SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 90
SECURING THE CLOUD COMPUTING SYSTEMS WITH MATRIX-
VECTOR AND MULTI-KEY USING LINEAR EQUATIONS
Shankar M1
, Kannan M2
1
M.E, Computer Science and Engineering, Mahendra Engineering College, Thiruchengode, Tamil Nadu, India
2
Professor/CSE, Mahendra Engineering College, Thiruchengode, Tamil Nadu, India
Abstract
Cloud computing systems security is to improve when end-user communicates with the cloud server. In order to make a connection
between end-user and the Cloud Server, first end-user or Cloud Server make sure that they are communicating with right counterpart.
Multi-Key encryption concept is used to encrypt the request message or data which is sent from end-user or also from Cloud Server.
Request message sent by end-user to cloud server should matches with the response received from by end-user from cloud server.
Multi-key concept takes more number of iteration when compared to single-key concept when trying to validate the requested
message. Multi-Key concept is more secured than single-key.
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is the provision of dynamically scalable and
often virtualized resources as a services over the internet Users
need not have knowledge of, expertise in, or control over the
technology infrastructure in the "cloud" that supports them.
Cloud computing represents a major change in how we store
information and run applications. Instead of hosting apps and
data on an individual desktop computer, everything is hosted
in the "cloud machine", an assemblage of computers and
servers accessed via the Internet.
End-user wants to store their confidential data into the cloud
machine, in order to store and access data in the cloud server,
first step is to make a secure connection between end-user and
cloud machine. Then user can access those data from internet
and also from different location across globe. If the user wants
to access their data, user has to make a secure connection to
the cloud server and then user will send a request message to
the cloud server and cloud server will validate the request
messages which are received from the end-user. Both the end-
user and the cloud server will do the validation and then
secure connection will make only when the validation is
successful on both sides.
2. ARCHITECTURE
Fig 1 Architecture
Customer will send an encrypted message to cloud server and
cloud server will process the request message which is sent by
customer and sent back the processed message which is
encrypted by cloud server and customer will verify the
processed message received from the cloud server and then
secure connection will establish between customer and the
cloud server.
3. KEY GENERATION
End-user will generate a set of keys and send to cloud server
or cloud server will generate a set of keys and send to end-
user. Once the key is generated and the generated keys should
be shared between the end-user and the cloud server. Then
end-user has to send a request message to make a connection
with cloud server and vice-versa. End-user will encrypt the
request message Encrypt(m1) with the Key1 and send to cloud
server through communication channel. Cloud server will
decrypt the message sent by end-user [ Decrypt(Encrypt(m1))
] and also cloud server will encrypt the same encrypted
message (before decryption in cloud server side) which is
received from the end-user with the Key1 which is available in
cloud server and send back the encrypted message to end-user
for validation. End-user will decrypt the message which is
received from cloud server and compared with the encrypted
message which is sent by end-user and should match
otherwise someone has interrupted the communication
channel or someone has modified the data which is sent
through communication channel.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 91
Fig 2 Flow Diagram
Lets take ”A” is the request message to be send from end-user
and this message is encrypted with Key1, so the encrypted
message will be Encrypt(A,Key1)B. Message B is sent
through communication channel and this has been decrypted
with Key1 in the cloud server Decrypt(B,Key1)A and this
message will be stored in cloud server. Again message B is
encrypted with Key1 Encrypt(B,key1)C [
Encrypt(Encrypt(A,Key1), Key1)] and C will be sent to end-
