SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1464
Model-Driven Platform for Service Security and Framework for Data
Security and Privacy Using Key Management in Cloud Computing
Y. Kiran Kumar1, Dr. R. Mahammad Shafi2
1Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA
2Research Supervisor, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud computing is a technology to share the data
and resources used among various organizations, but the
security and privacy are most important aspects of cloud
computing. The main responsibilityofcloudserviceprovideris
the quality of service. Many of the cloud computing security
frameworks have faced many challenges in security that has
not yet been addressed well. The data accessed and shared
through many devices from the cloud environment are not
secure because they are likely to have various attacks like
Identity Access Management (IAM), hijacking an account or a
service either by internal/external intruders. In this paper, we
proposed a model-driven approach enables the definition of
security requirements at the modeling layer and facilitates a
transformation based on security configuration patterns. We
have also proposed a new system which can prevent the
exposure of the key as well as a framework for sharing a file
that will ensure security using key managementsystemwithin
the cloud environment and also suggests to the approach of
Multi-layer Encryption techniques in cloud computing thus
enhancing the security parameters concerning sensitive data.
Thus with layer ways Encryption technique the data in cloud
server can be made more secured with better privacy.
Resultant both cloud side and owner of the data gain
enhanced security. According to this encryption technique if
data-owner’s authorization is not granted then the users are
restricted from the data access.
Key Words: Service Oriented Architecture, Cloud
Computing, Encryption, Access Control, Multi-layer
encryption, Privacy, Security.
1. INTRODUCTION
Cloud computing is a relatively new business model for
outsourced services. However, the technology behind cloud
computing is not entirely new. Virtualization, data
outsourcing, and remote computation have been developed
over the last 20 years, and cloud computing provides a
streamlined wayofprovisioninganddeliveringsuchservices
to customers. In this regard, cloud computing hasoften been
criticized as representing just a new trend, rather than an
innovative computing technology. As such, it is often best
described as a business paradigm or computing model
rather than any specific technology. A cloud consumer
adopting a cloud-based solution needs to follow these steps:
1. Describe the service or application for which a cloud-
based solution may be leveraged
2. Identify all functional capabilities that must be
implemented for this service
3. Identify the security and privacy requirements and the
security controls needed to securetheserviceorapplication.
The trust relation between cloud customers (CCs) and
cloud service providers (CSPs) has to be established before
CCs move their information systems to the cloud. This
requires an in-depth understanding of associated risks.
Moreover, regulations related to data protection, financial
reporting, etc. involve certain requirements that should be
complied with when outsourcingbusinessprocessestothird
parties, like CSPs. User authentication and authorization
among cloud actors is a critical element of cloud
architecture. Without knowing whoisloggingintothecloud-
based information system, and who is accessing what data,
cloud actors are not able to protect the data housed by a
cloud ecosystem. Understanding who the users are, what
data they are trying to access, where the data arestored,and
how are users trying to get to these data—these are critical
pieces of information that help cloud consumers determine
an appropriate cloud architecture and deployment model.
1.1 Preliminary
We assume that the cryptographic algorithms to encrypt
data are secure. Meanwhile, we assume that the random
string will not be repeatedly generated by the clients. We
assume that the client of each collaborator runs in a secure
environment which guarantees that:
• The generation and distribution of shared secret and
privilege management on the client of the initiator are
appropriately maintained.
• The secret passcode and keys that appear in the clients
would not be stolen by any attackers.
• The communication channel between the client and the
cloud is enough to transmit all necessary data in real time
and protected by existing techniques such as SSL/TLS.
1.2 Access Control
Traditional access control architectures are based on the
assumption that data storage management is located within
a trusted domain and the owner has adequate knowledge
about the system. However, this assumption is no longer
valid in the cloud computing paradigm. Multiple
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1465
stakeholders are engaged as users within the cloudplatform
and have different levels of data access permission. As a
result, a greater granularity of access control is required to
ensure that each stakeholder has access to exactlywhatthey
are authorized and to ensure the privacy and confidentiality
of the cloud-based services. Researchers and experts are
mostly concerned about outside attackerswhenconsidering
the security issues in distributed systems. Therefore,
significant efforts have been made to keep the malicious
attacker outside of the perimeter.Unfortunately,suchefforts
cannot always be effective in the cloud computingparadigm.
The incident where Google fired engineers for breaking
internal privacy policies confirms that attackers may reside
within the service framework [1]. Carnegie Mellon
University’s Computer Emergency Response Team (CERT)
defines a malicious insider as“Acurrentofformer employee,
contractor, or business partner who has or had authorized
access to a network and intentionally used that access in a
way that negatively affect the confidentially, integrity, or
availability of any information or information systems” [2].
Due to insider threats, cloud-based services are in serious
risk of intellectual property theft, IT damage, and
information leakage. Hence, security vulnerabilities
emerging from insider threats should be addressed by
policies, technical solutions, and proper detection methods.
2. SECURING SERVICES IN THE CLOUD
Service-Oriented Architecture (SOA) is an architectural
pattern, while cloud computing is a set of enabling
technologies as a potential target platform or technological
approach for that architecture. By combining SOA and cloud
computing, it becomes possible to reduce the time taken to
implement technology, enhance business performance and
expose the existing legacy application over the Internet. The
role of SOA in cloud computing is important because a
successful cloud solution requires an in-depth
understanding of the architecture, the services offered and
how to leverage them. Cloud computing becomes part of the
architectural arsenal to create a successful SOA.
Cloud services benefit the business by taking the best
practices and business process focus of SOA. These benefits
apply to both cloud service providers and cloud service
users. Cloud service providers need to architect solutions by
using a service-oriented approach to deliver services with
the expected levels of elasticity and scalability. Companies
that architect and govern business processes with reusable
service-oriented components can moreeasilyidentifywhich
components can be successfully moved to public andprivate
clouds. A Service-Oriented Architecture (SOA) is a software
architecture for building business applications that
implement business processes or services through a set of
loosely coupled, black-box components orchestrated to
deliver a well-defined level of service.
