraints and maintaining operation below the natural frequency were recommended.
The document describes a technique for error detection and correction in data transmission using multidirectional parity codes and Hamming codes. It proposes applying multidirectional parity codes to generate check bits for data, encoding the check bits using Hamming codes, and transmitting the data and check bits. At the receiver, Hamming decoding detects and corrects errors in check bits, and multidirectional parity decoding detects and corrects errors in data. Simulation results show the technique can detect and correct up to four bit errors, an improvement over other codes. It provides reliable error correction with reasonably low overhead.
This document describes the design of a voice touch screen display device for blind students. The device uses a resistive touch screen interfaced with an ARM processor to allow visually impaired users to interact with and access educational content stored on an SD card. When a user touches areas of the screen guided by pointers, the selected content is announced verbally via a speaker system. The touch inputs are processed by the ARM processor which retrieves the appropriate audio files from the SD card to provide a natural interface for blind children to access educational activities independently.
This document discusses applying a neural network approach to decision making in a self-organizing computing network (SOCN). It proposes using concepts from fuzzy logic and neural networks to build a computing network that can handle mixed data types, like symbolic and numeric data. The network would have input, hidden, and output layers connected by transfer functions. The hidden cells would self-organize based on training data to learn relationships between input and output cells. This approach aims to allow the network to make decisions on data sets with diverse attribute types in a more effective way than other techniques.
This document reviews alternative thermal barrier coatings for diesel engines. It discusses how thermal barrier coatings can increase combustion chamber temperatures, improving engine efficiency and reducing emissions. Several alternative coating materials are described that have properties suitable for thermal barrier coatings, such as low thermal conductivity and high thermal stability at high temperatures. These include zirconates, garnets, yttria stabilized zirconia, and oxides from the alumina-silica-magnesia system like cordierite, forsterite, spinel, and mullite. The document also reviews the potential benefits of thermal barrier coatings, such as reduced fuel consumption and increased engine efficiency, as well as some challenges in fully realizing these benefits.
This document summarizes a study on variations in abdominal pigmentation in Drosophila immigrans populations across different altitudes. Six populations of D. immigrans were collected from different altitudes ranging from 600-2200 meters. The populations were analyzed for traits related to ecophysiology (abdominal pigmentation, desiccation resistance, cuticular water loss) and reproductive fitness (copulation duration, fecundity rate). Populations from higher altitudes showed darker abdominal pigmentation which correlated with better desiccation resistance. Darker individuals also had longer copulation durations and higher fecundity, indicating reproductive advantages in colder environments. The results suggest abdominal pigmentation plays a role in thermal balance and reproductive success
This document describes an ARM7-based patient health monitoring system that continuously monitors parameters like temperature, heartbeat, and ECG of ICU patients. Sensors measure the parameters and send them to an ARM7 microprocessor which converts the analog signals to digital form. The parameters are then transmitted to a server in real-time via GPRS using HTTP protocol. This allows doctors to continuously monitor patient vital signs from remote locations. The system aims to address limitations of existing systems that only transmit data during emergencies and have limited wireless range.
The document describes a hybrid firefly-differential evolution algorithm for solving the economic load dispatch problem. The economic load dispatch problem involves allocating generation among power plants to minimize costs while satisfying constraints. The proposed hybrid algorithm combines the differential evolution and firefly algorithms. It was tested on a 3 unit power system and showed improved efficiency and robustness compared to other existing algorithms for solving the economic load dispatch problem.
The document presents a generic architecture for an area-efficient 4-input binary coded decimal (BCD) adder implemented on an FPGA. It modifies a previously proposed area-efficient 3-input decimal adder to support a generic number of inputs. The proposed 4-input adder has four stages: 1) carry save addition and propagation/generation signal generation, 2) carry network, 3) correction stage, and 4) final addition. Simulation results on a Xilinx FPGA for different number of bits and inputs are presented, showing the adder has reduced delay and area compared to previous approaches. The generic approach can support addition of any number of inputs.
This document summarizes research on human motion tracking techniques using skeleton models. It discusses how model-based approaches use a predefined human skeleton model to represent joints and segments. Video-based approaches can infer physical attributes and daily actions without sensors. The document reviews several papers on reconstructing 3D human pose from video, using reduced joint sets and shape models to filter noise and track landmarks, and developing multi-view pose tracking using generative sampling and physical constraints. It also discusses challenges like high degrees of freedom and self-occlusion, and the need for efficient algorithms to enable real-time 3D full-body motion tracking from multiple cameras.
