With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receivers side is separated into two files, the encrypted data file and encrypted key file. The encrypted key file is decrypted by RSA method using the receivers private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29243.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29243/encryption-data-measurement-and-data-security-of-hybrid-aes-and-rsa-algorithm/khet-khet-khaing-oo
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receivers side is separated into two files, the encrypted data file and encrypted key file. The encrypted key file is decrypted by RSA method using the receivers private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29243.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29243/encryption-data-measurement-and-data-security-of-hybrid-aes-and-rsa-algorithm/khet-khet-khaing-oo
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
Cloud works as an online storage servers and provides long term storage services over the internet. It is like a third party in whom we can store a data so they need data confidentiality, robustness and functionality. Encryption and encoding methods are used to solve such problems. After that divide proxy re-encryption scheme and integrating it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure, robust data storage and retrieval but also lets the user forward his data to another user without retrieving the data. A concept of backup in same server allows users to retrieve failure data successfully in the storage server and also forward to another user without retrieving the data back. This is an attempt to provide light-weight approach which protects data access in distributed storage servers. User can implement all important concept i.e. Confidentiality for security, Robustness for healthy data, Reliability for flexible data, Availability for compulsory data will be achieved to another user which is store in cloud and easily overcome problem of “Securely data forwarding and maintaining, reliability of data in cloud computing “using different type of Methodology and Technology.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
Cloud computing is a very growing field in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
Cloud works as an online storage servers and provides long term storage services over the internet. It is like a third party in whom we can store a data so they need data confidentiality, robustness and functionality. Encryption and encoding methods are used to solve such problems. After that divide proxy re-encryption scheme and integrating it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure, robust data storage and retrieval but also lets the user forward his data to another user without retrieving the data. A concept of backup in same server allows users to retrieve failure data successfully in the storage server and also forward to another user without retrieving the data back. This is an attempt to provide light-weight approach which protects data access in distributed storage servers. User can implement all important concept i.e. Confidentiality for security, Robustness for healthy data, Reliability for flexible data, Availability for compulsory data will be achieved to another user which is store in cloud and easily overcome problem of “Securely data forwarding and maintaining, reliability of data in cloud computing “using different type of Methodology and Technology.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
Cloud computing is a very growing field in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This is my Capstone Project for my Masters in Computer Science 2023 at the Rochester Institute of Technology. I want to fully thank Dr. M. Mustafa Rafique and Dr. Hans-Peter Bischof for their guidance and support throughout this process.
This paper talks about how to improve and build upon existing data distribution algorithms for a fog computing environment. It implements libraries from AES, Reed Solomon to improve the existing architecture.
This paper is also based off the existing research: ian Wang et al. A Three-Layer Privacy Preserving Cloud Storage Scheme
Based on Computational Intelligence in Fog Computing in IEEE TETCI, vol.
2, no. 1, pp. 3-12, Feb. 2018 .
Improving Data Storage Security in Cloud using HadoopIJERA Editor
The rising abuse of information stored on large data centres in cloud emphasizes the need to safe guard the data. Despite adopting strict authentication policies for cloud users data while transferred over to secure channel when reaches data centres is vulnerable to numerous attacks .The most widely adoptable methodology is safeguarding the cloud data is through encryption algorithm. Encryption of large data deployed in cloud is actually a time consuming process. For the secure transmission of information AES encryption has been used which provides most secure way to transfer the sensitive information from sender to the intended receiver. The main purpose of using this technique is to make sensitive information unreadable to all other except the receiver. The data thus compressed enables utilization of storage space in cloud environment. It has been augmented with Hadoop‟s map-reduce paradigm which works in a parallel mode. The experimental results clearly reflect the effectiveness of the methodology to improve the security of data in cloud environment.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
Storage of user or application-generated user-specific private, confidential data on a third party storage provider comes with its own set of challenges. Although such data is usually encrypted while in transit, securely storing such data at rest presents unique security challenges. The first challenge is the generation of encryption keys to implement the desired threat containment. The second challenge is secure storage and management of these keys. This can be accomplished in several ways. A naive approach can be to trust the boundaries of a secure network and store the keys within these bounds in plain text. A more sophisticated method can be devised to calculate or infer the encryption key without explicitly storing it. This paper focuses on the latter approach. Additionally, the paper also describes the implementation of a system that in addition to exposing a set of REST APIs for secure CRUD operations also provides a means for sharing the data among specific users.