Service-oriented architectures are based on the idea of
exposing software functionality as services to be used by
independent parties. Their inherent independence of a
specific platform and operating system make themperfectly
suitable to connect service consumers and serviceproviders
over the Internet and provide a technical foundation for
cloud computing [3]. The combination of SOA and cloud
computing facilitatingtheprovisionofcomposedapplication
and services that integrate and orchestrate services from
different sources pose new challenges to security. Since
services and applications are exposedtotheInternetand are
used in a global context, the management of user identities
across organisational borders is a key element to perform
access control and to prevent unauthorised access in a
decentralised environment.
Open Identity Management Models support the sharing of
identity information across several trust domains in a
controlled manner. Clients can request identity information
from the identity management systems and convey this
information in an interoperableformattoa requesting party.
Besides identity provisioning,confidentialityandintegrityof
exchanged, stored, and processed information must be
ensured. Several specifications emerged to protect
information at different layers. For instance, a secure
channel can be used to protect exchangedinformation, while
signature and encryption mechanisms applied to a message
can also protect stored and processed information. These
security requirements are stated in security policies that
configure the secure interaction of participants in a service-
based system. Policies facilitate the negotiation of security
requirements between services and service clientsto enable
interoperability at runtime. This enablesa seamlessusageof
services in the cloud to build composed applications.
However, due to the complexity of the involved
specifications, the variety of security mechanisms and the
flexibility of service-based systems, such policiesarehard to
understand and even harder to codify. To overcome these
limitations, we foster a model-driven approach that
generates security configurations based on system design
models annotatedwithsecurityrequirements.Toimplement
the functional and security requirements specified at the
modelling layer, our cloud platform has to ensure two
aspects: The system with all involved services and web
application components must be instantiated in a virtual
machine according to the functional requirements and the
services must beconfiguredincompliance withthemodelled
security requirements. As illustrated in Figure 1, our
approach consists of three layers. Functional and security
requirements, expressed at the modelling layer, are
translated to a platform independent model. This model
constitutes the foundation to setup the virtual machine,
application server, services and composed applications that
are provided to the user [4].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1466
Fig -1: Model-driven Security in SOA
A Model-driven approach transforms security intentions to
enforceable security policies. This transformation is based
on a set of security configuration patterns that provide
security expert knowledge to configure the system. Our
model-driven approachrequiresanautomatedgenerationof
enforceable security configurations based on the modelled
security requirements [5].
3. DATA SECURITY AND PRIVACY IN CLOUD
Security and privacy concerns faced by the cloudconsumers
require them to evaluate the risk and its management in the
cloud environment, then mitigating those risks. Of course,
the most critical benefit offered by cloud computing is the
reduction of business costs. Most businesses have well-
established security objectives, strategies, and policies
consistent with compliance requirements to protect their
intellectual property, and their clients’ data. Many security
components come into play, but the most four critical
components are shown in Figure 2. Data andtransmissionof
data must take place through secured channels. Application
and storage security both must be maintained by the cloud
service provider.
Fig -2: Security Components.
The storage data itself can be encrypted by many cloud
service providers using server side encryption (SSE). This
will encrypt the data on the cloud storage devices with
strong cryptographic algorithms but the encryption keys
stay with the cloud provider and are not underthecontrol of
the cloud customer. If nothing else is offered, the cloud
server administrator should activate SSE per default for the
cloud storage used. This encryption gives some basic
protection against unauthorized access tothecustomerdata
but also means that the security of this solution depends on
the cloud provider’s ability to restrict access to the storage
encryption keys even to other employees.
The cloud service provider should enforce the same or even
higher levels of security controls as expected by the cloud
customer or as best practice in the industry. There are
logical risks of information disclosure or data integrity by
having unsecure applications or permission handling
functionalities. The application or underlying infrastructure
could be open to exploits by hackers. The user permission
and role model could be exploited as well by external
hackers or internal employees that have too many access
rights. In general, the same security measures need to be
applied like in any IT system. The complexity arisesfromthe
cloud technology model that is based on virtualization and
distributed responsibilities between the infrastructure
layers. The cloud service provider must take careofphysical
and logical security that is in his sole responsibility. For
example, the cloud service provider may offer encryption,
but it is up to the customer to activate and use it. Clear
responsibilities for network, operating system, and
application security measures are key priorities to achieve
such a secure cloud solution.
Cloud computing is yet to standardize the process of service
metering. Therefore, service metering is notyettrustworthy
to the cloud consumers. The process requires a systematic,
verifiable, and reliable framework for cloudcomputingto be
sustainable. Subsequently, the trust relationship of cloud
service providers with customers and enterprises will be
enhanced, resulting in a wider adoption of cloud-based
solutions. Maintaining the privacy of users isofhighconcern
for most organizations. Whether employees, customers, or
patients, personally identifiable informationisa high-valued
target. Many cloud subscribers do not realizethatwhenthey
contract a provider to perform a service, they are also
agreeing to allow that providertogatherand sharemetadata
and usage information about their environment. In some
cases, providers even sell or share these data legally based
on their privacy statements
The evolving nature of cloud computing technologies has
resulted in nonstandard security implementations and
practices. Moreover, the lack of governance for audits
creates a challenging environment to verify if the cloud
service providers have complied with the standards. As a
result, cloud computing security may not yet be ready for
audits [6]. Users depend on the service level agreement
(SLA) and have to rely on the cloud service provider to keep
up their end of the bargain. However, cloud servicesarebest
effort services and a service provider may not guarantee the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1467
security standards. Therefore, as SLAs play a vital role in
ensuring the security of the cloud-based services, governing
bodies and security experts should be part of the SLAs and
legal aspects, which is not yet seen to be in practice for
cloud-based service models [7].