This document describes a software system that aims to help deaf and dumb people communicate using hand gesture recognition and text-to-speech conversion. The system has three main modules: 1) text-to-voice conversion, 2) text-to-image matching, and 3) image recognition of hand gestures to provide audio or image outputs. The system uses algorithms like localization, pixel analysis, and skin color detection to analyze hand gestures from images. Evaluation results demonstrate the system's ability to correctly convert text inputs to audio or matched images and recognize stored gesture images to output audio or images. Future work to implement the system on mobile devices using sensors is also discussed.
This document summarizes the synthesis and characterization of thin films of pure TiO2 and Sr-doped TiO2 prepared by spin coating technique. Transparent thin films were prepared on glass substrates and annealed at different temperatures from 3000C to 6000C. Structural analysis using GIXRD and Raman spectroscopy confirmed the anatase phase of TiO2. AFM showed a homogeneous globular surface morphology. UV-Vis analysis demonstrated that the optical band gap increased with higher annealing temperatures. Photoluminescence study showed variation in emission peaks for different annealing temperatures and Sr concentrations. Electrical, gas sensing, wettability and self-cleaning properties were also investigated.
This document describes the fabrication of tin oxide (SnO2) thin films using the spray pyrolysis technique. Spray pyrolysis involves spraying a metal salt solution onto a heated substrate where the droplets undergo thermal decomposition to form an oxide thin film. The key deposition parameters that influence the thin film properties are substrate temperature, aerosol transport properties, and precursor decomposition behavior. Higher substrate temperatures result in rougher, more porous films with improved crystallinity and electrical properties. Proper control of deposition parameters allows for the fabrication of thin films with tailored optical and electrical characteristics using the low-cost spray pyrolysis method.
This document describes a Multilevel Relationship Algorithm (MRA) for improving association rule mining. MRA works in three stages: 1) It uses an Apriori algorithm to find level 1 associations between items within individual shops. 2) It uses the level 1 associations to find frequent itemsets across shops. 3) It uses Bayesian probability to determine dependencies between items across shops and generate learning rules. The algorithm aims to discover relationships between sales data from different shops to gain insights for business decisions.
This document discusses the processing of end-of-life vehicles (ELVs) in India compared to other countries like the US and Canada. It outlines the typical 3-stage ELV processing process of draining fluids, removing reusable parts, and crushing the remaining vehicle. While countries like the US and Canada have standardized recycling programs and track reusable parts, India lacks formal regulations and infrastructure for proper ELV disposal. The document argues that India should adopt innovative recycling techniques to minimize pollution, save resources, and improve worker safety when processing the growing number of ELVs.
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
This document discusses using homomorphic encryption to securely store and process data in the cloud. It begins with an introduction to cloud computing and data security challenges. The proposed system would encrypt user data before transferring it to the cloud server using homomorphic encryption. This allows computations to be performed on the encrypted data without decrypting it first, protecting data privacy. The document reviews related work on authentication schemes and secure file storage using encryption. It presents the proposed system architecture and concludes that homomorphic encryption can help address cloud computing security issues by allowing operations on encrypted user data.
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document discusses encryption techniques for securing data in cloud computing environments. It begins with an introduction to cloud deployment models (public, private, hybrid, community) and service models (IaaS, PaaS, SaaS). It then addresses security concerns with cloud computing including data theft, incomplete data uploads, and lack of notification about infrastructure changes. The document proposes encrypting data before uploading it to cloud servers using algorithms like AES to protect data even if stolen. It reviews older encryption techniques like the Caesar cipher and argues stronger algorithms are needed for cloud security.