Today, the growth of digitalization has made the ease for livelihood for all the organizations. Cloud computing the storage provider for all the computer resources has made it easy for accessing the data from anywhere anytime. But at the same time the security for cloud data storage is the major drawback which is provided by various cryptographic algorithms. These algorithms convert the data into unreadable format, known as cipher text, Rivest, Shamir and Adleman (RSA) one of the most popularly used asymmetric algorithm. This paper gives detailed review about such different cryptographic algorithms used for the cloud data security. The comparison study is also made for the size of data and to analyze the encryption time and decryption time, which concludes that to enhance the cloud data security some addon techniques are to be used along with these cryptographic algorithms. To increase the security level and to increase the transmission speed of plaintext, integrated method will be proposed by encoding the plaintext to intermediate plaintext and then intermediate plaintext will be compressed using any one of the compression techniques to increase the compression ratio, lastly the compressed file is encrypted to further enhance the security level.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
An Aerospace Vehicle is capable of flight both within and outside the sensible atmosphere. An Actuation System is one of the most important Systems of an Aerospace vehicle. This paper study involves detailed study of various controls Actuation System and Design of a typical Hydraulic Actuation Systems. An actuator control system concerned with electrical, electronic or electro mechanical. Actuator control systems may take the form of extremely simple, manually-operated start-and-stop stations, or sophisticated, programmable computer systems. Hydraulic Actuation System contains Electro Hydraulic Actuators, Servo Valves, Feedback Sensing elements, Pump Motor package, Hydraulic Reservoir, Accumulator, various safety valves, Filters etc. The main objective of this study involves design of Hydraulic Actuator and selection of various other components for the Actuation Systems of an Aerospace Vehicle. Design of the system includes design of Hydraulic actuator and also the Modeling and Analysis of actuator using sophisticated Software.
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
Now a day in all sector weight reduction is most important criteria for lowering the cost & high performance. For weight reduction composite material is good option to solve weight related problems. In this paper we describe analysis of composite glass fibre material with mild steel material comparison. For analysis purpose we can use FEA software. The objective of this paper is compare things like different loading conditions stress distribution etc.
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
Computerized MR of brain image binarization for the uses of preprocessing of features extraction and brain abnormality identification of brain has been described. Binarization is used as intermediate steps of many MR of brain normal and abnormal tissues detection. One of the main problems of MRI binarization is that many pixels of brain part cannot be correctly binarized due to the extensive black background or the large variation in contrast between background and foreground of MRI. Proposed binarization determines a threshold value using mean, variance, standard deviation and entropy followed by a non-gamut enhancement that can overcome the binarization problem. The proposed binarization technique is extensively tested with a variety of MRI and generates good binarization with improved accuracy and reduced error.
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
The objective of this work is to assess the utility of personalized recommendation system (PRS) in the field of movie recommendation using a new model based on neural network classification and hybrid optimization algorithm. We have used advantages of both the evolutionary optimization algorithms which are Particle swarm optimization (PSO) and Bacteria foraging optimization (BFO). In its implementation a NN classification model is used to obtain a movie recommendation which predict ratings of movie. Parameters or attributes on which movie ratings are dependent are supplied by user's demographic details and movie content information. The efficiency and accuracy of proposed method is verified by multiple experiments based on the Movie Lens benchmark dataset. Hybrid optimization algorithm selects best attributes from total supplied attributes of recommendation system and gives more accurate rating with less time taken. In present scenario movie database is becoming larger so we need an optimized recommendation system for better performance in terms of time and accuracy.
