SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
INTERNATIONALComputer EngineeringCOMPUTER ENGINEERING
  International Journal of JOURNAL OF and Technology (IJCET), ISSN 0976-
  6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME
                             & TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 1, January- February (2013), pp. 178-181
                                                                              IJCET
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)                  ©IAEME
www.jifactor.com




          DATA SECURITY FRAMEWORK FOR CLOUD COMPUTING
                            NETWORKS

                 ABHISHEK PANDEY1, R.M.TUGNAYAT2, A.K.TIWARI3
      1
       (Computer Science and Engineering, Dr.C.V.Raman University, Kota Road Bilaspur
                     Chhattisgarh, India, abhishekpandey2007@gmail.com)
      2
        (Information Technology, Jawaharlal Darda Institute of Engineering & Technology,
                     Yavatmal Maharashtra,INDIA, rmtugnayat@gmail.com)
                            3
                              (Information Technology, Disha College
                     Raipur, Chhattisgarh,INDIA, anil1969_rpr@yahoo.com



  ABSTRACT

          Cloud Computing is used for management of resources applications and information
  as services over the cloud. The resources used in Cloud Computing are the resources that are
  usually distributed as services. The cloud allows its services as a utility and because of the
  flexibility in its architecture, exposes it to various security threats. Cloud allows the flow of
  data to different environments which may not be trustworthy and hence opens up to various
  security challenges. In this work we concentrate on the security issues related to cloud data
  storage and provide an efficient way to secure the same.

  Keywords : Cloud, Encryption, Security Model, Storage.

  I. INTRODUCTION

          The Cloud computing is highly scalable, dynamic and easily configurable more over
  it can handle multitenant request simultaneously. The existence of the cloud environment has
  provided an ease of deployment of large scale distributed systems for utilization of various
  resources and services. The services in cloud (Service Models) is classified as Software as
  Service (SaaS) where in the user is provided with an application or service that exists in the
  cloud, secondly Platform as Service (PaaS) which provides the user an access to the platform
  and third is Infrastructure as Service (IaaS) which leases the processing storage and other
  computing resources to the user[1]. The primary ways in which the cloud can be deployed


                                                178
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME

(Deployment Models) are Public Cloud, which allows the user to utilize all the resources
(service and applications) available. The second way of deployment is Private cloud wherein
the user has complete control over the data and security. The third is Hybrid cloud which is a
combination of Private and Public cloud .
The cloud environment allocates the resources dynamically in response to the user’s request
and predesigned quality of service (QoS). With the adoptability of various technologies by
the cloud which includes various networks, operating systems, and databases opens it up to
various security threats. These issues can be abuse, malicious insiders, data loss and risk
profile [2,3].

II. THREATS TO CLOUD COMPUTING

        Information security is a critical issue in cloud computing environments. Clouds have
no borders and the data can be physically located anywhere in any data centre across the
network geographically distributed. So the nature of cloud computing raises serious issues
regarding user authentication, information integrity and confidentiality. Applications
deployed on cloud undergo same kind of attacks as that on client-server model. SaaS based
applications are vulnerable to the virus . SaaS applications depend on web services and web
browser to deliver their services to user. They face security challenges arising out of network
infrastructure and web services .IaaS and PaaS services are hardware dependent and face
more, challenges arising out of characteristics of cloud computing, than SasS applications. To
handle these issues related with the security we can use Public key cryptography. Our major
concern in this work is deal with the security of the data storage in cloud.

The basic idea in cloud data storage is to protect the information/data from an unauthorized
access which may raise the possibility of various threats to it. The data stored in the cloud in
many ways is exposed to various threats which may result to data loss, corrupt data and also
there is a possibility that it may be disclosed. The scheme proposed focuses on these issues
and with the help of various cryptographic techniques we will try to secure the data in cloud
environment. This can be achieved by securing the storage when the data is in secured
environment before transferring it to an unsecured environment. This can be achieved by
various encryption algorithms available like asymmetric and symmetric algorithms but as the
performance of asymmetric is slow as compared to the later symmetric algorithms are mostly
preferred for the same [4]. The usage of encryption as a technique to secure data guarantees
the confidentiality of data and helps to detect any corruption in data [10,11,12].The existing
solution provided to overcome these issues either lack in scalability or generality [3].