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document summarizes an encryption technique for securing data in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. It then discusses previous encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. The document proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael cipher to encrypt data before uploading it to cloud servers. It describes implementing AES encryption in two steps: 1) using an authentication channel to verify user identities, and 2) encrypting the data using the AES Rijndael algorithm in 9 to 13 rounds depending on the key size. The AES Rijndael algorithm uses byte substitution, shift rows
This document summarizes an encryption technique for securing data in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. It then discusses previous encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. The document proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael cipher to encrypt data before uploading it to cloud servers. It describes implementing AES encryption in two steps: 1) using an authentication channel to verify user identities, and 2) encrypting the data using the AES Rijndael algorithm in 9 to 13 rounds depending on the key size. The document argues this encryption technique can help make customer data in the
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
This document summarizes an encryption technique for ensuring security in cloud computing environments. It begins by introducing cloud computing and some of the security concerns with storing data in the cloud. These include lack of transparency about security measures, incomplete or corrupted data uploads, and potential data theft without the user's knowledge. The document then reviews some traditional encryption algorithms like the Caesar cipher, Vigenere cipher, and Playfair cipher and their limitations. It proposes using the Advanced Encryption Standard (AES) algorithm with Rijndael, which is more secure than older standards. The technique implements AES encryption with an authentication channel using challenge-response and encrypts the data before uploading to the cloud. This ensures the encrypted data is useless even if stolen,
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
This document summarizes a research paper that proposes a new cloud data security model using role-based access control, encryption, and genetic algorithms. The model uses Token Based Data Security Algorithm (TBDSA) combined with RSA and AES encryption to securely encode, encrypt, and forward cloud data. A genetic algorithm is used to generate encrypted passwords for cloud users. Role managers are assigned to control user roles and data access. The aim is to integrate encoding, encrypting, and forwarding for secure cloud storage while minimizing processing time.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
This document discusses using the RSA algorithm to provide security in cloud computing environments. It first provides background on cloud computing and discusses some of the security challenges in cloud environments. It then describes how public key cryptography algorithms like RSA can help address some of these security issues by allowing for secure storage and transmission of data through encryption with public/private key pairs. The document goes on to provide an overview of how the RSA algorithm works, including key generation and the encryption/decryption process. It proposes implementing RSA to provide security for data stored in the cloud.
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
This document proposes a method to improve healthcare data security when stored in the cloud. It discusses how currently, healthcare data stored entirely in the cloud loses user control and faces privacy risks. The proposed method uses "Split and Combine" (SaC) technique to split data between the cloud and a local server. 80% of the split data is encrypted and uploaded to the cloud, while the remaining 20% is stored locally. When a user requests data, it is downloaded from both sources, combined and decrypted. The document evaluates this method and finds it increases security by partially storing data locally compared to traditional cloud-only storage. It concludes the SaC technique enhances privacy but the local server must always be online to combine data.
Improving Data Storage Security in Cloud using HadoopIJERA Editor
The rising abuse of information stored on large data centres in cloud emphasizes the need to safe guard the data. Despite adopting strict authentication policies for cloud users data while transferred over to secure channel when reaches data centres is vulnerable to numerous attacks .The most widely adoptable methodology is safeguarding the cloud data is through encryption algorithm. Encryption of large data deployed in cloud is actually a time consuming process. For the secure transmission of information AES encryption has been used which provides most secure way to transfer the sensitive information from sender to the intended receiver. The main purpose of using this technique is to make sensitive information unreadable to all other except the receiver. The data thus compressed enables utilization of storage space in cloud environment. It has been augmented with Hadoop‟s map-reduce paradigm which works in a parallel mode. The experimental results clearly reflect the effectiveness of the methodology to improve the security of data in cloud environment.
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
The document proposes a secured data integrity technique for cloud storage using 3DES encryption algorithm. 3DES is a symmetric cryptosystem that encrypts data using three iterations of the DES algorithm. The proposed system uses 3DES along with a random key generator and graphical password to add extra security layers. This makes the system difficult to hack by protecting the data stored in the cloud. The document discusses related work on ensuring data integrity and possession in cloud storage. It then describes the proposed methodology which uses cryptography algorithms like 3DES to encrypt data sent over the network, making intercepted or replaced data impossible. The system is designed to be acceptably secure against current threats but may require stronger encryption with increasing computing power over time.
The document discusses encryption strategies used by organizations that have experienced data breaches. While encryption is commonly used, it is often not applied or used properly, leaving entire systems vulnerable. For encryption to be effective, companies must use a comprehensive defense in depth strategy where data is encrypted and keys are protected across all systems where encrypted data needs to be accessed and managed. Target spent heavily on security but a weakness allowed cybercriminals to access encrypted data in memory before it was encrypted. Stronger defenses are needed at each layer to block attacks.