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
Although precision agriculture has been adopted in few countries, the greenhouse based modern agriculture industry in India still needs to be modernized with the involvement of technology for better production and cost control. In this paper we proposed a multifunction model for smart agriculture based on IoT. Due to variable atmospheric circumstances these conditions sometimes may vary from place to place in large farmhouse, which makes very difficult to maintain the uniform condition at all the places in the farmhouse manually. Soil and environment properties are sensed and periodically sent to cloud network through IoT. Analysis on cloud data is done for water requirement, total production and maintaining uniform environment conditions throughout greenhouse farm. Proposed model is beneficial for increase in agricultural production and for cost control and real time monitoring of farm.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
This paper describes a command interface for games based on hand gestures and voice command defined by postures, movement and location. The system uses computer vision requiring no sensors or markers by the user. In voice command the speech recognizer, recognize the input from the user. It stores and passes command to the game, action takes place. We propose a simple architecture for performing real time colour detection and motion tracking using a webcam. The next step is to track the motion of the specified colours and the resulting actions are given as input commands to the system. We specify blue colour for motion tracking and green colour for mouse pointer. The speech recognition is the process of automatically recognizing a certain word spoken by a particular speaker based on individual information included in speech waves. This application will help in reduction in hardware requirement and can be implemented in other electronic devices also.
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
As we know the population of Chandrapur City has increased so far in this years and with that has increased the vehicles causing high traffic volume & rise in pollution. But the transportation system in Chandrapur City is still the same. To reduce the traffic volume & pollution, we have to study & design the new transportation system in Chandrapur City. The system would be as similar to Nagpur City with the implementation of Star City Buses. In this Study we would first compare the speed of various vehicles. Collection of population details of Chandrapur City, approximate number of vehicles running on road, collection of data with respect to Ticket fares in Nagpur City- whether it is according to Kilometers or places to be reached, calculation of Ticket Fares for Chandrapur City on the basis data collected. By all these, the best mode of transport in City can be studied. On the basis of above data collected from various respected fields, we will then proceed for the Design part of urban transport system in Chandrapur City. For Design purpose, firstly we have to mark the centre of the City, when the centre is decided; we will then select the Bus Terminus. From centre of the city, we would prefer to select the routes of the Buses. One route will be for the city side like Jatpura Gate, Pathanpura Gate. One route will be for Ballarpur going road. The other one for Mul going road, then next for Nagpur road. We could decide as many routes once we get the clear idea about all data. By getting all this details, the next step is to design the destination points of Buses. Then we have to design about the Bus bays, to reduce congestion in the particular intersections or Stops of bus. After the design also can suggest for Bus lanes. Implementation of Bus Rapid Transit System (BRT system) is the main aim behind to develop transportation mode of City. The design of the Transport System can be designed with the help of various software’s like AutoCAD and Revit.
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
Heavy kiln tyre Lifting, rigging and assembly with kiln shell is done manually by use of heavy crane and labour. This traditional technique is not safe. The challenge is find out solution for ease the process and cost effective because of limitations of the rigging system, erection area, can be managed safely by the kiln tyre suspender equipped by jaws and suspender beam. This review paper deals with the study and analysis of different papers which are deals with different lifting, gripping and installation techniques and other aspects analysis with software, experimentation and optimization etc.
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
Sandstones from seven different hydroelectric projects have been assessed to compare their water-related properties and engineering parameters and the comprehensive analysis has been presented. The study has been done by categorizing the sandstones in to three categories i.e. weak, moderate & strong sandstones. The study leads to four broad inferences: (1), there could be very large variation between two sandstones; e.g., here, sandstone S2, S4 & S5, vis-à-vis other two strong sandstones, is superior in all respects. (2), the four weak sandstones differ in respect of some – not all – properties and parameters. (3), none of the four weak sandstones is better than the other two in respect of all properties and parameters. (4), moderate sandstone shows higher values of shear strength parameters in comparison to all the sandstones (including stronger sandstones also) except S3 strong sandstone. In respect of individual properties, the grain density of all sandstones is similar, though their bulk densities, apparent porosity and water content show great variation. The weak, moderate and strong sandstones show qualitative difference in their uniaxial compressive strength and wave velocity (compression and shear, both); and the two are directly proportional. The study clearly demonstrates that there is no one-to-one correspondence between any two properties and parameters, but there is a diffused and/ or qualitative relationship between different sandstones, or certain properties and parameters of a particular variant.