user and message C will be decrypted with Key1
Decrypt(C,Key1)B. Output of end-user is B and also the
message received from the cloud server is also B, so input
message should matches with the output message. Hence the
message is communicated securely and no has interrupted the
message in the communication channel
4. SOLVING LINEAR EQUATION
This matrix calculation is used to find out the probability of
the output and the input message which is communicated
between end-user and the cloud server. Let’s take [ 1 2 3 4 5 6
] is the generated keys which is shared between end-user and
the cloud server and [ 9 8 7 ] is the request message or data
which is sent to the cloud server for validation or store data in
the cloud server. Once the Keys are generated and need to
share between the end-user and the cloud server. Sharing of
the keys should be through communication channel. There
may be a chance of altering or hacking the secret keys.
Suppose the message [9 8 7] is encrypted with the Key1, its
giving the some encrypted value and which should be stored
in variable and again in the second iteration if we encrypt the
same encrypted message with the Key1 which is available in
cloud server and send to end-user, it gives the different value
and stored in the variable. Here we should find the difference
in the variables which is generated in the first and second
iterations and the difference should be greater than .9.
Suppose, if the key is altered (Key 6 is modified to 7 as shown
in the below Fig.3) and encrypt the same message and will
produce some result and the difference should be always less
than .9 (refer the below Fig.3). Same process will be
manipulated on both end-user and the cloud server. If the
probability value is less than .9, then the end-user or cloud
server will send a request message to generate a new set of
keys for a secure communication. Again the same process will
be carried out to validate the input and the output message for
the secure communication.
Fig 3 Solving Linear Equation
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 92
5. HOMOMORPHIC ENCRYPTION
5.1 Deterministic Method:
In this method, we are sending the encrypted message in a
sequence of message. For e.g. “I am in London” is the
message which I need to send to the cloud server. From the
end-user, first we will to encrypt the “I” and send to the cloud
server through the communication channel and then encrypt
the “am” and send to the cloud server and then “in” and then
“London”. Hacker can easily identify the sequence, if they
identify the sequence “I am __ London”, then hacker can
easily identify the message “in”. Then hacker can easily frame
the sentence.
5.2 Non-Deterministic Method:
In this method, we are sending the encrypted message in a
sequence of message. For e.g. “I am in London” is the
message which I need to send to the cloud server. From the
end-user, first we will encrypt the “London” and send to the
cloud server through the communication channel and then
encrypt the “in” and send to the cloud server and then “am”
and then “I”. Hacker cannot easily identify the sequence.
We formulate the problem of securely outsourcing large-scale
systems of LE via iterative methods, and provide mechanism
designs fulfilling input/output privacy. Provide mechanism
designs fulfilling input/output privacy, cheating resilience, and
efficiency.
6. LIMITATIONS
Here we are using Deterministic Method using Multi-Key.
Arranging the received message is easy in Deterministic
method. But, in Non-Deterministic with multi-key, the data
will be sent in different sequence of message as discussed in
section 5.2. This Multi-key concept requires more iteration to
retrieve the original message from the encrypted message.
Increase in the number of keys leads to increase in the more
number of iteration and also to improve the security and also
decrease the chance of intruder to decrypt the message.
7. KEY CHARACTERISTIC
Agility improves with users' ability to re-provision
technological infrastructure resources.
Cost is claimed to be reduced and in a public cloud delivery
model capital expenditure is converted to operational
expenditure. This is purported to lower barriers to entry, as
infrastructure is typically provided by a third-party and does
not need to be purchased for one-time or infrequent intensive