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
This document proposes a novel approach to implementing data deduplication on the cloud using message locked encryption. It aims to overcome limitations of existing deduplication techniques like convergent encryption by using erasure code technology, encryption algorithms like DES and MD5 hashing, and tokenization to securely store and protect client data on the cloud. The proposed system gives clients proof of ownership of their data by allowing them to choose who can access their files and see any changes made over time. The system architecture involves a client uploading encrypted data to the cloud, and recipients selected by the client being able to access and retrieve encrypted pieces of the data.
This document discusses effective modular order preserving encryption on cloud using multivariate hypergeometric distribution (MHGD). It begins with an abstract that describes how order preserving encryption allows efficient range queries on encrypted data. It then provides background on cloud computing security concerns and discusses existing approaches to searchable encryption, including probabilistic encryption, deterministic encryption, homomorphic encryption, and order preserving encryption. The key proposed approach is to improve the security of existing modular order preserving encryption approaches by utilizing MHGD.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
artificial intelligence and data science contents.pptx
Paper id 27201448
1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
133
Security as a Service: Cryptology on Demand
Venkatesh Ranga1, M.S.V. Sashi kumar2, Dr. C.R.K.Reddy3
M.Tech CSE1 , Assistant Professor CSE2, Professor CSE3, Osmania University1,2,3
venkuranga@gmail.com1, sashi.mamidanna@gmail.com2, crkreddy@gmail.com
Abstract- Cloud Computing is becoming more and more popular today and is ever increasing in popularity with
large organizations as they sharing valuable resources in a cost effective way. By doing like this increasing
demand for more clouds there is an ever growing threat of security becoming a major issue. Achieving strong
security would often require large IT resource and also result in difficulty of usage. To increase security while
reducing the spending on IT & improving the ease of use, we require a security technique which can configure
itself, as requested, for services offered in a Cloud environment. This paper mainly focus on by the usage of less
resources how can we provide security to the end user. The security architecture is driven by security policies
based on these inputs into consideration.
1. Network Access Risk
2. User Data.
3. Key size
With these inputs in place, the security policies can generate security parameters which in turn are used to
configure mechanisms to alter security (including algorithms and protocols) at every domain for protection of
specific security services. Security requirements from users and services in cloud computing in turn building
trust for the end users via Security at their ease & also data control.
Key words: Cloud; Encryption; Security.
1. INTRODUCTION
Cloud computing has been defined by NIST as a
model for enabling ubiquitous, on- demand network
access to a shared pool of configurable computing
resources that can be rapidly provisioned and released
with minimal management effort or service provider
interaction . In simple words cloud computing is a
accessing some one’s software in some one’ hardware
in some one’s data centre .Cloud computing can be
considered a new computing paradigm with
implications for greater flexibility and availability at
lower cost. Cloud computing is a promising
computing paradigm which recently has drawn
extensive attention from both academia and industry.
The term itself is often used today with a range of
meanings and interpretations.
Three referenced service models have evolved:
Software-as-a-Service (SaaS): Is a way of delivering
applications over the Internet. Instead of installing
and maintaining software, you simply access it via the
Internet. SaaS applications are sometimes called Web-based
software or hosted software. Whatever name we
can call it as, SaaS applications run on a SaaS
provider’s servers. The provider manages the access
to the application, includes security, availability, and
performance. It can reduce the total cost of hardware
and software development and operations.
Platform-as-a-Service (PaaS): Platform as a Service
(PaaS) is a way to use some one’s hardware, operating
systems, storage and network capacity over the
Internet. The service delivery models are allows the
customer to rent virtualized servers and associated
services for running existing applications or
developing and testing new ones. It can reduce the
cost and managing hardware and software
components of the platform.
Infrastructure-as-a-Service (IaaS): Infrastructure as
a Service is a provision model in which an
organization outsources the equipment used to support
operations, including storage, hardware, servers. The
service provider maintains the equipment and is
responsible for housing, running and managing it. The
client typically pays on a how much they are use that
much amount customers will pay to service providers
pay per use basis.