4. PROPOSED WORK
4.1 Operational Transformation
The edit conflict due to concurrent operations is one of the
main challenges in collaborativeeditingsystems. Without an
efficient solution to edit conflicts, it may result in
inconsistent text to different clients when collaborators
concurrently edit the same document. In 2009, OT was
adopted as a core technique behind the collaboration
features in Apache Wave and Google Docs. In a collaborative
editing cloud service, the cloud servers can be responsible
for receiving and caching editing operations in its queue,
imposing order on each editing operation, executing OT on
concurrent operations based on the order iteratively,
broadcasting these editing operations to other clients, and
applying them in its local copy to maintaina latest version of
the document. When receiving an operation opr(c) from the
client, the cloud server executes operational transformation.
4.2. System Design and Security Analysis
Fig -3: LightCore system model.
LightCore involves a group of collaborativeusersanda cloud
server. Each client communicates with the server over the
Internet, to send its operations and receive modifications
from others in real time. For each document, the server
maintains a history of versions. That is, it keeps receiving
operations from users, and these modifications make the
document shift from one version to another. When applying
modifications on a version, the server may need OT to
transform some operations. The server also keeps sending
the current freshest version to users, that is, all transformed
operations since the last version is sent. Because a user is
still editing on the old version when the freshestoneisbeing
sent, the OT processing may also be required to update its
view at the client side.
Figure 3 represents the LightCore system model,Thismodel
describes the cloud server is responsible for storing and
maintaining the latestcontent,executingoperations(update,
delete, insert, etc.) against the content,resolvingoperational
conflicts, and broadcasting the updates among multiple
clients. The cloud server is considered to be honest but
curious. In case of risking its reputation, the honest cloud
server will timely and correctly disseminate modifications
committed by all the authorized clients without maliciously
attempting to add, drop, alter, or delay operation requests.
However, motivated by economic benefits or curiosity, the
cloud provider or its internal employees may spy or probe
into the shared content, determine the document type by
observing the format and layout, and discover the pivot part
of the documents by analyzing the frequency andquantityof
access. Additionally, we assume that the cloud servers will
protect the content from unauthorized user’s access and
other traditional network attacks such as DoS attacks, and
keep the availability of shared documents, for example, by
redundancy.
LightCore system model is collaborative editing cloud
solution for sensitive data against honest-but-curious
servers. We adopt stream cipher or the CTR mode of block
cipher to encrypt and decrypt the contents of the document
within clients, while only the authorized users share the
keys. In LightCore, all user data including all operations and
every version of the documents are processed in the cloud.
Attackers from inside or outside might attempt to alter or
delete the user data, or disrupt the cloud services. However,
for the reputation and benefits of the cloud serviceprovider,
the honest-but-curious cloud servers are supposed to
preserve integrity, availability, and consistency for the data
of users. The cloud service provider will deploy adequate
protections to prevent such external attacks, including
access control mechanisms to prevent malicious operations
on a document by other unauthorized users. Preserving the
confidentiality of users’ documents is the main target of
LightCore.
First, in our system, only the authorized users with the
shared master key can read the texts of the documents.
LightCore adopts stream cipher and the CTR mode of block
cipher to encrypt data at the client side. In the editing phase,
the input texts of each operation are encrypted before being
sent to the cloud. Therefore, the input texts are transmitted
in ciphertext and documents in the cloud are also stored in
ciphertext. Second, the algorithms are assumed to be secure
and the keys only appear on the clients. So, these keys could
only be leaked by the collaborative users or the clients, who
are also assumed to be trusted. Finally, data keys are
generated in a random way by each user, and LightCoreuses
each byte of the keystreams generated by data keys only
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1468
once. Any text is encrypted by the keystreams generated
specially for it. So, the curious servers cannot infer the
contents by analyzing the difference in two decrypted texts.
In order to maintain the functionalities of the cloud servers,
we only encrypt the input texts of each operation butnotthe
position of the operation. The position of eachoperation and
the length of the operated text are disclosed to the cloud
servers, which may leak a certain of indirect sensitive
information including the numberoflines,thedistributionof
paragraphs, and other structure information. We assume
these data can only be access by the authorized clients and
the cloud servers, and they are not disclosed to external
attackers by adopting the SSL protocol. In this case, the
related data are limited to the cloud and the clients.
Additionally, the attributes attached to the text segments,
including font, color, author identity, keystream_info, might
also be used to infer the underlying information of the
documents. For example, a text segment with the bold
attribute may disclose its importance; a text segment with
list attribute may also leak some related information.
However, some of the attributes can be easily protected by
encrypting them at the client in LightCore, becausethecloud
servers are not required to process all of them (e.g., font,
size, and color). Therefore, encrypting these attributes will
not impede the basic functionalities of the cloud servers.
Anyway, attributes author and keystream_info cannot be
encrypted, because these attributes related to the basic
functionalities of the cloud servers. Another threat from the
cloud is to infer sensitive data by collecting and analyzing
data access patterns from careful observationsontheinputs
of clients. Even if all data are transmitted and stored in an
encrypted format, traffic analysis techniques can reveal
sensitive information about the documents.
Table -1: Performance of Concurrent Modifications from
20 Clients
In order to evaluate the time of these main procedures, we
create an experiment where 20 collaborators from different
clients quickly input texts in the same document
concurrently. The time of transforming an operation called
the queuing time, the time of applying an operation in its
local copy called the applying time, and the transmission
time of each operation are given in Table 1. In fact, the main
difference lies in the added encryption/ decryption process;
the other processes are not affected. The decryption time of
less than 500 milliseconds has no influence on real time. We
can see that the total time 1239 milliseconds of LightCore is
only 29 milliseconds longer than that of the original system,
which makes no difference to human perception.