III. DATA SECURITY MODEL

        To overcome the problems stated above we propose a multi – tier cloud architecture
where in we deploy two/more clouds for securing the data stored in an effective manner. In
this approach one cloud is deployed as a “Secured Cloud” which will be responsible for all
the security concerns and the operations related to it whether it be encrypting the data or
providing a secured access to the data stored. The data stored in the “Secured Cloud” is then
moved to an unsecured environment where it is open for access to all. This 2-tier architecture
will help us to achieve enhanced performance in less computational power that a cloud offers.



                                              179
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME


                                                Secured
                                                Cloud

                            Client

                                               Unsecured
                                               Cloud


                            Fig.1- Two Tier Cloud Architecture
In the proposed scenario we use a fully Homomorphic encryption scheme as it allows any
party to publicly transform ciphertexts for some plaintexts π1,……..πn into a ciphertext for
some function f(π1, …………πn) of the plaintexts, without the party being aware of the
plaintexts. These schemes are useful for constructing privacy-preserving protocols which is
the basic requirement in cloud environment where in a user can store encrypted data on a
server, and allow the server to process the encrypted data without revealing the data to the
server. Homomorphic encryption schemes supported only a limited set of functions f, which
restricted their applicability. The theoretical problem of constructing a fully homomorphic
encryption scheme supporting arbitrary functions f, was only recently solved by the
breakthrough work of homomorphic Gentry [5,6,7,8].
A homomorphic encryption scheme Hom consists of four algorithms:
    • KeyGen: Given security parameter λ¸, returns a secret key sk and a public key pk.
    • Encryption(Enc): Given plaintext π Є f{0, 1} and public key pk, returns ciphertext Ψ.
    • Decryption(Dec): Given ciphertext Ψ and secret key sk, returns plaintext π.
    • Eval: Given public key pk, a t-input circuit C (consisting of addition and
        multiplication gates modulo 2), and a tuple of ciphertexts (Ψ1….. Ψt) (corresponding
        to the t input bits of C), returns a ciphertext Ψ(corresponding to the output bit of C).
Hom is said correct for a family C of circuits with ≤ t = Poly(λ) input bits if for any C Є C
and input bits (πi)i≤t, the following holds with overwhelming probability over the
randomness of KeyGen and Enc:Dec(sk; Eval(pk;C; (Ψ1…… Ψt))) = C(π1…… πt),where
(sk, pk) = KeyGen(λ) and Ψi = Enc(pk, πi) for i = 1….. t. Hom is said compact if for any
circuit C with ≤ t = Poly(λ) input bits, the bit-size of the ciphertext Eval(pk,C,(Ψ1…….Ψt)) is
bounded by a fixed polynomial b(λ).
While using an encryption technique, the key issue is that related to the systematic
management and usage of an encryption key generated to protect the data. These keys are the
vital part of the data being protected. The keys generated to protect the data are generally
stored with the data which provides an opportunity for the attacker to have an access both to
the key and the data being protected. The other approach used is to allow the user to have an
access to these data from any location till they are in trusted environment which again raises
the possibility to security being compromised as here the keys can be shared with the
multiple users [10,13]. In this approach, any existing Managed Private Cloud solution can be
used, but there is no consistency concerning the authenticity and correctness of the result. The
later approach aims to fill bridge this gap which relies on the less computational power that
cloud offers. In place of using only one cloud architecture to render a given service, two or
more clouds are deployed and used so as to verify the correctness of the result and to identify
an incorrect output[14].

                                              180
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME

IV. CONCLUSION

        With the latest development in cloud computing, security issue has become an area of
great concern. This paper discusses the cloud computing environment safety issues through
analyzing a cloud computing framework i:e a cloud computing model for data security. As
we have shown in the paper, most cryptographic primitives are ready to be deployed for the
security. As a direct generalization of the problem of secure outsourcing one can look at the
case where a group of clients, that trust each other, want to use a cloud based computation
service that they do not fully trust. In this scenario, the proposed fully homomorphic
encryption schemes can be used. It is clear that the design of secure outsourcing computation
schemes is a very challenging research area.