The most popular cloud types are namely
private, public and hybrid clouds. In a private cloud,
total infrastructure for implementing the cloud is
controlled completely by the enterprise. Typically,
private clouds are maintained and implemented in the
enterprise data centre and managed by internal
resources. A private cloud maintains all data in
resources under the control of the legal and
contractual umbrella of the organization. This
eliminates the regulatory and legal security concerns
represented with information being processed on third
party computing resources. In a public cloud, external
organization provides the infrastructure and
management required to implement the cloud. Public
clouds orderly simplify implementation and are
typically billed based on usage of resources. This
transfers the cost from a capital expenditure to an
operational expense and can quickly be scaled to meet
the organization’s needs.
Security has been and is the biggest
challenge to cloud computing. It is hard for the users
2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
134
to believe in cloud computing due to invisibility of the
user’s data storage and how are they protected.
Research says that as of now there is no way to know
if the cloud providers properly remove a client’s data,
or whether they have saved it for some unidentified
reason. Currently, the study on cloud security still lies
in the preliminary study. For data storage, a TPA
(Third Party Auditor) is proposed to verify the
integrity of the dynamic data stored in the cloud.
In trust management field, some experts
considered that multiple security policies should be
used in user’s authentication and identity
management, and those policies must be able to avoid
intrusion of data by unauthorized users.
2. PROBLEM DESCRIPTION:
Security parameters even differ for a specific
service for two different users depending on the
sensitivity of the information. The solution for these
issues can simply be the usage of a highly
complicated and secure algorithm popularly used to
safeguard all services in the network. Potentially, this
might not be effective way for cloud service providers
to use the same security mechanism throughout the
services since it consumes a lot of IT resources every
time. It would not be a solution to consume resources
for security itself, as we counteract the advantage of
cloud computing platform wasting the available
resources.
By considering all the applications in the
cloud environment, all the applications are using Sha1
for authentication.AES and DES security algorithms
to secure the data. Most of the applications are using
same symmetric key algorithm for encrypting the any
amount data and providing security to the user’s data.
By using same variable key length for the
any amount of data it will take more time for
encryption/decryption and processing of the data
.Using the same key for encryption/ decryption take
same time when the data size is differ. If the data size
is small then it will take same time and increases the
data size. In our approach we can change the
algorithm key size. When the size of the data changes
If we uploading large data we can use large for foe
security. If transferring data is small than we can go
for small key to encrypt the data. Depending on the
size of the file we can change the algorithm key size.
By doing like this we can boost the performance of
the CPU.
3. CRYPTOGRAPHIC ALGORITHM:
As far we are saying that every application is
using same encryption key for encrypting the data.
Most of the applications are using SHA1 for
providing the security for the user authentication and
some symmetric key algorithm for the encrypting the
users data. In this paper we are using other symmetric
algorithm called Blowfish. As per Researches
Blowfish has been shown better results compare to
other encryption algorithms. So In my Application we
are using blowfish algorithm for encrypting the data.
Blowfish algorithm is a symmetric block cipher that
can be effectively used for both encryption and
safeguarding of data. Blowfish algorithm is a Feistel
Network and 64-bit block size and a variable key
length from 32 bits to 448 bits in length, to calculate
sub keys, which are used in the actual encryption and
decryption. The P-array consists of 18 32-bit values
while the 4 s-boxes consist of 256 32-bit values. The
P-array is initialized first and followed by the S-boxes.
It is a 16-round Feistel network for encryption
and decryption. The algorithm was developed to 64-
bit plaintext into 64 bit cipher securely.
ENCRYPTION:
Blowfish has 16 rounds.
The input is a 64-bit data element, X
Divide x into 32-bit halves, XL, XR;
Then i= 1 to 16;
XL = XL XOR Pi
XR = F (XL) XOR XR;
Swap XL and XR;
After the 16th round, swap XL and XR again to undo
the last swap.
Then, XR = XR XOR P17 and XL =XL
XOR P18, Finally, recombine XL and XR to get the
cipher.
Decryption same as encryption, except that
P1, P2, P3, P4…... and P18 are used in the reverse
order.
Blow fish is incorporated a bitwise
exclusive-operation to be performed on the left 32 –
bits before modified by the F function or propagated
to the right 32-bits for the next round. Blowfish also
incorporated two exclusive-or operations to be
performed after the 16 rounds and a swap operation.
3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
135
F- Function:
All the applications are using same
encryption algorithm and same key large key for
protecting the data. For providing the security to the
users the application developers are using large key.