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
Need of rice transplanting machine is growing nowadays because of unique feature seeding in well sequence and well manners. This will save too much efforts of human being. Class of people who uses this kind of machine is farmers and they are having poor economic background. To feed growing population is a huge challenge. Importation of rice will lead to drain out the economy of the country. Mechanization of paddy sector will lead to higher productivity with releasing of work force to other sectors. The objective of this project is to design a paddy transplanting mechanism to transplant paddy seedling by small scale farmers in the country. Hence, this is considered as an activity that needed mechanization. For mechanization the modeling and simulation evaluated for hand operated rice seeding machine, which is help the farmers to planting more and more amount of rice in good quality with low energy consumption and less harm to the environment. India is predominately an agricultural country with rice as one of its main food crop. It Produce about 80 million tons rice annually which is about 22% of the world rice production. Culturally transplanting of young seeding is preferred over direct seeding for better yield and better crop management practice. But this operation requires large amount of manpower (about 400 Man-Hour/ha) and task is very laborious involving working in stopping posture and moving in muddy field.
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
DakNet, is an ad hoc network and an internet service planted on the applied science, which uses wireless technology to provide an asynchronous digital connectivity, it is the intermediate of wireless and asynchronous service that is the beginning of a technical way to universal broadband connectivity. The major process is it provides the broadband connectivity as wider. This paper broadly describes about the technology, architecture behind and its working principles.
Line following is one of the most important aspects of Robotics. A Line Follower Robot is an autonomous robot which is able to follow either a black or white line that is drawn on the surface consisting of a contrasting color. It is designed to move automatically and follow the made plot line. The path can be visible like a black line on a white surface or it can be invisible like a magnetic field. It will move in a particular direction Specified by the user and avoids the obstacle which is coming in the path. Autonomous Intelligent Robots are robot that can perform desired tasks in unstructured environments without continuous human guidance. It is an integrated design from the knowledge of Mechanical, Electrical, and Computer Engineering. LDR sensors based line follower robot design and Fabrication procedure which always direct along the black mark on the white surface. The robot uses several sensors to identify the line thus assisting the bot to stay on the track. The robot is driven by DC motors to control the movements of the wheels.
The project is to ask college related queries and get the responses through a chatbot an Artificial Conversational Entity. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chatting. Students can chat using any format there is no specific format the user has to follow. This system helps the student to be updated about the college activities.
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
Coimbatore (11.0168°N,76.9558°E) is a fast developing cosmopolitan city with large number of industries and educational institutions. The development has lead to a large number of vehicles causing heavy traffic. The traffic congestion at Coimbatore has been a major problem which causes traffic jams and accidents. The major reason for traffic has been the mofussil buses that operate in the city. Around 1300 mofussil buses enter into the city, these buses play an important role in traffic congestion. The best solution is to construct a centralized bus stand at the outskirts of the city. This would reduce the traffic, accidents and also leads to development of the outskirts of the city. A suitable location near the city with sufficient road access to connecting cities has been chosen and the bus terminus has been designed, modeled with all facilities and features.
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
Cyclone is the most commonly used device to separate dust particles from gas and dust flow. The performance of cyclone separator can be measured in terms of collection efficiency and pressure drop. Parameters like Inlet Flow velocity, the particle size distribution in feed, dimensions of inlet and outlet ducts and cyclone affects the performance of cyclone significantly. Various Mathematical models used for calculation of cut off diameter of separator, flow rate, target efficiency and no. of vortex inside the cyclone to design and study to check the performance of existing cyclone separator. Also new dimensions can be design with help of models. Here, in this study the efficiency achieved with Lapple model cumulatively 86.47%.