REFERENCES

[1]     Peter Mell and Tim Grance, “The NIST Definition of Security Alliance (CSA). Cloud
computing”, October 7, 2009, version 15, National Institute of Standards and Technology (NIST).
[2]     Jamil,Danish.Zaki ,Hassan. “Cloud Computing Security”. In International Journal of
Engineering Science and Technology.Vol.3 No.4April2011.
[3]     Gens, F.New IDC IT Cloud Services Survey: Top Benefits and Challenges. In: IDC
eXchange (2009), http://blogs.idc.com/ie/?p=730.
[4]     Narpat,S.Sekhawat et.al.” Cloud Computing Security through Cryptography for Banking
Sector”.In Proc. 2011 5th National Conference.INDIACom-2011.
[5]     N. Gama and P. Q. Nguyen. Finding short lattice vectors within Mordell's inequality. In Proc.
of STOC, pages 207_216. ACM, 2008.
[6]     N. Gama and P. Q. Nguyen. Predicting lattice reduction. In Proc. of Eurocrypt,volume 4965
of LNCS, pages 31_51. Springer, 2008.
[7]     C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University,2009.
Manuscript available at http://crypto.stanford.edu/craig.
[8]     C. Gentry. Fully homomorphic encryption using ideal lattices. In Proc. of STOC,pages
169_178. ACM, 2009.
[9]     Yanpei Chen, Vern Paxson and Randy H. Katz, “What’s New About Cloud Computing
Security?”             Technical               Report             No.            UCB/EECS-2010-5,
http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html, Jan. 20, 2010.
[10]    RSA, The Role of Security in Trustworthy Cloud Computing.
[11]    Ebenezer A. Oladimeji, Security threat Modeling and Analysis: A goal-oriented approach,
2006.
[12]    Ristenpart, Thomas and Tromer, Eran and Shacham, Hovav and Savage, Stefan, Hey, you, get
off of my cloud: exploring information leakage in third-party compute clouds, 2009.
[13]    Shamir, Adi, How to share a secret Communication. ACM, 1979, 612—613.
[14]    J. S. Plank and J. Luo and C. D. Schuman and L. Xu and Z. Wilcox-O'Hearn, A Performance
 Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage, 2009 .
[15]    Suresh Kumar RG, S.Saravanan and Soumik Mukherjee, “Recommendations For
 Implementing Cloud Computing Management Platforms Using Open Source” International journal
 of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012,                 pp. 83 - 93,
 Published by IAEME
[16]    Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security In Cloud Computing”
 International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012,
 pp. 258 - 265, Published by IAEME




                                                181

Mais conteúdo relacionado

Mais procurados

Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Ericsson
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paperHemanth
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationIOSR Journals
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithmijtsrd
 

Mais procurados (20)

Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithm
 

Semelhante a Data security framework for cloud computing networks

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 

Semelhante a Data security framework for cloud computing networks (20)

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
El35782786
El35782786El35782786
El35782786
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Data security framework for cloud computing networks