By using the large key it will more computation and
time. So In my approach we are differentiating the
users considering the network from where the user is
accessing the application and user computation. By
considering these two factors we can provide security
to the users. We can differentiate the user’s security
type by writing the policies in the application.”
4. APPLICATION SCENARIO:
In this paper am trying to show the
application which it is self configure the security by
taking the above parameters into the consideration. As
per my knowledge all the existing applications are
using same security mechanism in the applications for
all the users. So by this there is a chance of wastage of
resources. As we already know in the cloud security is
the biggest challenge. For transmitting the data
between the two users we can not the transfer the data
directly. We are using some encryption mechanism to
transfer the data. For that we have to choose best
encryption algorithm to give better results. If the
conversation between the two friends i.e. normal
information there is no need usage of large bit key
.Whenever we are transmitting secret information
(confidential) then we need more security so there we
can use large key to encrypt the data. By considering
the user’s network we can change the algorithm key
bit length. If the two user’s are from same network
then we can use small encryption key to transfer the
data and if the user’s are from different and untrusted
network then we can increase the bit size. By using
same key for everytime the system is more
computation for encrypting and decrypting the data.
So differcting the key lenth we can reduce the usage
of computation in the system and time as well as we
can also reduce the power.
For Example:
In an Enterprise the users are connected to
each other then they are considered to be internal
network. From the figure we can observe that User1,
User2 and User3 are in same private ntework
acessing the application hosted some where in the
cloud environment, User4 and User5(mobile user)
with different processing power devices are from
public network and accessing the same application
from the outside other than the office network.
Whenever User1 is tranferring the data to the User2
then we can provide security with 128-bit(small)
key.
User 1
User User
Proxy
server
In the internal network the users can access
the application through the proxy server which is
mainted in the internal network. The internal network
users are access the application which is loacated in
the cloud with the help of proxy server( which
maitains the cloud application) . If the users are
intrating in the public network users then increse
the algorithm bit size to 256-bit key for encrypting the
data. If the user is trying to access the application
from the public network then we can increase the
algorithm bit size i.e to 448-bit key to encrypt the data
to incearse the security. In our approach we are tested
our application with two symmetric encryption
algorithms i.e blowfish and AES. Most of the
application developers are using AES for encrypting
the data . In our approach we are replacing the AES
with Blowfish.We use blowfish for
encryption/decryption of data.From the study learnt
that blowfish performance is better when compare to
other algorithms. So we can change the encryption
algorithm according to the user requirement. We are
tested two algorithms with different files size of data
by using changing the algorithm key sizes . We got
below results when tested with different algorithm
key sizes.
5. RESULTS:
Application
Server
Public Network
Public Network
Amazon EC2
Public Network
4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
136
Table 1 Encryption and decryption times(in milli sec) using
with 128 –bit key
Table 2 Encryption and decryption times(in milli sec) using
with 192 –bit key
Input
In KB
Encryption
time for
blowfish
with 192-
bit key
Encryption
time for
AES with
192-bit
key
Decryption
times for
Blowfish
192-bit
key
Decryption
times for
AES 192-
bit key
312 46.87 147.995 436.715 1594.123
512 60.087 156.341 447.156 1900.74
1536 142.58 283.82 423.55 1237.054
2048 184.984 391.643 440.152 1429.581
5120 409.484 761.41 417.677 1215.91
10240 725.4906 748.392 721.291 1194.154
Table 3 Encryption and decryption times(in milli sec) using
with 256 –bit key
Input
in KB
Encryption
time for
blowfish
with 256-
bit key
Encryption
time for
AES with
256-bit
key
Decryption
times for
Blowfish
256-bit
key
Decryption
times for
AES 256-
bit key
312 47.187 160.1749 450.955 1966.08
512 58.975 176.32 428.948 1646.9