Fig -4: Multi-Layer Encryption Architecture
Multi layer Encryption Approach in Information Technology
offers advanced and useful technique of cloud computing
that is being intensivelyspreadingamonginternetusers. The
present approach lacks safeguardingofuploadeddata on the
server also lacks proper tracking of abolished users thereby
the user authentication process is hampered. A resolution
can be that the user authentication process is performed
twice. Firstly, authenticating the user by making use of
password, thereafter using the interfacing technology in
sending secret code to authenticusers email.Thedata owner
encrypts the data twice before uploading it cloud server.
Later the cloud server and then the cloud manager again re-
encrypt the data and finally stored in the cloud. The data to
be uploaded on the cloud is grantedadditional securityusing
Multi- layer encryption technique.
The paper projectsperformanceofmulti-layer encryption on
the data to be uploaded on cloud server as data being more
confidential and secure. The major concern of thepaperisto
perform the user authentication twice. Figure 4 suggests
three-layers of encryption are to offer enhanced and higher
safety of data and perform two types of login for user
authentication. First, using the original user login name and
password the validation is performed and secondly, to test
whether user is authorized or not, a secret code is mailed to
authentic users E-mail ID. On entering the correct secret
code only the user is granted data access on cloud server.
The purpose of authenticating the user twice is that only the
authentic users can fetch thedata fromcloudserver. Thetwo
Queu
ing
Time
(ms)
Applyi
ng
Time
(ms)
Trans
missio
n Time
(ms)
Decryp
tion
Time
(RC4)
(ms)
Total
Time
(ms)
Original
System
0.06 5.93 23 - 1210
LightCore
System
0.06 5.93 23 0.40 1239
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1469
algorithms being used for achieving security are AES and
RSA encryption techniques.
Table -2: Comparative of Accuracy
S.No. Encryption
Techniques
Security
(%)
Time
(ms)
1. CP-ABE 88.2 3.58
2. K-NN 92.1 2.71
3.
MultilayerEncryption
Approach
96.6 0.96
Table 2 mentioned above demonstrates evaluation of Multi-
layer encryption approach compared with K-NN, and
CP- ABE. The suggested Multi-layer encryption technique
proves to be effective providing enhanced performance in
comparison with rest of the existing techniques.
Chart -1: Comparison of Accuracy Analysis
Chart -2: Comparison of time evolutions
Chart 1 and 2 mentioned above compares security based
encryption models performing with Multi-layer encryption
approach with K-NN, andCP-ABE.ThesuggestedMulti-layer
encryption technique is efficient offering greater
performance compared with rest of the current techniques.
5. CONCLUSION
The proposed model-driven approach that transforms
security intentions to enforceable security policies. This
transformation is based on a set of security configuration
patterns that providesecurityexpertknowledgetoconfigure
the system. Our platform allows users to specify these
security intentions in system models to enable a simple and
easily comprehensible specification of security
requirements. Experiments on the prototype system show
that LightCore provides efficient onlinecollaborativeediting
services for resource-limited clients.Weadoptstreamcipher
or the CTR mode of block cipherto encrypt(anddecrypt) the
contents of the document within clients, while only
the authorized users sharethekeys.Thispaperalsopresents
a new strategy of Multi layer encryption oriented on the
algorithm of AES and RSA which claims to offer security and
privacy of entire public cloud content. Such data
communication among the systems will lead to improvised
security concerning the data that is shared over the cloud.
This solution is helpful if the cloud customer wants full
control not only over the encryption keys but also the key
management and the encryption algorithms used.
REFERENCES
[1] Kincaid, J. (2010). Google confirms that it fired engineer
for breaking internal privacy policies, available at
http://techcrunch.com/2010/09/14/google-
engineerspying-fired/.
[2] Silowash, G., Cappelli, D., Moore, A., Trzeciak, R.,
Shimeall, T. J., and Flynn, L.(2012).Commonsenseguide
to mitigating insider threats, 4th edition, Tech. rep.,
DTIC Document.
[3] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On
technical security issues in cloud computing,” Cloud
Computing, IEEE International Conference on,vol.0,pp.
109–116, 2009.
[4] Thalmann, S., Bachlechner, D., Demetz, L., and Maier, R.
(2012). “Challenges in cross-organizational security
management”, in SystemScience(HICSS),in45thHawaii
International Conference on (IEEE), pp. 5480–5489.
[5] M. Menzel, R. Warschofsky, and C. Meinel, “A
Patterndriven Generation of Security Policies for
Serviceoriented Architectures,” in IEEE International
Conference on Web Services (ICWS 2010), 2010.
[6] M. Menzel and C. Meinel, “SecureSOA - Modelling
Security Requirements for Service-oriented
Architectures,” in IEEE International Conference on
Services Computing (SCC 2010), 2010.
[7] Morin, J.-H., Aubert, J., and Gateau, B. (2012). “Towards
cloud computing SLA risk management: Issues and
challenges”, in System Science (HICSS), 2012 45th
Hawaii International Conference on (IEEE), pp. 5509–
5514.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1470
BIOGRAPHIES
Mr. Y Kiran Kumar, M.C.A. He
received his Master of Computer
Applications from Sri Venkatesra
University, Tirupati.HeisPursuing
Ph.D from Bharathiar University,
Coimbatore. He is having more
than 11 years of teaching
experience,currentlyheisworking
as a Assistant Professor in the
department of M.C.A in Sree
Vidyanikethan Engineering
College, Affiliated by JNTUA,
Ananthapuramu, India. His areas
of research interests include Web
Technologies, Information
Security, Service Oriented
ArchitectureandCloudComputing.