computing tasks. Pricing on a utility computing basis is fine-
grained with usage-based options and fewer IT skills are
required for implementation. The e-FISCAL project's state of
the art repository contains several articles looking into cost
aspects in more detail, most of them concluding that costs
savings depend on the type of activities supported and the type
of infrastructure available in-house.
Virtualization technology allows servers and storage devices
to be shared and utilization be increased. Applications can be
easily migrated from one physical server to another.
Multi tenancy enables sharing of resources and costs across a
large pool of users thus allowing for:
Centralization of infrastructure in locations with lower costs
(such as real estate, electricity, etc.)
Utilization and efficiency improvements for systems that are
often only 10–20% utilized.
Reliability is improved if multiple redundant sites are used,
which makes well-designed cloud computing suitable for
business continuity and disaster recovery.
Performance is monitored and consistent and loosely coupled
architectures are constructed using web services as the system
interface.
Security could improve due to centralization of data,
increased security-focused resources, etc., but concerns can
persist about loss of control over certain sensitive data, and the
lack of security for stored kernels. Security is often as good as
or better than other traditional systems, in part because
providers are able to devote resources to solving security
issues that many customers cannot afford. However, the
complexity of security is greatly increased when data is
distributed over a wider area or greater number of devices and
in multi-tenant systems that are being shared by unrelated
users. In addition, user access to security audit logs may be
difficult or impossible. Private cloud installations are in part
motivated by users' desire to retain control over the
infrastructure and avoid losing control of information security.
Maintenance of cloud computing applications is easier,
because they do not need to be installed on each user's
computer and can be accessed from different places.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 93
8. CONCLUSIONS
This paper describes about to improve the security issue in
Cloud Server when end-user trying to access the cloud server
data from across the globe. Accessing the cloud data from
public place is prone to change or modify the original
message. So in order to improve the security obviously we
need to increase the keys to encrypt and also increase the
computation to validate the message.
REFERENCES
[1] Harnessing the Cloud for Securely Outsourcing Large-
Scale Systems of Linear Equations, Cong Wang,
Member, IEEE, Kui Ren, Senior Member, IEEE, Jia
Wang, Member, IEEE, and Qian Wang, Member, IEEE
- 2013
[2] C. Gentry, “Computing Arbitrary Functions of
Encrypted Data,” Comm. ACM, vol. 53, no. 3, pp. 97-
105, 2010.
[3] K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J.
Salonen, “Solution of Dense Systems of Linear
Equations Arising from Integral-Equation
Formulations,” IEEE Antennas and Propagation
Magazine, vol. 37, no. 6, pp. 96-100, Dec. 1995.
[4] A. Edelman, “Large Dense Numerical Linear Algebra
in 1993: The Parallel Computing Influence,” Int’l J.
High Performance Computing Applications, vol. 7, no.
2, pp. 113-128, 1993.
[5] B. Carpentieri, “Sparse Preconditioners for Dense
Linear Systems from Electromagnetic Applications,”
PhD dissertation, CERFACS, Toulouse, France, 2002
[6] R. Cramer and I. Damga°rd, “Secure Distributed Linear
Algebra in a Constant Number of Rounds,” CRYPTO:
Proc. Ann. Int’l Cryptology Conf. Advances in
Cryptology, 2001.
[7] P. Mohassel and E. Weinreb, “Efficient Secure Linear
Algebra in the Presence of Covert or Computationally
Unbounded Adversaries,” CRYPTO: Proc. 28th Ann.
Int’l Cryptology Conf., pp. 481-496, 2008.
[8] J.R. Troncoso-Pastoriza, P. Comesan˜ a, and F. Pe´rez-
Gonza´lez, “Secure Direct and Iterative Protocols for
Solving Systems of Linear Equations,” Proc First Int’l
Workshop Signal Processing in the EncryptEd Domain
(SPEED), pp. 122-141, 2009.
[9] W. Du and M.J. Atallah, “Privacy-Preserving
Cooperative Scientific Computations,” Proc. IEEE 14th
Computer Security Foundations Workshop (CSFW),
pp. 273-294, 2001

