SlideShare a Scribd company logo
1 of 4
Download to read offline
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
1
www.viva-technology.org/New/IJRI
Providing Secure Cloud for College Campus
Belamkar Shridhar Vitthal 1
, Darade Hitesh Subhash 2
, Qureshi Umair Nasim
Ahmed 3
, Prof. Vinit Raut 4
1, 2, 3, 4
(Computer Engineering Department, Viva Institute of Technology, India)
Abstract: In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
Keywords - Advanced Encryption Standard, Data Deduplication, Elliptic Curve Cryptography, One Time
Password, Hybrid Cryptographic System
I. INTRODUCTION
Cloud computinghas rapidly become one of the most emerging technology due to its progressive services
provided model of computing not only in the IT industry but also in the software and hardware industry. The
Cloud referring to the servers that are passage over the Internet, and the software and databases that running on
those servers. Cloud servers are find in data centres all over the world. By using cloud computing, users and
corporate offices do not have to handle physical servers themselves or run software applications on their own
machines. The cloud permit users to access the same files and applications from almost any device, because the
computing and storage takes place on servers in a data centre, rather than locally on the user device [13].
Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and
deletion which helped several organizations to save money and time adding convenience to the end users. This
mechanism came up with increased flexibility, scalability and reliability where server is not capable of handling
all these. Server cannot provide better user management to avoid unauthorized access. Data security is not strong
in server where in cloud a strong encryption technique gives strong data protection. Since user management give
access only to authentic user and each can access only there data so other data on the cloud can’t delete, alter and
misplaced by any means. Although with limited storage capacity cloud gives advantage of data duplication in
which if same data user try to store on the cloud it will inform to user that the data is duplicated. And then it will
discard that data. This lead efficient to use of storage.
II. LITERATURE SURVEY
The AES and RSA encryption algorithm is combined due to that data security on cloud increases. Key
size of RSA encryption technique is large comparatively AES hence speed of encryption reduces [1]. AES
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
2
www.viva-technology.org/New/IJRI
encryption technique is use to encrypt data to be store on the cloud which provide much more security to the
data [2]. File versioning and verification is use for data deduplication to avoid wastage of storage. But it takes
more computational time [3]. Image is encrypt using convergent scheme then hash value is calculated and this
hash value will be send to S1 and S2 server for checking deduplication. By this if copy of image is already
present on the cloud then storing same image again can be avoided. In this system only two server S1 and S2 is
used and deduplication of image is only possible [4]. First and Last 50 bytes of the file will be extracted and then
these 100 bytes will be compared with existing file to perform data duplication. If same data already stored then
a copy of the data cannot store hence effective use of storage is possible. In some cases by comparing only first
and last 50 bytes is not sufficient to check if file is already stored on the cloud [5].
In homographic encryption the data present in the cipher text form can processed, that is the computation can
be done on the encrypted data, which produce the same result as if done on the actual data. It uses FHE scheme.
It allows secure storage & processing on data in the encrypted form. The computation on encrypted data stored
at cloud is possible [6]. The data for uploading cloud server is encrypted by AES. Encryption scheme and to
enhance the security. AES key encrypt data using ECC algorithm. This algorithm is fast and safe in both direction
such as upload & download of file. & it is multilevel encryption technique. As decryption technique is multilevel
so if some data is lost then it is very difficult to decrypt the data [7]. Initially, an index is generated by Porter
stemming then the Blowfish algorithm is applied for encryption of files. For authorized access, public key
encryption based ECC is used for key generation. This paper investigates cipher text retrieval over cloud storage
with some efficient techniques for privacy [8].
It describes and compare different techniques such as ABE (Attribute Based Encryption), MLE (Message
Locked Encryption), Symmetric encryption algorithm, PoW (Proof-of-ownership). In this paper survey of
various techniques used for data deduplication is done [9]. To remove data redundancy from available offline or
online data storage as well as provide the security of data which helps to improve the performance of system.
Selective deduplication uses the request based deduplication techniques which reduces the bursty traffic on
network [10]. This paper investigates encryption schemes currently implemented in many secure products in
cloud environments. Where each encryption scheme is evaluated and analyzed in its efficiency, security and
functionality for big data on the cloud [11]. The data of the user may be stored in a shared cloud storage system
instead of storing in devices of cloud service provider. Data security of cloud storage and to formulate
corresponding cloud storage security policy [12].
III. PROPOSED SYSTEM
Figure 1 shows, first user have to first create an account and login by providing valid credentials and if
the credentials are invalid then user have to retry the same process again & again till the user entered the correct
or valid credentials.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
3
www.viva-technology.org/New/IJRI
Fig 1: System Flow Diagram
After that user have to enter OTP which ensure strong user authenticity with two factor authentications, an
extra layer of security is added to the account to prevent someone from logging in, even if password is already
known. This extra security measure requires user to verify the identity using a randomized 6-digit code will be