During past few years, brain tumor segmentation in CT has become an emergent research area in the field of medical imaging system. Brain tumor detection helps in finding the exact size and location of tumor. An efficient algorithm is proposed in this project for tumor detection based on segmentation and morphological operators. Firstly quality of scanned image is enhanced and then morphological operators are applied to detect the tumor in the scanned image. The problem with biopsy is that the patient has to be hospitalized and also the results (around 15%) give false negative. Scan images are read by radiologist but it's a subjective analysis which requires more experience. In the proposed work we segment the renal region and then classify the tumors as benign or malignant by using ANFIS, which is a non-invasive automated process. This approach reduces the waiting time of the patient.
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
An extensive study of automotive body corrosion was conducted in Mumbai area to track corrosion performance of currently used materials of construction for automotive, especially cars with low end cost. The study consisted of a wide range of areas, starting from a closed car parking to several coastal and other humid regions such as Juhu Beach, Varsova beach and other adjoining areas. Data such as visible perforations, paint blisters, and surface rust were seen especially at vulnerable areas such as doors, mudguards, bonnet areas etc. Also, a comparison was done with low cost cars built with normal steel with those built using galvanized steels.
The main objective of our work is to deliver the goods at proper time by an unmanned drone. An Autonomous drone for delivering the goods such as bombs, medical kids, and foods mainly for military uses. This drone was used for dispatching the bombs and armed guns in battle field. And it is also used for delivering the medicines and foods for soldiers in our country borders.
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
Since the population of the world is aging rapidly, how to provide appropriate health care to the elderly and unwell people becomes an important issue and draws high attention from medical, academic and industrial fields of the society. The Internet of Things (IoT) drives the evolution of the Internet and is regarded as a great potential to improve quality of life for the surging number of elderly people, significantly. As Android operating system gains immense popularity nowadays, it is a trend to make use of it for the wider access of IoT utility. This project presents a health monitoring system prototype based on IoT, with the increasing use of sensors by medical devices, remote and continuous monitoring of a patient’s health. This network of sensors and other mobile communication devices referred to as the Internet of Things for Medical Devices (IoT-MD), is poised to revolutionize the functioning of the healthcare industry. Untimed medicine administration can always show adverse effects on the health of the patients. The proposed system is designed to help these patients to take the required medicine in the right proportion at the right time. The basic ideology is integrating the principle of IoT with weight-based slot sensing on a normal pillbox. To make it more state-of-the-art, it is inbuilt with a Wi-Fi module for alerting the patient and also the chemist at the needed instant using IoT.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
1. Journal for Research | Volume 03| Issue 01 | March 2017
ISSN: 2395-7549
All rights reserved by www.journal4research.org 77
Security Based Issues in View of Cloud Based
Storage System
Grusha Chouhan Ankit Upadhyay
Department of Computer Science & Engineering Department of Computer Science & Engineering
Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India
Anuradha Deolase Prashant Lakkadwala
Department of Computer Science & Engineering Department of Computer Science & Engineering
Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India
Abstract
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and
usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver
only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means
data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from
unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud
confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage
and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code
(MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large
amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA,
Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is
under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it
fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while
saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored
data is investigated, has been given more attention recently.
Keywords: Cloud Computing, Information Security, Security Based Issues
_______________________________________________________________________________________________________
I. INTRODUCTION
Cloud computing is mainly used for data storage. Here the data is stored on multiple third-party servers [2]
. The user sees a virtual
server; it appears as if the data is stored in a particular place with a specific name, when storing the data. This doesn’t exist in
reality. It’s just used to reference the virtual space of the cloud. In reality, the user’s data could be stored on any one or more of
the computers used to create the cloud. Three important conditions for the data security over the cloud are (i) Confidentiality [8]
,
(ii) Integrity [4]
, (iii) Availability [5][8]
. Understanding cloud security risks is related to understanding the relationships and
dependencies between cloud computing models and how they are deployed. IaaS[5][9]
forms the foundation of the service model
architecture, PaaS builds upon IaaS, and SaaS[5][9]
in turn builds upon PaaS[5][9]
; and information security issues and risks are
inherited just as capabilities are.