More Related Content

What's hot

Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
snv09
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
eSAT Journals
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
IJNSA Journal
 
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
How to Counter-act Security Threats in Mobile Ad Hoc Networks?How to Counter-act Security Threats in Mobile Ad Hoc Networks?
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
drsrinivasanvenkataramani
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc NetworksNew Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
IJNSA Journal
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
Deepak John
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
eSAT Publishing House
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET Journal
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Journals
 

What's hot (20)

Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
How to Counter-act Security Threats in Mobile Ad Hoc Networks?How to Counter-act Security Threats in Mobile Ad Hoc Networks?
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc NetworksNew Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 

Viewers also liked

Properties of fal g masonry blocks
Properties of fal g masonry blocksProperties of fal g masonry blocks
Properties of fal g masonry blocks
eSAT Publishing House
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
eSAT Publishing House
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
eSAT Publishing House
 
Stability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wallStability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wall
eSAT Publishing House
 
Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...
eSAT Publishing House
 
Speaker identification system using close set
Speaker identification system using close setSpeaker identification system using close set
Speaker identification system using close set
eSAT Publishing House
 
Effect of mobile phone and bts radiation on heart rate
Effect of mobile phone and bts radiation on heart rateEffect of mobile phone and bts radiation on heart rate
Effect of mobile phone and bts radiation on heart rate
eSAT Publishing House
 
Survey on traditional and evolutionary clustering
Survey on traditional and evolutionary clusteringSurvey on traditional and evolutionary clustering
Survey on traditional and evolutionary clustering
eSAT Publishing House
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
eSAT Publishing House
 
An investigation of the design implications for openings
An investigation of the design implications for openingsAn investigation of the design implications for openings
An investigation of the design implications for openings
eSAT Publishing House
 
Laboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii withLaboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii with
eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
eSAT Publishing House
 
Finite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding betweenFinite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding between
eSAT Publishing House
 
Treatment of solid waste leachate by
Treatment of solid waste leachate byTreatment of solid waste leachate by
Treatment of solid waste leachate by
eSAT Publishing House
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
eSAT Publishing House
 
Influence of feeding system in injection moulding for
Influence of feeding system in injection moulding forInfluence of feeding system in injection moulding for
Influence of feeding system in injection moulding for
eSAT Publishing House
 
Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...
eSAT Publishing House
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithm
eSAT Publishing House
 
Design and development of fall detector using fall
Design and development of fall detector using fallDesign and development of fall detector using fall
Design and development of fall detector using fall
eSAT Publishing House
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
eSAT Publishing House
 

Viewers also liked (20)

Properties of fal g masonry blocks
Properties of fal g masonry blocksProperties of fal g masonry blocks
Properties of fal g masonry blocks
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Stability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wallStability analysis of orthotropic reinforce concrete shear wall
Stability analysis of orthotropic reinforce concrete shear wall
 
Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...
 
Speaker identification system using close set
Speaker identification system using close setSpeaker identification system using close set
Speaker identification system using close set
 
Effect of mobile phone and bts radiation on heart rate
Effect of mobile phone and bts radiation on heart rateEffect of mobile phone and bts radiation on heart rate
Effect of mobile phone and bts radiation on heart rate
 
Survey on traditional and evolutionary clustering
Survey on traditional and evolutionary clusteringSurvey on traditional and evolutionary clustering
Survey on traditional and evolutionary clustering
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
An investigation of the design implications for openings
An investigation of the design implications for openingsAn investigation of the design implications for openings
An investigation of the design implications for openings
 
Laboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii withLaboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii with
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Finite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding betweenFinite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding between
 
Treatment of solid waste leachate by
Treatment of solid waste leachate byTreatment of solid waste leachate by
Treatment of solid waste leachate by
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Influence of feeding system in injection moulding for
Influence of feeding system in injection moulding forInfluence of feeding system in injection moulding for
Influence of feeding system in injection moulding for
 
Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithm
 
Design and development of fall detector using fall
Design and development of fall detector using fallDesign and development of fall detector using fall
Design and development of fall detector using fall
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 

Similar to Securing the cloud computing systems with matrix vector and multi-key using linear equations

A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
eSAT Publishing House
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
eSAT Publishing House
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
IEEEGLOBALSOFTTECHNOLOGIES
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
IEEEFINALYEARPROJECTS
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
IOSR Journals
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 

Similar to Securing the cloud computing systems with matrix vector and multi-key using linear equations (20)

A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 

Recently uploaded (20)

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 

Securing the cloud computing systems with matrix vector and multi-key using linear equations