send to user each time attempt to log in [14]. Now user can either upload files on the cloud and can be download
files from cloud. While uploading and downloading to ensure data security a hybrid cryptographic encryption
technique is used that is different text files of different sizes are taken as input. After taking text file as input, AES
algorithm is applied for encrypting the text file. AES will encrypt the text using a key which is not its own but
generated by elliptic curve cryptography algorithm (ECC). Encrypted text file is uploaded to the server after
encryption using AES. Client will download the encrypted file from the server. Using the same key generated by
elliptic curve cryptography algorithm, client will decrypt the encrypted text. After decryption is successfully done
client will have the original text file.
If user want to upload file on cloud it will be first check whether this file is already present on cloud or not this
step ensure efficient use of storage by use of data deduplication. Data deduplication works by comparing chunks
of data or objects (files) in order to detect duplicates. Deduplication can take place if the block of data file matches
with other block of file which is there in the cloud then it should simply discard that duplicate file.
IV. PARTIAL IMPLEMENTATION
In the partial implementation the encryption and decryption of file, two step verification and data
deduplication is done. But setup (installation) of cloud part is remaining and that will be completed soon. The
encryption of particular file is done by using AES and ECC algorithm and that file contain the text which is stored
as text.txt. The decryption of the same file is done properly and the file saved in project folder with name decrypted
file. The OTP part is completed via authentication codes. The data deduplication program first finds files with
matching sizes. It then runs an MD5 hash to find duplicate files. The MD5 hashing algorithm is a one-sided
cryptographic function that accepts a text of any length as input and returns as output a fixed-length digest value
to be used for authenticating the original text.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280 Article No. X
PP XX-XX
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
4
www.viva-technology.org/New/IJRI
V. CONCLUSION
A Cloud security is the protection of data stored online via cloud computing platforms from theft,
leakage, and deletion for that first required to implement AES and ECC encryption algorithm for strong data
protection with efficiency. For that a Hybrid Cryptographic System (HCS) required which will combines the
benefits of both symmetric and asymmetric encryption. During the design of the system to make sure of trusted
authentication thereby allowing the feature of One Time Password (OTP) so user first enter login credential after
that user have to enter OTP which ensure strong user authenticity. If user want to upload file on cloud then first it
will be compare with stored files for duplication and if there is match then it will be discarded otherwise it will be
store on cloud and by use of this technique data deduplication will be achieved. This data deduplication program
first finds files with matching sizes. It then runs an MD5 hash to find duplicate files. Integrating all this features
to make secure cloud and setup of cloud part is work in progress completed in future.
REFERENCES
[1] Akshay Arora, Anmol Rastogi, Abhirup Khanna, Amit Agarwal, “Cloud Security Ecosystem for Data Security and
Privacy”, 2017 7th International Conference on Cloud Computing, Data Science & Engineering.
[2] Bih-Hwang Lee, Ervin Kusuma Dewi, Muhammad Farid Wajdi, “Data Security in Cloud Computing Using AES
Under HEROKU Cloud”, 2018 27th Wireless and Optical Communication Conference (WOCC).
[3] Dhanaraj Suresh Patil, R. V. Mane, V.R.Ghorpade, “Improving the Availability and Reducing Redundancy using
Deduplication of Cloud Storage System”, 2017 International Conference on Computing, Communication, Control
and Automation (ICCUBEA).
[4] Zhaocong Wen, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Li , Jin Li, “2014 International Conference on
Intelligent Networking and Collaborative Systems”, 2017 7th International Conference on Cloud Computing,
Data Science & Engineering.
[5] Bhairavi Kesalkar, Dipali Bagade, Manjusha Barsagade, Namita Jakulwar, “Implementation of data deduplication
using cloud computing”, KITE/NCISRDC/IJARIIT/2018/CSE/105 IJARIIT( ISSN: 2454-132X).
[6] H. R. Nagesh, L Thejaswini, “Study on encryption methods to secure the privacy of the data and computation on
encrypted data present at cloud”, 2017 International Conference on Big Data Analytics and Computational
Intelligence (ICBDAC).
[7] Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule, “A multilevel encryption technique in cloud
security”, 2017 7th International Conference on Communication Systems and Network Technologies.
[8] Srinivas Mudepalli, V. Srinivasa Rao, R. Kiran Kumar, “An efficient data retrieval approach using blowfish
encryption on cloud ciphertext retrieval in cloud computing”, International Conference on Intelligent Computing
and Control Systems ICICCS 2017.
[9] Milind B. Waghmare, Suhasini V. Padwekar, “Survey on techniques for Authorized Deduplication of Encrypted
data in Cloud”, 2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan.
22-24, 2020, Coimbatore, INDIA.
[10] Mr. Nishant N.Pachpor, Dr. Prakash S.Prasad, “Improving the Performance of System in Cloud by Using Selective
Deduplication”, Proceedings of the 2nd International conference on Electronics, Communication and Aerospace
Technology (ICECA 2018) IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1.
[11] Chungsik Song, Younghee Park, Jerry Gao, Sri Kinnera Nanduri, William Zegers, “Favored Encryption Techniques
for Cloud Storage”, 2015 IEEE First International Conference on Big Data Computing Service and Applications.
[12] DIAO Zhe, WANG Qinghong, SU Naizheng, ZHANG Yuhan, “Study on Data Security Policy Based On Cloud
Storage”, 2017 IEEE 3rd International Conference on Big Data Security on Cloud.
[13] https://www.cloudflare.com/learning/cloud/what-is-the-cloud/, last accessed on: 12/10/2020.
[14] https://www.fidelity.com/security/how-two-factor-authentication-works/, last accessed on: 16/10/2020.