Dr. R. Mahammad Shafi, M.C.A,
M.Tech, Ph.D. He received his Ph.D
from University of Allahabad,
Allahabad. He is having more than
20 years of teaching experience.
His areas of research interests
include Software Engineering,
Software Testing and Quality
Assurance. He has published
papers in refereed journals and
conference proceedings in these
areas. He has been involved in
conferences and workshops as a
Committee member,organizerand
Session Chair. His areas of
research interests include
Software Engineering, Software
Testing and Quality Assurance.

More Related Content

What's hot

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computingSeema Kumari
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

What's hot (18)

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
1784 1788
1784 17881784 1788
1784 1788
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

Similar to IRJET- Model-Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 

Similar to IRJET- Model-Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing (20)

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

IRJET- Model-Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1464 Model-Driven Platform for Service Security and Framework for Data Security and Privacy Using Key Management in Cloud Computing Y. Kiran Kumar1, Dr. R. Mahammad Shafi2 1Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA 2Research Supervisor, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computing is a technology to share the data and resources used among various organizations, but the security and privacy are most important aspects of cloud computing. The main responsibilityofcloudserviceprovideris the quality of service. Many of the cloud computing security frameworks have faced many challenges in security that has not yet been addressed well. The data accessed and shared through many devices from the cloud environment are not secure because they are likely to have various attacks like Identity Access Management (IAM), hijacking an account or a service either by internal/external intruders. In this paper, we proposed a model-driven approach enables the definition of security requirements at the modeling layer and facilitates a transformation based on security configuration patterns. We have also proposed a new system which can prevent the exposure of the key as well as a framework for sharing a file that will ensure security using key managementsystemwithin the cloud environment and also suggests to the approach of Multi-layer Encryption techniques in cloud computing thus enhancing the security parameters concerning sensitive data. Thus with layer ways Encryption technique the data in cloud server can be made more secured with better privacy. Resultant both cloud side and owner of the data gain enhanced security. According to this encryption technique if data-owner’s authorization is not granted then the users are restricted from the data access. Key Words: Service Oriented Architecture, Cloud Computing, Encryption, Access Control, Multi-layer encryption, Privacy, Security. 1. INTRODUCTION Cloud computing is a relatively new business model for outsourced services. However, the technology behind cloud computing is not entirely new. Virtualization, data outsourcing, and remote computation have been developed over the last 20 years, and cloud computing provides a streamlined wayofprovisioninganddeliveringsuchservices to customers. In this regard, cloud computing hasoften been criticized as representing just a new trend, rather than an innovative computing technology. As such, it is often best described as a business paradigm or computing model rather than any specific technology. A cloud consumer adopting a cloud-based solution needs to follow these steps: 1. Describe the service or application for which a cloud- based solution may be leveraged 2. Identify all functional capabilities that must be implemented for this service 3. Identify the security and privacy requirements and the security controls needed to securetheserviceorapplication. The trust relation between cloud customers (CCs) and cloud service providers (CSPs) has to be established before CCs move their information systems to the cloud. This requires an in-depth understanding of associated risks. Moreover, regulations related to data protection, financial reporting, etc. involve certain requirements that should be complied with when outsourcingbusinessprocessestothird parties, like CSPs. User authentication and authorization among cloud actors is a critical element of cloud architecture. Without knowing whoisloggingintothecloud- based information system, and who is accessing what data, cloud actors are not able to protect the data housed by a cloud ecosystem. Understanding who the users are, what data they are trying to access, where the data arestored,and how are users trying to get to these data—these are critical pieces of information that help cloud consumers determine an appropriate cloud architecture and deployment model. 1.1 Preliminary We assume that the cryptographic algorithms to encrypt data are secure. Meanwhile, we assume that the random string will not be repeatedly generated by the clients. We assume that the client of each collaborator runs in a secure environment which guarantees that: • The generation and distribution of shared secret and privilege management on the client of the initiator are appropriately maintained. • The secret passcode and keys that appear in the clients would not be stolen by any attackers. • The communication channel between the client and the cloud is enough to transmit all necessary data in real time and protected by existing techniques such as SSL/TLS. 1.2 Access Control Traditional access control architectures are based on the assumption that data storage management is located within a trusted domain and the owner has adequate knowledge about the system. However, this assumption is no longer valid in the cloud computing paradigm. Multiple
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1465 stakeholders are engaged as users within the cloudplatform and have different levels of data access permission. As a result, a greater granularity of access control is required to ensure that each stakeholder has access to exactlywhatthey are authorized and to ensure the privacy and confidentiality of the cloud-based services. Researchers and experts are mostly concerned about outside attackerswhenconsidering the security issues in distributed systems. Therefore, significant efforts have been made to keep the malicious attacker outside of the perimeter.Unfortunately,suchefforts cannot always be effective in the cloud computingparadigm. The incident where Google fired engineers for breaking internal privacy policies confirms that attackers may reside within the service framework [1]. Carnegie Mellon University’s Computer Emergency Response Team (CERT) defines a malicious insider as“Acurrentofformer employee, contractor, or business partner who has or had authorized access to a network and intentionally used that access in a way that negatively affect the confidentially, integrity, or availability of any information or information systems” [2]. Due to insider threats, cloud-based services are in serious risk of intellectual property theft, IT damage, and information leakage. Hence, security vulnerabilities emerging from insider threats should be addressed by policies, technical solutions, and proper detection methods. 