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 90 SECURING THE CLOUD COMPUTING SYSTEMS WITH MATRIX- VECTOR AND MULTI-KEY USING LINEAR EQUATIONS Shankar M1 , Kannan M2 1 M.E, Computer Science and Engineering, Mahendra Engineering College, Thiruchengode, Tamil Nadu, India 2 Professor/CSE, Mahendra Engineering College, Thiruchengode, Tamil Nadu, India Abstract Cloud computing systems security is to improve when end-user communicates with the cloud server. In order to make a connection between end-user and the Cloud Server, first end-user or Cloud Server make sure that they are communicating with right counterpart. Multi-Key encryption concept is used to encrypt the request message or data which is sent from end-user or also from Cloud Server. Request message sent by end-user to cloud server should matches with the response received from by end-user from cloud server. Multi-key concept takes more number of iteration when compared to single-key concept when trying to validate the requested message. Multi-Key concept is more secured than single-key. ----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is the provision of dynamically scalable and often virtualized resources as a services over the internet Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing represents a major change in how we store information and run applications. Instead of hosting apps and data on an individual desktop computer, everything is hosted in the "cloud machine", an assemblage of computers and servers accessed via the Internet. End-user wants to store their confidential data into the cloud machine, in order to store and access data in the cloud server, first step is to make a secure connection between end-user and cloud machine. Then user can access those data from internet and also from different location across globe. If the user wants to access their data, user has to make a secure connection to the cloud server and then user will send a request message to the cloud server and cloud server will validate the request messages which are received from the end-user. Both the end- user and the cloud server will do the validation and then secure connection will make only when the validation is successful on both sides. 2. ARCHITECTURE Fig 1 Architecture Customer will send an encrypted message to cloud server and cloud server will process the request message which is sent by customer and sent back the processed message which is encrypted by cloud server and customer will verify the processed message received from the cloud server and then secure connection will establish between customer and the cloud server. 3. KEY GENERATION End-user will generate a set of keys and send to cloud server or cloud server will generate a set of keys and send to end- user. Once the key is generated and the generated keys should be shared between the end-user and the cloud server. Then end-user has to send a request message to make a connection with cloud server and vice-versa. End-user will encrypt the request message Encrypt(m1) with the Key1 and send to cloud server through communication channel. Cloud server will decrypt the message sent by end-user [ Decrypt(Encrypt(m1)) ] and also cloud server will encrypt the same encrypted message (before decryption in cloud server side) which is received from the end-user with the Key1 which is available in cloud server and send back the encrypted message to end-user for validation. End-user will decrypt the message which is received from cloud server and compared with the encrypted message which is sent by end-user and should match otherwise someone has interrupted the communication channel or someone has modified the data which is sent through communication channel.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 91 Fig 2 Flow Diagram Lets take ”A” is the request message to be send from end-user and this message is encrypted with Key1, so the encrypted message will be Encrypt(A,Key1)B. Message B is sent through communication channel and this has been decrypted with Key1 in the cloud server Decrypt(B,Key1)A and this message will be stored in cloud server. Again message B is encrypted with Key1 Encrypt(B,key1)C [ Encrypt(Encrypt(A,Key1), Key1)] and C will be sent to end- user and message C will be decrypted with Key1 Decrypt(C,Key1)B. Output of end-user is B and also the message received from the cloud server is also B, so input message should matches with the output message. Hence the message is communicated securely and no has interrupted the message in the communication channel 4. SOLVING LINEAR EQUATION This matrix calculation is used to find out the probability of the output and the input message which is communicated between end-user and the cloud server. Let’s take [ 1 2 3 4 5 6 ] is the generated keys which is shared between end-user and the cloud server and [ 9 8 7 ] is the request message or data which is sent to the cloud server for validation or store data in the cloud server. Once the Keys are generated and need to share between the end-user and the cloud server. Sharing of the keys should be through communication channel. There may be a chance of altering or hacking the secret keys. Suppose the message [9 8 7] is encrypted with the Key1, its giving the some encrypted value and which should be stored in variable and again in the second iteration if we encrypt the same encrypted message with the Key1 which is available in cloud server and send to end-user, it gives the different value and stored in the variable. Here we should find the difference in the variables which is generated in the first and second iterations and the difference should be greater than .9. Suppose, if the key is altered (Key 6 is modified to 7 as shown in the below Fig.3) and encrypt the same message and will produce some result and the difference should be always less than .9 (refer the below Fig.3). Same process will be manipulated on both end-user and the cloud server. If the probability value is less than .9, then the end-user or cloud server will send a request message to generate a new set of keys for a secure communication. Again the same process will be carried out to validate the input and the output message for the secure communication. Fig 3 Solving Linear Equation