More Related Content

What's hot

IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 

What's hot (19)

IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
J018145862
J018145862J018145862
J018145862
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 

Similar to Providing Secure Cloud for College Campus

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secureIJAEMSJORNAL
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 

Similar to Providing Secure Cloud for College Campus (20)

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 

More from vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problemvivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethicsvivatechijri
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeingvivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbotsvivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technologyvivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devicesvivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Fluttervivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
 

More from vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Providing Secure Cloud for College Campus

  • 1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 Article No. X PP XX-XX VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 1 www.viva-technology.org/New/IJRI Providing Secure Cloud for College Campus Belamkar Shridhar Vitthal 1 , Darade Hitesh Subhash 2 , Qureshi Umair Nasim Ahmed 3 , Prof. Vinit Raut 4 1, 2, 3, 4 (Computer Engineering Department, Viva Institute of Technology, India) Abstract: In colleges data stored on the server can be access by any college staff, student or professor. Data is very important and should not be altered or accessed without permission of its owner. But in these type of medium scale organizations server can be access by anyone. A better approach to maintain the data security and sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored data. Since data is upload in cloud through network therefore its security during this phase is very important. For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout operations such as uploading and downloading data. An efficient use of storage should be a primary concern for which data deduplication technique can be applied. Using this technique uploading of duplicate files can be avoided. Keywords - Advanced Encryption Standard, Data Deduplication, Elliptic Curve Cryptography, One Time Password, Hybrid Cryptographic System I. INTRODUCTION Cloud computinghas rapidly become one of the most emerging technology due to its progressive services provided model of computing not only in the IT industry but also in the software and hardware industry. The Cloud referring to the servers that are passage over the Internet, and the software and databases that running on those servers. Cloud servers are find in data centres all over the world. By using cloud computing, users and corporate offices do not have to handle physical servers themselves or run software applications on their own machines. The cloud permit users to access the same files and applications from almost any device, because the computing and storage takes place on servers in a data centre, rather than locally on the user device [13]. Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion which helped several organizations to save money and time adding convenience to the end users. This mechanism came up with increased flexibility, scalability and reliability where server is not capable of handling all these. Server cannot provide better user management to avoid unauthorized access. Data security is not strong in server where in cloud a strong encryption technique gives strong data protection. Since user management give access only to authentic user and each can access only there data so other data on the cloud can’t delete, alter and misplaced by any means. Although with limited storage capacity cloud gives advantage of data duplication in which if same data user try to store on the cloud it will inform to user that the data is duplicated. And then it will discard that data. This lead efficient to use of storage. II. LITERATURE SURVEY The AES and RSA encryption algorithm is combined due to that data security on cloud increases. Key size of RSA encryption technique is large comparatively AES hence speed of encryption reduces [1]. AES