  • 1. INTERNATIONALComputer EngineeringCOMPUTER ENGINEERING International Journal of JOURNAL OF and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), pp. 178-181 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com DATA SECURITY FRAMEWORK FOR CLOUD COMPUTING NETWORKS ABHISHEK PANDEY1, R.M.TUGNAYAT2, A.K.TIWARI3 1 (Computer Science and Engineering, Dr.C.V.Raman University, Kota Road Bilaspur Chhattisgarh, India, abhishekpandey2007@gmail.com) 2 (Information Technology, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal Maharashtra,INDIA, rmtugnayat@gmail.com) 3 (Information Technology, Disha College Raipur, Chhattisgarh,INDIA, anil1969_rpr@yahoo.com ABSTRACT Cloud Computing is used for management of resources applications and information as services over the cloud. The resources used in Cloud Computing are the resources that are usually distributed as services. The cloud allows its services as a utility and because of the flexibility in its architecture, exposes it to various security threats. Cloud allows the flow of data to different environments which may not be trustworthy and hence opens up to various security challenges. In this work we concentrate on the security issues related to cloud data storage and provide an efficient way to secure the same. Keywords : Cloud, Encryption, Security Model, Storage. I. INTRODUCTION The Cloud computing is highly scalable, dynamic and easily configurable more over it can handle multitenant request simultaneously. The existence of the cloud environment has provided an ease of deployment of large scale distributed systems for utilization of various resources and services. The services in cloud (Service Models) is classified as Software as Service (SaaS) where in the user is provided with an application or service that exists in the cloud, secondly Platform as Service (PaaS) which provides the user an access to the platform and third is Infrastructure as Service (IaaS) which leases the processing storage and other computing resources to the user[1]. The primary ways in which the cloud can be deployed 178
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME (Deployment Models) are Public Cloud, which allows the user to utilize all the resources (service and applications) available. The second way of deployment is Private cloud wherein the user has complete control over the data and security. The third is Hybrid cloud which is a combination of Private and Public cloud . The cloud environment allocates the resources dynamically in response to the user’s request and predesigned quality of service (QoS). With the adoptability of various technologies by the cloud which includes various networks, operating systems, and databases opens it up to various security threats. These issues can be abuse, malicious insiders, data loss and risk profile [2,3]. II. THREATS TO CLOUD COMPUTING Information security is a critical issue in cloud computing environments. Clouds have no borders and the data can be physically located anywhere in any data centre across the network geographically distributed. So the nature of cloud computing raises serious issues regarding user authentication, information integrity and confidentiality. Applications deployed on cloud undergo same kind of attacks as that on client-server model. SaaS based applications are vulnerable to the virus . SaaS applications depend on web services and web browser to deliver their services to user. They face security challenges arising out of network infrastructure and web services .IaaS and PaaS services are hardware dependent and face more, challenges arising out of characteristics of cloud computing, than SasS applications. To handle these issues related with the security we can use Public key cryptography. Our major concern in this work is deal with the security of the data storage in cloud. The basic idea in cloud data storage is to protect the information/data from an unauthorized access which may raise the possibility of various threats to it. The data stored in the cloud in many ways is exposed to various threats which may result to data loss, corrupt data and also there is a possibility that it may be disclosed. The scheme proposed focuses on these issues and with the help of various cryptographic techniques we will try to secure the data in cloud environment. This can be achieved by securing the storage when the data is in secured environment before transferring it to an unsecured environment. This can be achieved by various encryption algorithms available like asymmetric and symmetric algorithms but as the performance of asymmetric is slow as compared to the later symmetric algorithms are mostly preferred for the same [4]. The usage of encryption as a technique to secure data guarantees the confidentiality of data and helps to detect any corruption in data [10,11,12].The existing solution provided to overcome these issues either lack in scalability or generality [3]. III. DATA SECURITY MODEL To overcome the problems stated above we propose a multi – tier cloud architecture where in we deploy two/more clouds for securing the data stored in an effective manner. In this approach one cloud is deployed as a “Secured Cloud” which will be responsible for all the security concerns and the operations related to it whether it be encrypting the data or providing a secured access to the data stored. The data stored in the “Secured Cloud” is then moved to an unsecured environment where it is open for access to all. This 2-tier architecture will help us to achieve enhanced performance in less computational power that a cloud offers. 179