2. SECURING SERVICES IN THE CLOUD Service-Oriented Architecture (SOA) is an architectural pattern, while cloud computing is a set of enabling technologies as a potential target platform or technological approach for that architecture. By combining SOA and cloud computing, it becomes possible to reduce the time taken to implement technology, enhance business performance and expose the existing legacy application over the Internet. The role of SOA in cloud computing is important because a successful cloud solution requires an in-depth understanding of the architecture, the services offered and how to leverage them. Cloud computing becomes part of the architectural arsenal to create a successful SOA. Cloud services benefit the business by taking the best practices and business process focus of SOA. These benefits apply to both cloud service providers and cloud service users. Cloud service providers need to architect solutions by using a service-oriented approach to deliver services with the expected levels of elasticity and scalability. Companies that architect and govern business processes with reusable service-oriented components can moreeasilyidentifywhich components can be successfully moved to public andprivate clouds. A Service-Oriented Architecture (SOA) is a software architecture for building business applications that implement business processes or services through a set of loosely coupled, black-box components orchestrated to deliver a well-defined level of service. Service-oriented architectures are based on the idea of exposing software functionality as services to be used by independent parties. Their inherent independence of a specific platform and operating system make themperfectly suitable to connect service consumers and serviceproviders over the Internet and provide a technical foundation for cloud computing [3]. The combination of SOA and cloud computing facilitatingtheprovisionofcomposedapplication and services that integrate and orchestrate services from different sources pose new challenges to security. Since services and applications are exposedtotheInternetand are used in a global context, the management of user identities across organisational borders is a key element to perform access control and to prevent unauthorised access in a decentralised environment. Open Identity Management Models support the sharing of identity information across several trust domains in a controlled manner. Clients can request identity information from the identity management systems and convey this information in an interoperableformattoa requesting party. Besides identity provisioning,confidentialityandintegrityof exchanged, stored, and processed information must be ensured. Several specifications emerged to protect information at different layers. For instance, a secure channel can be used to protect exchangedinformation, while signature and encryption mechanisms applied to a message can also protect stored and processed information. These security requirements are stated in security policies that configure the secure interaction of participants in a service- based system. Policies facilitate the negotiation of security requirements between services and service clientsto enable interoperability at runtime. This enablesa seamlessusageof services in the cloud to build composed applications. However, due to the complexity of the involved specifications, the variety of security mechanisms and the flexibility of service-based systems, such policiesarehard to understand and even harder to codify. To overcome these limitations, we foster a model-driven approach that generates security configurations based on system design models annotatedwithsecurityrequirements.Toimplement the functional and security requirements specified at the modelling layer, our cloud platform has to ensure two aspects: The system with all involved services and web application components must be instantiated in a virtual machine according to the functional requirements and the services must beconfiguredincompliance withthemodelled security requirements. As illustrated in Figure 1, our approach consists of three layers. Functional and security requirements, expressed at the modelling layer, are translated to a platform independent model. This model constitutes the foundation to setup the virtual machine, application server, services and composed applications that are provided to the user [4].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1466 Fig -1: Model-driven Security in SOA A Model-driven approach transforms security intentions to enforceable security policies. This transformation is based on a set of security configuration patterns that provide security expert knowledge to configure the system. Our model-driven approachrequiresanautomatedgenerationof enforceable security configurations based on the modelled security requirements [5]. 3. DATA SECURITY AND PRIVACY IN CLOUD Security and privacy concerns faced by the cloudconsumers require them to evaluate the risk and its management in the cloud environment, then mitigating those risks. Of course, the most critical benefit offered by cloud computing is the reduction of business costs. Most businesses have well- established security objectives, strategies, and policies consistent with compliance requirements to protect their intellectual property, and their clients’ data. Many security components come into play, but the most four critical components are shown in Figure 2. Data andtransmissionof data must take place through secured channels. Application and storage security both must be maintained by the cloud service provider. Fig -2: Security Components. The storage data itself can be encrypted by many cloud service providers using server side encryption (SSE). This will encrypt the data on the cloud storage devices with strong cryptographic algorithms but the encryption keys stay with the cloud provider and are not underthecontrol of the cloud customer. If nothing else is offered, the cloud server administrator should activate SSE per default for the cloud storage used. This encryption gives some basic protection against unauthorized access tothecustomerdata but also means that the security of this solution depends on the cloud provider’s ability to restrict access to the storage encryption keys even to other employees. The cloud service provider should enforce the same or even higher levels of security controls as expected by the cloud customer or as best practice in the industry. There are logical risks of information disclosure or data integrity by having unsecure applications or permission handling functionalities. The application or underlying infrastructure could be open to exploits by hackers. The user permission and role model could be exploited as well by external hackers or internal employees that have too many access rights. In general, the same security measures need to be applied like in any IT system. The complexity arisesfromthe cloud technology model that is based on virtualization and distributed responsibilities between the infrastructure layers. The cloud service provider must take careofphysical and logical security that is in his sole responsibility. For example, the cloud service provider may offer encryption, but it is up to the customer to activate and use it. Clear responsibilities for network, operating system, and application security measures are key priorities to achieve such a secure cloud solution. Cloud computing is yet to standardize the process of service metering. Therefore, service metering is notyettrustworthy to the cloud consumers. The process requires a systematic, verifiable, and reliable framework for cloudcomputingto be sustainable. Subsequently, the trust relationship of cloud service providers with customers and enterprises will be enhanced, resulting