  • 2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 Article No. X PP XX-XX VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 2 www.viva-technology.org/New/IJRI encryption technique is use to encrypt data to be store on the cloud which provide much more security to the data [2]. File versioning and verification is use for data deduplication to avoid wastage of storage. But it takes more computational time [3]. Image is encrypt using convergent scheme then hash value is calculated and this hash value will be send to S1 and S2 server for checking deduplication. By this if copy of image is already present on the cloud then storing same image again can be avoided. In this system only two server S1 and S2 is used and deduplication of image is only possible [4]. First and Last 50 bytes of the file will be extracted and then these 100 bytes will be compared with existing file to perform data duplication. If same data already stored then a copy of the data cannot store hence effective use of storage is possible. In some cases by comparing only first and last 50 bytes is not sufficient to check if file is already stored on the cloud [5]. In homographic encryption the data present in the cipher text form can processed, that is the computation can be done on the encrypted data, which produce the same result as if done on the actual data. It uses FHE scheme. It allows secure storage & processing on data in the encrypted form. The computation on encrypted data stored at cloud is possible [6]. The data for uploading cloud server is encrypted by AES. Encryption scheme and to enhance the security. AES key encrypt data using ECC algorithm. This algorithm is fast and safe in both direction such as upload & download of file. & it is multilevel encryption technique. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data [7]. Initially, an index is generated by Porter stemming then the Blowfish algorithm is applied for encryption of files. For authorized access, public key encryption based ECC is used for key generation. This paper investigates cipher text retrieval over cloud storage with some efficient techniques for privacy [8]. It describes and compare different techniques such as ABE (Attribute Based Encryption), MLE (Message Locked Encryption), Symmetric encryption algorithm, PoW (Proof-of-ownership). In this paper survey of various techniques used for data deduplication is done [9]. To remove data redundancy from available offline or online data storage as well as provide the security of data which helps to improve the performance of system. Selective deduplication uses the request based deduplication techniques which reduces the bursty traffic on network [10]. This paper investigates encryption schemes currently implemented in many secure products in cloud environments. Where each encryption scheme is evaluated and analyzed in its efficiency, security and functionality for big data on the cloud [11]. The data of the user may be stored in a shared cloud storage system instead of storing in devices of cloud service provider. Data security of cloud storage and to formulate corresponding cloud storage security policy [12]. III. PROPOSED SYSTEM Figure 1 shows, first user have to first create an account and login by providing valid credentials and if the credentials are invalid then user have to retry the same process again & again till the user entered the correct or valid credentials.
  • 3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 Article No. X PP XX-XX VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 3 www.viva-technology.org/New/IJRI Fig 1: System Flow Diagram After that user have to enter OTP which ensure strong user authenticity with two factor authentications, an extra layer of security is added to the account to prevent someone from logging in, even if password is already known. This extra security measure requires user to verify the identity using a randomized 6-digit code will be send to user each time attempt to log in [14]. Now user can either upload files on the cloud and can be download files from cloud. While uploading and downloading to ensure data security a hybrid cryptographic encryption technique is used that is different text files of different sizes are taken as input. After taking text file as input, AES algorithm is applied for encrypting the text file. AES will encrypt the text using a key which is not its own but generated by elliptic curve cryptography algorithm (ECC). Encrypted text file is uploaded to the server after encryption using AES. Client will download the encrypted file from the server. Using the same key generated by elliptic curve cryptography algorithm, client will decrypt the encrypted text. After decryption is successfully done client will have the original text file. If user want to upload file on cloud it will be first check whether this file is already present on cloud or not this step ensure efficient use of storage by use of data deduplication. Data deduplication works by comparing chunks of data or objects (files) in order to detect duplicates. Deduplication can take place if the block of data file matches with other block of file which is there in the cloud then it should simply discard that duplicate