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 92 5. HOMOMORPHIC ENCRYPTION 5.1 Deterministic Method: In this method, we are sending the encrypted message in a sequence of message. For e.g. “I am in London” is the message which I need to send to the cloud server. From the end-user, first we will to encrypt the “I” and send to the cloud server through the communication channel and then encrypt the “am” and send to the cloud server and then “in” and then “London”. Hacker can easily identify the sequence, if they identify the sequence “I am __ London”, then hacker can easily identify the message “in”. Then hacker can easily frame the sentence. 5.2 Non-Deterministic Method: In this method, we are sending the encrypted message in a sequence of message. For e.g. “I am in London” is the message which I need to send to the cloud server. From the end-user, first we will encrypt the “London” and send to the cloud server through the communication channel and then encrypt the “in” and send to the cloud server and then “am” and then “I”. Hacker cannot easily identify the sequence. We formulate the problem of securely outsourcing large-scale systems of LE via iterative methods, and provide mechanism designs fulfilling input/output privacy. Provide mechanism designs fulfilling input/output privacy, cheating resilience, and efficiency. 6. LIMITATIONS Here we are using Deterministic Method using Multi-Key. Arranging the received message is easy in Deterministic method. But, in Non-Deterministic with multi-key, the data will be sent in different sequence of message as discussed in section 5.2. This Multi-key concept requires more iteration to retrieve the original message from the encrypted message. Increase in the number of keys leads to increase in the more number of iteration and also to improve the security and also decrease the chance of intruder to decrypt the message. 7. KEY CHARACTERISTIC Agility improves with users' ability to re-provision technological infrastructure resources. Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine- grained with usage-based options and fewer IT skills are required for implementation. The e-FISCAL project's state of the art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house. Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another. Multi tenancy enables sharing of resources and costs across a large pool of users thus allowing for: Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) Utilization and efficiency improvements for systems that are often only 10–20% utilized. Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery. Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface. Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 93 8. CONCLUSIONS This paper describes about to improve the security issue in Cloud Server when end-user trying to access the cloud server data from across the globe. Accessing the cloud data from public place is prone to change or modify the original message. So in order to improve the security obviously we need to increase the keys to encrypt and also increase the computation to validate the message. REFERENCES [1] Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations, Cong Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, Jia Wang, Member, IEEE, and Qian Wang, Member, IEEE - 2013 [2] C. Gentry, “Computing Arbitrary Functions of Encrypted Data,” Comm. ACM, vol. 53, no. 3, pp. 97- 105, 2010. [3] K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, “Solution of Dense Systems of Linear Equations Arising from Integral-Equation Formulations,” IEEE Antennas and Propagation Magazine, vol. 37, no. 6, pp. 96-100, Dec. 1995. [4] A. Edelman, “Large Dense Numerical Linear Algebra in 1993: The Parallel Computing Influence,” Int’l J. High Performance Computing Applications, vol. 7, no. 2, pp. 113-128, 1993. [5] B. Carpentieri, “Sparse Preconditioners for Dense Linear Systems from Electromagnetic Applications,” PhD dissertation, CERFACS, Toulouse, France, 2002 [6] R. Cramer and I. Damga°rd, “Secure Distributed Linear Algebra in a Constant Number of Rounds,” CRYPTO: Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology, 2001. [7] P. Mohassel and E. Weinreb, “Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries,” CRYPTO: Proc. 28th Ann. Int’l Cryptology Conf., pp. 481-496, 2008. [8] J.R. Troncoso-Pastoriza, P. Comesan˜ a, and F. Pe´rez- Gonza´lez, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations,” Proc First Int’l Workshop Signal Processing in the EncryptEd Domain (SPEED), pp. 122-141, 2009. [9] W. Du and M.J. Atallah, “Privacy-Preserving Cooperative Scientific Computations,” Proc. IEEE 14th Computer Security Foundations Workshop (CSFW), pp. 273-294, 2001