in a wider adoption of cloud-based solutions. Maintaining the privacy of users isofhighconcern for most organizations. Whether employees, customers, or patients, personally identifiable informationisa high-valued target. Many cloud subscribers do not realizethatwhenthey contract a provider to perform a service, they are also agreeing to allow that providertogatherand sharemetadata and usage information about their environment. In some cases, providers even sell or share these data legally based on their privacy statements The evolving nature of cloud computing technologies has resulted in nonstandard security implementations and practices. Moreover, the lack of governance for audits creates a challenging environment to verify if the cloud service providers have complied with the standards. As a result, cloud computing security may not yet be ready for audits [6]. Users depend on the service level agreement (SLA) and have to rely on the cloud service provider to keep up their end of the bargain. However, cloud servicesarebest effort services and a service provider may not guarantee the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1467 security standards. Therefore, as SLAs play a vital role in ensuring the security of the cloud-based services, governing bodies and security experts should be part of the SLAs and legal aspects, which is not yet seen to be in practice for cloud-based service models [7]. 4. PROPOSED WORK 4.1 Operational Transformation The edit conflict due to concurrent operations is one of the main challenges in collaborativeeditingsystems. Without an efficient solution to edit conflicts, it may result in inconsistent text to different clients when collaborators concurrently edit the same document. In 2009, OT was adopted as a core technique behind the collaboration features in Apache Wave and Google Docs. In a collaborative editing cloud service, the cloud servers can be responsible for receiving and caching editing operations in its queue, imposing order on each editing operation, executing OT on concurrent operations based on the order iteratively, broadcasting these editing operations to other clients, and applying them in its local copy to maintaina latest version of the document. When receiving an operation opr(c) from the client, the cloud server executes operational transformation. 4.2. System Design and Security Analysis Fig -3: LightCore system model. LightCore involves a group of collaborativeusersanda cloud server. Each client communicates with the server over the Internet, to send its operations and receive modifications from others in real time. For each document, the server maintains a history of versions. That is, it keeps receiving operations from users, and these modifications make the document shift from one version to another. When applying modifications on a version, the server may need OT to transform some operations. The server also keeps sending the current freshest version to users, that is, all transformed operations since the last version is sent. Because a user is still editing on the old version when the freshestoneisbeing sent, the OT processing may also be required to update its view at the client side. Figure 3 represents the LightCore system model,Thismodel describes the cloud server is responsible for storing and maintaining the latestcontent,executingoperations(update, delete, insert, etc.) against the content,resolvingoperational conflicts, and broadcasting the updates among multiple clients. The cloud server is considered to be honest but curious. In case of risking its reputation, the honest cloud server will timely and correctly disseminate modifications committed by all the authorized clients without maliciously attempting to add, drop, alter, or delay operation requests. However, motivated by economic benefits or curiosity, the cloud provider or its internal employees may spy or probe into the shared content, determine the document type by observing the format and layout, and discover the pivot part of the documents by analyzing the frequency andquantityof access. Additionally, we assume that the cloud servers will protect the content from unauthorized user’s access and other traditional network attacks such as DoS attacks, and keep the availability of shared documents, for example, by redundancy. LightCore system model is collaborative editing cloud solution for sensitive data against honest-but-curious servers. We adopt stream cipher or the CTR mode of block cipher to encrypt and decrypt the contents of the document within clients, while only the authorized users share the keys. In LightCore, all user data including all operations and every version of the documents are processed in the cloud. Attackers from inside or outside might attempt to alter or delete the user data, or disrupt the cloud services. However, for the reputation and benefits of the cloud serviceprovider, the honest-but-curious cloud servers are supposed to preserve integrity, availability, and consistency for the data of users. The cloud service provider will deploy adequate protections to prevent such external attacks, including access control mechanisms to prevent malicious operations on a document by other unauthorized users. Preserving the confidentiality of users’ documents is the main target of LightCore. First, in our system, only the authorized users with the shared master key can read the texts of the documents. LightCore adopts stream cipher and the CTR mode of block cipher to encrypt data at the client side. In the editing phase, the input texts of each operation are encrypted before being sent to the cloud. Therefore, the input texts are transmitted in ciphertext and documents in the cloud are also stored in ciphertext. Second, the algorithms are assumed to be secure and the keys only appear on the clients. So, these keys could only be leaked by the collaborative users or the clients, who are also assumed to be trusted. Finally, data keys are generated in a random way by each user, and LightCoreuses each byte of the keystreams generated by data keys only
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1468 once. Any text is encrypted by the keystreams generated specially for it. So, the curious servers cannot infer the contents by analyzing the difference in two decrypted texts. In order to maintain the functionalities of the cloud servers, we only encrypt the input texts of each operation butnotthe position of the operation. The position of eachoperation and the length of the operated text are disclosed to the cloud servers, which may leak a certain of indirect sensitive information including the numberoflines,thedistributionof paragraphs, and other structure information. We assume these data can only be access by the authorized clients and the cloud servers, and they are not disclosed to external attackers by adopting the SSL protocol. In this case, the related data are limited to the cloud and the clients. Additionally, the attributes attached to the text segments, including font, color, author identity, keystream_info, might also be used to infer the underlying information of the documents. For example, a text segment with the bold attribute may disclose its importance; a text segment with list attribute may also leak some related information. However, some of the attributes can be easily protected by encrypting them at the client in LightCore, becausethecloud servers are not required to process all of them (e.g., font, size, and color). Therefore, encrypting these attributes will not impede the basic functionalities of the cloud servers. Anyway, attributes author and keystream_info cannot