file. IV. PARTIAL IMPLEMENTATION In the partial implementation the encryption and decryption of file, two step verification and data deduplication is done. But setup (installation) of cloud part is remaining and that will be completed soon. The encryption of particular file is done by using AES and ECC algorithm and that file contain the text which is stored as text.txt. The decryption of the same file is done properly and the file saved in project folder with name decrypted file. The OTP part is completed via authentication codes. The data deduplication program first finds files with matching sizes. It then runs an MD5 hash to find duplicate files. The MD5 hashing algorithm is a one-sided cryptographic function that accepts a text of any length as input and returns as output a fixed-length digest value to be used for authenticating the original text.
  • 4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 Article No. X PP XX-XX VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 4 www.viva-technology.org/New/IJRI V. CONCLUSION A Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion for that first required to implement AES and ECC encryption algorithm for strong data protection with efficiency. For that a Hybrid Cryptographic System (HCS) required which will combines the benefits of both symmetric and asymmetric encryption. During the design of the system to make sure of trusted authentication thereby allowing the feature of One Time Password (OTP) so user first enter login credential after that user have to enter OTP which ensure strong user authenticity. If user want to upload file on cloud then first it will be compare with stored files for duplication and if there is match then it will be discarded otherwise it will be store on cloud and by use of this technique data deduplication will be achieved. This data deduplication program first finds files with matching sizes. It then runs an MD5 hash to find duplicate files. Integrating all this features to make secure cloud and setup of cloud part is work in progress completed in future. REFERENCES [1] Akshay Arora, Anmol Rastogi, Abhirup Khanna, Amit Agarwal, “Cloud Security Ecosystem for Data Security and Privacy”, 2017 7th International Conference on Cloud Computing, Data Science & Engineering. [2] Bih-Hwang Lee, Ervin Kusuma Dewi, Muhammad Farid Wajdi, “Data Security in Cloud Computing Using AES Under HEROKU Cloud”, 2018 27th Wireless and Optical Communication Conference (WOCC). [3] Dhanaraj Suresh Patil, R. V. Mane, V.R.Ghorpade, “Improving the Availability and Reducing Redundancy using Deduplication of Cloud Storage System”, 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). [4] Zhaocong Wen, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Li , Jin Li, “2014 International Conference on Intelligent Networking and Collaborative Systems”, 2017 7th International Conference on Cloud Computing, Data Science & Engineering. [5] Bhairavi Kesalkar, Dipali Bagade, Manjusha Barsagade, Namita Jakulwar, “Implementation of data deduplication using cloud computing”, KITE/NCISRDC/IJARIIT/2018/CSE/105 IJARIIT( ISSN: 2454-132X). [6] H. R. Nagesh, L Thejaswini, “Study on encryption methods to secure the privacy of the data and computation on encrypted data present at cloud”, 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC). [7] Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule, “A multilevel encryption technique in cloud security”, 2017 7th International Conference on Communication Systems and Network Technologies. [8] Srinivas Mudepalli, V. Srinivasa Rao, R. Kiran Kumar, “An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing”, International Conference on Intelligent Computing and Control Systems ICICCS 2017. [9] Milind B. Waghmare, Suhasini V. Padwekar, “Survey on techniques for Authorized Deduplication of Encrypted data in Cloud”, 2020 International Conference on Computer Communication and Informatics (ICCCI -2020), Jan. 22-24, 2020, Coimbatore, INDIA. [10] Mr. Nishant N.Pachpor, Dr. Prakash S.Prasad, “Improving the Performance of System in Cloud by Using Selective Deduplication”, Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018) IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1. [11] Chungsik Song, Younghee Park, Jerry Gao, Sri Kinnera Nanduri, William Zegers, “Favored Encryption Techniques for Cloud Storage”, 2015 IEEE First International Conference on Big Data Computing Service and Applications. [12] DIAO Zhe, WANG Qinghong, SU Naizheng, ZHANG Yuhan, “Study on Data Security Policy Based On Cloud Storage”, 2017 IEEE 3rd International Conference on Big Data Security on Cloud. [13] https://www.cloudflare.com/learning/cloud/what-is-the-cloud/, last accessed on: 12/10/2020. [14] https://www.fidelity.com/security/how-two-factor-authentication-works/, last accessed on: 16/10/2020.