Cloud allows users to achieve the power of computing which beats their own physical domain. It leads to many security
problems. The cloud service provider for cloud makes sure that the customer does not face any problem such as loss of data or
data theft. Cloud computing infrastructures use new technologies and services, most of which haven’t been fully evaluated with
respect to security [9]
.
Cryptography can be seen as a method of storing and disguising confidential data in a cryptic form so that only those for
whom it is intended can read it and are able to communicate information in the presence of an adversary and the security
algorithms mitigate security issues by use of cryptography, authentication and distributing keys securely. Cryptography is thus
the science of making data and messages secure by converting the end user data to be sent into cryptic non-readable form and
encrypting or scrambling the plaintext by taking user data or that referred to as clear text and converting it into cipher text and
then performing decryption which is reverting back to the original plain text. Cryptography is used for providing the following
security:
Data Integrity: information has value only if it is correct, this refers to maintaining and assuring the accuracy and
consistency of data, its implementation for computer systems that store use data, processes, or retrieve that data [4]
.
Authentication for determining whether someone or something is, in fact, who or what it is declared to be [3]
.
Non Repudiation: is the assurance that a party, contract or someone cannot deny the authenticity of their signature and
sending a message that they originated [2]
.
2. Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 78
Confidentiality: relates to loss of privacy, unauthorized access to information and identity theft [8]
.
Fig. 1: Cloud Computing Solutions
II. SECURITY CONCERNS
The security concerns are end user data security, network traffic, file systems [7]
, and host machine security which cryptography
can resolve to some extent and thus helps organizations in their reluctant acceptance of Cloud Computing [7]
. There are various
security issues that arise in the Cloud:
Ensuring Secure Data Transfer: In a Cloud environment, the physical location and reach are not under end user control of
where the resources are hosted [8]
.
Ensuring Secure Interface: integrity of information during transfer, storage and retrieval needs to be ensured over the
unsecure internet [8]
.
Have Separation of data: privacy issues arise when personal data is accessed by Cloud providers or boundaries between
personal and corporate data do not have clearly defined policies.
Secure Stored Data: question mark on controlling the encryption and decryption by either the end user or the Cloud Service
provider.
User Access Control: for web based transactions (PCI DSS), web data logs need to be provided to compliance auditors and
security managers [8]
.
Fig. 2: Asymmetric encryption-decryption for communication
III. SECURITY ALGORITHMS
Security algorithms which are used for cryptography [1][10]
are classified in three categories:
Hash key algorithms: Compress data for signing to standard fixed size. Examples include: MD5, SHA
Private Key / Symmetric Algorithms: Use single secret key for encrypting large amount of data and have fast processing
speed. These algorithms use a single secret key that is known to the sender and receiver. RC6, 3DES, Blowfish, AES are
some examples of this algorithms [6][7]
.
Public Key [8]
/ Asymmetric Algorithms: Use a key pair for cryptographic process, with public key for encryption and
private for decryption. These algorithms have a high computational cost and thus slow speed if compared to the single key
symmetric algorithms. RSA and Diffie-Hellman are some types of public key algorithms [6][7]
.
3. Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 79
IV. ALGORITHMS
Data Encryption Standard (DES)
Triple- DES (TDES)
Blowfish Algorithm
IDEA
Homomorphic Encryption
RSA
Diffie- Hellman Key Exchange
Data Encryption Standard (DES)
DES is very commonly used symmetric key algorithm.[6]
It was developed by IBM in 1974, but now a day’s many methods are
found that had proven this algorithm unsecured. A block cipher is a method of encryption text (to produce cipher) in which a
cryptographic key and algorithm are applied to a block of data (for ex: - 64 contiguous bits) at once as a group rather than to one
bit at a time. The main alternative method, used much less frequently is called “Stream Cipher”. In DES algorithm block cipher
is of 64 bits and key used are 56 out of 64 bits.