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME Secured Cloud Client Unsecured Cloud Fig.1- Two Tier Cloud Architecture In the proposed scenario we use a fully Homomorphic encryption scheme as it allows any party to publicly transform ciphertexts for some plaintexts π1,……..πn into a ciphertext for some function f(π1, …………πn) of the plaintexts, without the party being aware of the plaintexts. These schemes are useful for constructing privacy-preserving protocols which is the basic requirement in cloud environment where in a user can store encrypted data on a server, and allow the server to process the encrypted data without revealing the data to the server. Homomorphic encryption schemes supported only a limited set of functions f, which restricted their applicability. The theoretical problem of constructing a fully homomorphic encryption scheme supporting arbitrary functions f, was only recently solved by the breakthrough work of homomorphic Gentry [5,6,7,8]. A homomorphic encryption scheme Hom consists of four algorithms: • KeyGen: Given security parameter λ¸, returns a secret key sk and a public key pk. • Encryption(Enc): Given plaintext π Є f{0, 1} and public key pk, returns ciphertext Ψ. • Decryption(Dec): Given ciphertext Ψ and secret key sk, returns plaintext π. • Eval: Given public key pk, a t-input circuit C (consisting of addition and multiplication gates modulo 2), and a tuple of ciphertexts (Ψ1….. Ψt) (corresponding to the t input bits of C), returns a ciphertext Ψ(corresponding to the output bit of C). Hom is said correct for a family C of circuits with ≤ t = Poly(λ) input bits if for any C Є C and input bits (πi)i≤t, the following holds with overwhelming probability over the randomness of KeyGen and Enc:Dec(sk; Eval(pk;C; (Ψ1…… Ψt))) = C(π1…… πt),where (sk, pk) = KeyGen(λ) and Ψi = Enc(pk, πi) for i = 1….. t. Hom is said compact if for any circuit C with ≤ t = Poly(λ) input bits, the bit-size of the ciphertext Eval(pk,C,(Ψ1…….Ψt)) is bounded by a fixed polynomial b(λ). While using an encryption technique, the key issue is that related to the systematic management and usage of an encryption key generated to protect the data. These keys are the vital part of the data being protected. The keys generated to protect the data are generally stored with the data which provides an opportunity for the attacker to have an access both to the key and the data being protected. The other approach used is to allow the user to have an access to these data from any location till they are in trusted environment which again raises the possibility to security being compromised as here the keys can be shared with the multiple users [10,13]. In this approach, any existing Managed Private Cloud solution can be used, but there is no consistency concerning the authenticity and correctness of the result. The later approach aims to fill bridge this gap which relies on the less computational power that cloud offers. In place of using only one cloud architecture to render a given service, two or more clouds are deployed and used so as to verify the correctness of the result and to identify an incorrect output[14]. 180
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 1, January- February (2013), © IAEME IV. CONCLUSION With the latest development in cloud computing, security issue has become an area of great concern. This paper discusses the cloud computing environment safety issues through analyzing a cloud computing framework i:e a cloud computing model for data security. As we have shown in the paper, most cryptographic primitives are ready to be deployed for the security. As a direct generalization of the problem of secure outsourcing one can look at the case where a group of clients, that trust each other, want to use a cloud based computation service that they do not fully trust. In this scenario, the proposed fully homomorphic encryption schemes can be used. It is clear that the design of secure outsourcing computation schemes is a very challenging research area. REFERENCES [1] Peter Mell and Tim Grance, “The NIST Definition of Security Alliance (CSA). Cloud computing”, October 7, 2009, version 15, National Institute of Standards and Technology (NIST). [2] Jamil,Danish.Zaki ,Hassan. “Cloud Computing Security”. In International Journal of Engineering Science and Technology.Vol.3 No.4April2011. [3] Gens, F.New IDC IT Cloud Services Survey: Top Benefits and Challenges. In: IDC eXchange (2009), http://blogs.idc.com/ie/?p=730. [4] Narpat,S.Sekhawat et.al.” Cloud Computing Security through Cryptography for Banking Sector”.In Proc. 2011 5th National Conference.INDIACom-2011. [5] N. Gama and P. Q. Nguyen. Finding short lattice vectors within Mordell's inequality. In Proc. of STOC, pages 207_216. ACM, 2008. [6] N. Gama and P. Q. Nguyen. Predicting lattice reduction. In Proc. of Eurocrypt,volume 4965 of LNCS, pages 31_51. Springer, 2008. [7] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University,2009. Manuscript available at http://crypto.stanford.edu/craig. [8] C. Gentry. Fully homomorphic encryption using ideal lattices. In Proc. of STOC,pages 169_178. ACM, 2009. [9] Yanpei Chen, Vern Paxson and Randy H. Katz, “What’s New About Cloud Computing Security?” Technical Report No. UCB/EECS-2010-5, http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html, Jan. 20, 2010. [10] RSA, The Role of Security in Trustworthy Cloud Computing. [11] Ebenezer A. Oladimeji, Security threat Modeling and Analysis: A goal-oriented approach, 2006. [12] Ristenpart, Thomas and Tromer, Eran and Shacham, Hovav and Savage, Stefan, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, 2009. [13] Shamir, Adi, How to share a secret Communication. ACM, 1979, 612—613. [14] J. S. Plank and J. Luo and C. D. Schuman and L. Xu and Z. Wilcox-O'Hearn, A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage, 2009 . [15] Suresh Kumar RG, S.Saravanan and Soumik Mukherjee, “Recommendations For Implementing Cloud Computing Management Platforms Using Open Source” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 83 - 93, Published by IAEME [16] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security In Cloud Computing” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, Published by IAEME 181