be encrypted, because these attributes related to the basic functionalities of the cloud servers. Another threat from the cloud is to infer sensitive data by collecting and analyzing data access patterns from careful observationsontheinputs of clients. Even if all data are transmitted and stored in an encrypted format, traffic analysis techniques can reveal sensitive information about the documents. Table -1: Performance of Concurrent Modifications from 20 Clients In order to evaluate the time of these main procedures, we create an experiment where 20 collaborators from different clients quickly input texts in the same document concurrently. The time of transforming an operation called the queuing time, the time of applying an operation in its local copy called the applying time, and the transmission time of each operation are given in Table 1. In fact, the main difference lies in the added encryption/ decryption process; the other processes are not affected. The decryption time of less than 500 milliseconds has no influence on real time. We can see that the total time 1239 milliseconds of LightCore is only 29 milliseconds longer than that of the original system, which makes no difference to human perception. Fig -4: Multi-Layer Encryption Architecture Multi layer Encryption Approach in Information Technology offers advanced and useful technique of cloud computing that is being intensivelyspreadingamonginternetusers. The present approach lacks safeguardingofuploadeddata on the server also lacks proper tracking of abolished users thereby the user authentication process is hampered. A resolution can be that the user authentication process is performed twice. Firstly, authenticating the user by making use of password, thereafter using the interfacing technology in sending secret code to authenticusers email.Thedata owner encrypts the data twice before uploading it cloud server. Later the cloud server and then the cloud manager again re- encrypt the data and finally stored in the cloud. The data to be uploaded on the cloud is grantedadditional securityusing Multi- layer encryption technique. The paper projectsperformanceofmulti-layer encryption on the data to be uploaded on cloud server as data being more confidential and secure. The major concern of thepaperisto perform the user authentication twice. Figure 4 suggests three-layers of encryption are to offer enhanced and higher safety of data and perform two types of login for user authentication. First, using the original user login name and password the validation is performed and secondly, to test whether user is authorized or not, a secret code is mailed to authentic users E-mail ID. On entering the correct secret code only the user is granted data access on cloud server. The purpose of authenticating the user twice is that only the authentic users can fetch thedata fromcloudserver. Thetwo Queu ing Time (ms) Applyi ng Time (ms) Trans missio n Time (ms) Decryp tion Time (RC4) (ms) Total Time (ms) Original System 0.06 5.93 23 - 1210 LightCore System 0.06 5.93 23 0.40 1239
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1469 algorithms being used for achieving security are AES and RSA encryption techniques. Table -2: Comparative of Accuracy S.No. Encryption Techniques Security (%) Time (ms) 1. CP-ABE 88.2 3.58 2. K-NN 92.1 2.71 3. MultilayerEncryption Approach 96.6 0.96 Table 2 mentioned above demonstrates evaluation of Multi- layer encryption approach compared with K-NN, and CP- ABE. The suggested Multi-layer encryption technique proves to be effective providing enhanced performance in comparison with rest of the existing techniques. Chart -1: Comparison of Accuracy Analysis Chart -2: Comparison of time evolutions Chart 1 and 2 mentioned above compares security based encryption models performing with Multi-layer encryption approach with K-NN, andCP-ABE.ThesuggestedMulti-layer encryption technique is efficient offering greater performance compared with rest of the current techniques. 5. CONCLUSION The proposed model-driven approach that transforms security intentions to enforceable security policies. This transformation is based on a set of security configuration patterns that providesecurityexpertknowledgetoconfigure the system. Our platform allows users to specify these security intentions in system models to enable a simple and easily comprehensible specification of security requirements. Experiments on the prototype system show that LightCore provides efficient onlinecollaborativeediting services for resource-limited clients.Weadoptstreamcipher or the CTR mode of block cipherto encrypt(anddecrypt) the contents of the document within clients, while only the authorized users sharethekeys.Thispaperalsopresents a new strategy of Multi layer encryption oriented on the algorithm of AES and RSA which claims to offer security and privacy of entire public cloud content. Such data communication among the systems will lead to improvised security concerning the data that is shared over the cloud. This solution is helpful if the cloud customer wants full control not only over the encryption keys but also the key management and the encryption algorithms used. REFERENCES [1] Kincaid, J. (2010). Google confirms that it fired engineer for breaking internal privacy policies, available at http://techcrunch.com/2010/09/14/google- engineerspying-fired/. [2] Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. J., and Flynn, L.(2012).Commonsenseguide to mitigating insider threats, 4th edition, Tech. rep., DTIC Document. [3] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On technical security issues in cloud computing,” Cloud Computing, IEEE International Conference on,vol.0,pp. 109–116, 2009. [4] Thalmann, S., Bachlechner, D., Demetz, L., and Maier, R. (2012). “Challenges in cross-organizational security management”, in SystemScience(HICSS),in45thHawaii International Conference on (IEEE), pp. 5480–5489. [5] M. Menzel, R. Warschofsky, and C. Meinel, “A Patterndriven Generation of Security Policies for Serviceoriented Architectures,” in IEEE International Conference on Web Services (ICWS 2010), 2010. [6] M. Menzel and C. Meinel, “SecureSOA - Modelling Security Requirements for Service-oriented Architectures,” in IEEE International Conference on Services Computing (SCC 2010), 2010. [7] Morin, J.-H., Aubert, J., and Gateau, B. (2012). “Towards cloud computing SLA risk management: Issues and challenges”, in System Science (HICSS), 2012 45th Hawaii International Conference on (IEEE), pp. 5509– 5514.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1470 BIOGRAPHIES Mr. Y Kiran Kumar, M.C.A. He received his Master of Computer Applications from Sri Venkatesra University, Tirupati.HeisPursuing Ph.D from Bharathiar University, Coimbatore. He is having more than 11 years of teaching experience,currentlyheisworking as a Assistant Professor in the department of M.C.A in Sree Vidyanikethan Engineering College, Affiliated by JNTUA, Ananthapuramu, India. His areas of research interests include Web Technologies, Information Security, Service Oriented ArchitectureandCloudComputing. Dr. R. Mahammad Shafi, M.C.A, M.Tech, Ph.D. He received his Ph.D from University of Allahabad, Allahabad. He is having more than 20 years of teaching experience. His areas of research interests include Software Engineering, Software Testing and Quality Assurance. He has published papers in refereed journals and conference proceedings in these areas. He has been involved in conferences and workshops as a Committee member,organizerand Session Chair. His areas of research interests include Software Engineering, Software Testing and Quality Assurance.