Algorithm
Step 1:- The 64-bit plain text block is handed over to an INITIAL PERMUTATION (IP) function.
Step 2:- The initial permutation is performed on plain text.
Step 3:-Next, The initial permutation (IP) produces two halves of the permuted block i.e., Left Plain Text (LPT) and Right Plain
Text (RPT).
Step 4:-Now, each of LPT and RPT go through 64 rounds of encryption process, each with its own key.
Step 5:-In the end, LPT and RPT are rejoined, and a FINAL PERMUTATION (FP) is performed on the combined block.
Step 6:-The result of this process produces 64-bit cipher text.
Triple- DES (TDES)
TDES is enhanced version of DES in TDES the key size is increased to increase i.e. 168 bits the security of data. In TDES only
size of key is increased rest of the working is similar to DES. In TDES three different keys are applied on cipher block i.e. k 1, k
2 and k 3. [6][10]
Algorithm
Step 1:- Encrypt the plain text with key K1. Thus, we have Ek1(P).
Step 2:-Decrypt the output of step1 above with key K2. Thus, we have Dk2(Ek1(P)).
Step 3:-Finally, Encrypt the output of step 2 again with key K1. Thus, we have Ek1(Dk2(Ek1(P))).
Blowfish Algorithm
Blowfish Algorithm is a symmetric key algorithm [6]
which was developed in 1993 by Bruce Schneier. In DES key size is small
and can be decrypted easily but in Blowfish algorithm the size of key is large and it can vary from 32 to 448 bits. In Blowfish
algorithm also 64 bits of plain text is divided into two parts of size 32 bits.
Algorithm
Step 1:- Divide X into two blocks: XL and XR, of equal sizes. Thus, both XL and XR will consist of 32 bits each.
Step 2:- For i=1 to 16
XL=XL XOR Pi
XR=F (XL) XOR XR
Next i
Step 3:- Swap XL, XR (i.e. undo last swap).
Step 4:- XL=XL XOR P18.
Step 5:- Combine XL and XR back into X.
IDEA
International Data Encryption Algorithm was proposed by James Massey and Xuejia Lai in 1991.It is considered as best
symmetric key algorithm. It accepts 64 bits plain text and key size is 128 bits.
Algorithm
Step 1:-The 64-bit input plain text block is divided into four portions of plain text (each of size 16 bits), P1 to P4.Thus, P1 to P4
are the inputs to the first round of the algorithm. There are eight such rounds. The keys consist of 128 bits.
Step 2:-In each round, six sub keys are generated from the original key. Each of sub keys consists of 16 bits. These six sub keys
are applied are applied to the four input blocks P1 to P4. Thus, for the first round, we will have the six keys k1 to k6. For the
second round we will have k7 to k12.Finally, for the eight round we will have keys k43 to k48.
Step 3:-The final step consists of an OUTPUT TRANSFORMATION, which uses four sub keys (k49-k52).
4. Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 80
Step 4:-The final output produced is the output produced by the output transformation step, which is four blocks of cipher text
named C1 to C4 (each consisting of 16 bits).
Step 5:-These are combined to form the final 64-bit cipher-text block.
Homomorphic Encryption
Homomorphic encryption uses asymmetric key algorithm in which two different keys are used for encryption and decryption i.e.
public key and private key . In mathematics homomorphic means conversion of one data set to another, without losing its
relation between them. In homomorpic complex mathematics functions are applied to encrypt the data and similar but reverse
operation is applied to decrypt the data.
RSA
RSA was invented by Ranold Fivest, Adi Shamir [3]
and Leonard Adleman in 1977. RSA is also an asymmetric algorithm. [6][10]
Functioning of RSA is based on multiplication of two large numbers. Two large prime numbers are generated and multiplied.
After multiplying two numbers, modulus is calculated the number that is generated is used as the public and private key. The two
numbers that are used for multiplication-one of them is public other is private.
Algorithm
Step 1:-Choose two large numbers P and Q.