1536 136.563 301.1285 425.802 1254.111
2048 183.296 435.471 424.453 1418.943
5120 401.911 759.309 389.548 1117.111
10240 752.497 717.192 784.397 958.822
Table 4. Encryption and decryption times(in milli sec) using
AES 256-bit key and 448-bit key
Figure :1 Encryption and Decryption times for Blowfish and
AES with 128-bit Key
2000
1800
1600
1400
1200
1000
800
600
400
200
0
312 KB
512 KB
1536 KB
2048 KB
5120 KB
10240 KB
Encrypeion time in milli seconds
File Size in KB
Encryption time
for blowfish
with 128-bit
key
Encryption time
AES with 128-
bit key
Decryption timr
for Blowfish
128 -bit key
Decryption time
for AES 128 -bit
key
Input
in KB
Encryption
time for
blowfish
with 128-
bit key
Encryption
time for
AES with
128-bit
key
Decryption
times for
Blowfish
128-bit
key
Decryption
time for
AES with
128 -bit
key
312 46.46 146.544 405.75 1316.767
512 47.187 147.921 433 1776
1536 128.288 212.455 413.253 1152.631
2048 194.824 284.029 440.054 1133.744
5120 401.911 698.02 389.548 1412.936
10240 686.988 671.422 674.928 1277.063
Input
In KB
Encryption
time for
AES 256-
bit key
Encryption
time for
Blowfish
448-bit key
Decryption
time for
AES 256-
bit key
Decryption
time for
Blowfish
448-bit key
512 176.32 64.608 1646.9 771.544
1536 301.1285 143.8252 1254.111 846.725
2048 435.471 196.234 1418.943 465.208
5120 759.309 414.739 117.111 738.094
10240 717.192 808.402 958.822 717.601
5. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
137
Figure 2. Encryption and Decryption times for Blowfish and
AES with 192-bit Key
2000
1800
1600
1400
1200
1000
800
600
400
200
0
Encryption tomes in milli seconds
Input file sizes in KB
Encryption
time for
blowfish
with 192-
bit key
Encryption
time for
AES with
192-bit key
Decryption
tims for
Blowfish
192-bit key
Decryption
tims for
AES 192-
bit key
Figure 3. Encryption and Decryption times for Blowfish and
AES with 256-bit Key
2500
2000
1500
1000
500
0
312 KB
512 KB
1536 KB
2048 KB
5120 KB
10240 KB
Encryption times in milli seconds
Input file size in KB
Encryption time
for blowfish with
256-bit key
Encryption time
for AES with 256-
bit key
Decryption tims
for Blowfish 256-
bit key
Decryption tims
for AES 256-bit
key
Figure 4 Comparision Between the Encryption and Decryption
Times with AES 256 and Blowfish 448- bit
1800
1600
1400
1200
1000
800
600
400
200
0
Encryption times in milli seconds
Input file size in KB
Encryption
time for AES
256-bit key
Encryption
time for
Blowfish 448-
bit key
Decryption
time for AES
256-bit key
Decryption
time for
Blowfish 448-
bit key
6. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
138
6. CONCLUSION :
In this paper we conclude that depending on
the network users are being a part of, type of the
application working on & the compute system used,
we can provide the required security strengh by using
best suited algorithm and varied key size. Transferring
files from one network to another can be provided
with on demand security level by increasing the bit
size of the key. This feature can be provided on varied
applications and deploying right security policy, the
performance of the systems can be improved. From
the comparision of two algorithms we found that
blowfish performs well in all situations, but the key
establishment still remains the concern. In traditional
applications for encrypting any size of data,
developers are using same key size for cryptography.
In our scenario , we have varied the key size of the
algorithm and the chosen algorithm depends on file
size, user requirement and type of network. Usage of
same key for encrypting and decrypting any amount
of data, the allocation time for encryption and
decryption taken more resouces in hardware and
more time for processing the data will decrease the
performance of the CPU. Applying right algorithm in
the requirement will boost the performence of the
CPU, reduce the usage hardware inturn reduce the
processing time.
REFERENCES:
[1] P. Mell, T. Grance (2009), The NIST Definition
of Cloud Computing, Version 15, National
Institute of Standards and Technology.
[2] Jianyong Chen, Yang Wang, Xiaomin Wang
(2011), On demand security architecture for
Cloud Computing, Dept.of Computer science
and Technology, China.
[3]M. Anand Kumar and Dr.S.Karthikeyan (2012),
“Investigating the Efficiency Blowfish and
Rejineal (AES)Algorithms”, I.J computer
network and Information Technology.
[4] Pratap Chandra Mandal (2012),”Superiority of
Blowfish Algorithm” IJARCSSE,
WestBengal,India.
[5]http://docs.aws.amazon.com/gettingstarted/latest/C
ompute basis/web-app-hosting-intro.html
[6] http://en.wikipedia.org/wiki/Blowfish (cipher).