Step 2:-Calculate N+P*Q.
Step 3:-Select the public key (i.e. the encryption key) E such that it is not a factor of (P-1) and (Q-1).
Step 4:-Select the private key (i.e. the decryption key) D such that the following equation is true:
(D*E) mod (P-1)*(Q-1)=1
Step 5:-For encryption, calculate the cipher text t CT from the plain text PT as follows:
CT=PTE
mod N
Step 6:-Send CT as the cipher text to the receiver.
Step 7:-For decryption, calculate the plain text PT from the cipher text CT as follows: PT=CTD
mod N
Diffie- Hellman Key Exchange
Diffie Hellman key exchange algorithm was developed by Whitfield Diffie and Martin Hellman in 1976. Diffie Hellman also
required two different keys [6]
. In Diffie Hellman Key Exchange, a shared secret key established, that is used that is used for
communication over the public network [10]
.
Algorithm
Step 1:-Firstly, Alice and Bob agree on two large prime numbers, n and g. These two integers need not be kept secret. Alice and
bob can use an insecure channel to agree on them.
Step 2:-Alice chooses another large random number x, and calculates A such that:
A=gx
mod n
Step 3:-Alice sends the number A to Bob.
Step4:-Bob independently chooses another large random integer y and calculates B such that:
B=gy
mod n
Step 5:-Bob sends the number B to Alice.
Step 6:-A now computes the secret key k1 as follows:
K1=Bx
mod n
Step 7:-B now computes the secret key K2 as follows:
K2=Ay
mod n
V. CONCLUSIONS
The system will contribute in the designing and development of a user space cryptographic file system. The design goal will
mainly focus on the security of the file system. The system will be very convenient to the user and the independenbility will be
achieved with the help of java technology which is highly portable.
REFERENCES
[1] “Cloud Security Algorithms” International Journal of Security and its Applications, Vol. 9, No.10 (2015), pp.353-360
[2] Dr. NEDHAL A. AL-SAIYD, NADA SAIL “Data Integrity in Cloud Computing Security” Journal of Theoretical and Applied Information Technology,
Vol. 58 No. 3, December 2013
[3] Mandar Kadam, Stewyn Chaudhary, Bony Carvalho, “Security Approach for Multi-Cloud Data Storage” International Journal of Computer Applications
(0975-8887) Volume 126-N0.4, September 2015
[4] “Identifying Data Integrity in the Cloud Storage” International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
[5] “TREM: A New Cloud Security Algorithm” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4,
April 2016
[6] Randeep Kaur , Supriya Kinger “Analysis of Security Algorithms in Cloud Computing” International Journal of Application or Innovation in Engineering
& Management (IJAIEM) Volume 3, Issue 3, March 2014
5. Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 81
[7] S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems Volume 3– No.1, July2012
[8] Sultan Aldossary, William Allen “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions” International
Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
[9] “Security Issues and Security Algorithms in Cloud Computing” International Journal of Advanced Research in Computer Science and Software
Engineering Volume 2, Issue 10, October 2012
[10] “Security Algorithms for Cloud Computing” International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science
85 ( 2016 ) 535 – 542
[11] Upadhyay and P. Lakkadwala, "Secure live migration of VM's in Cloud Computing: A survey," Reliability, Infocom Technologies and Optimization
(ICRITO) (Trends and Future Directions), 2014 3rd International Conference on, Noida, 2014, pp.1-4.doi: 10.1109/ICRITO.2014.7014766.
[12] Upadhyay, A.; Lakkadwala, P., "Performance evolution of higher reliability task in cloud computing," 2014 Conference on IT in Business, Industry and
Government (CSIBIG), vol., no., pp.1,3, 8-9 March 2014 doi: 10.1109/CSIBIG.2014.7056956.
[13] Palkesh Soni, Ankit Upadhyay, Arvind Maheshwari and Prashant Lakkadwala, “Security Related Issues in Cloud Computing: A Survey”, IJIRST –
International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 11 | April 2016 ISSN (online): 2349-6010.