SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
                    International Journal of Advanced Research in Computer Engineering & Technology
                                                                        Volume 1, Issue 4, June 2012



             Secure Data Storage in the Cloud using
                 Digital Signature Mechanism
                                                  Shobha Rajak, Ashok Verma


                                                                     available on demand, regard-less of the user location or
Abstract— Cloud computing services need to address the                device. Cloud computing can be contrasted with the
security during the transmission of sensitive data and critical       traditional desktop computing model, where the resources of
applications to shared and public cloud environments. The             a single desktop computer are used to complete tasks, and an
cloud environments are scaling large for data processing and          expansion of the client/server model. To paraphrase Sun
storage needs. Cloud computing environment have various
                                                                      Microsystems, famous adage, in cloud computing the
advantages as well as disadvantages on the data security of
service consumers. In Cloud computing environment data                network becomes the supercomputer.[2-4]
protection as the most important security issue. In this issue, it    In addition to the different cloud computing models, there are
concerns Include the way in which data is accessed and stored,        distinctions among the most common cloud service models
audit     requirements,      compliance,      and     notification    as shown in Figure 1. Available to anyone with Internet
Requirements, issues involving the cost of data breach, and           access, cloud service models include:[1]
damage to brand value. In the cloud storage infrastructure,           ●Software as a Service (SaaS) cloud model—Enables
regulated and sensitive data needs to be properly segregated. It      software to be delivered from a host source over a network as
is very new Concept which is use for Data securing with the           opposed to installations or implementations
Help of Digital Signature in the cloud computing. In the service
                                                                      ●Platform as a Service (PaaS) cloud model—Enables
provider’s data center, protecting data privacy and managing
compliance are critical by using encrypting and managing              operating systems and middleware services to be delivered
encryption keys of data in transfer to the cloud.In this Research     from a man-aged source over a network
Paper, we have tried to assess Cloud Storage Methodology and          ●Infrastructure as a Service (IaaS) cloud model—Enables
Data Security in cloud by the Implementation of digital               theentire infrastructure to be delivered as a service over a
signature with CFX_MF algorithm.                                      net-work, including storage, routers, virtual systems,
                                                                      hardware and servers.
Index Terms— Cloud computing, Data security, Internet, Key,           In this paper we will focus on the IaaS cloud computing
cloud server, digital signature and encryption.                       models.

  INTRODUCTION
Cloud computing is a very important computing epitome in
which services to assign to a Network connection, software
& also services using over a network. This network of servers
&connections is collectively known as ―the cloud‖.[2] SaaS
stands for Software as a service(SaaS), sometimes it is called
―on-demand software ―because is a used by need to customer
according to their responsibility.[3] Like an iphone,
Blackberry or Laptop they are using service by thin client or
other access point .[2]By users using a thin client, normally
using a web browser over the Internet.[3]By releasing the
need to install & run the application of cloud on the
customer’s own computer.[4] Cloud computing is archive its
position in the IT Companies. When we adopting cloud                  Figure 1. Cloud computing models
technology can be an affordable way to get access to a
dynamically scalable, virtual-ized computing environment.
Optimal IT hardware, software, expertise and infrastructure
management resources that may not otherwise be available
from a cost perspective can be rapidly deployed and easily
scaled.[1] Processes, applications and services can be

   Manuscript received May, 2012.
    Shobha         Rajak,         CSE,       GGITS        Jabalpur
(e-mail:Shobha_2808@yahoo.co.in). Jabalpur , India, +919981784920
Ashok      Verma     ,    CSE     GGITS    Jabalpur,  India(e-mail:   Benefits of Cloud Computing
ashokverma@ggits.org).


                                                                                                                                489
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                    International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 3, May 2012
According to International Data Corporation (IDC), ―The             as patch management and vulnerability management
proliferation of devices, compliance, improved systems              software, use proprietary formats, nomenclatures,
performance, online commerce and increased replication to           measurements, terminology, and content. Their example
secondary or backup sites is contributing to an annual              states that, when vulnerability scanners do not use
doubling of the amount of information transmitted over the          standardized names for vulnerabilities, it might not be clear
Internet.‖ The cost of dealing with this amount of data is          to security staff whether multiple scanners are referencing the
something that companies must address. In today’s economy,          same vulnerabilities in their reports.
companies are looking at any cost saving measures, and the
bottom line is that cloud computing provides much greater           Siani Pearson, et al. [9], described the overview of privacy
flexibility than previous computing models.[12]In this time         issues within cloud computing and a detailed analysis on
Data security is the very main issues in the cloud it is very       privacy threat based on different type of cloud scenario was
important that how to secure data in the cloud. Hackers and         explained, the level of threat seem to vary according to the
Malware virus would be attack on data. These are concerns           application area. Their work has stated the basic guidelines
about the security issues.                                          for software engineers when designing cloud services in
                                                                    particular to ensure that privacy are not mitigated.

                I. PROBLEM STATEMENT                                Meiko Jensen et al. [10], described a selection of issues of
         The problem is that when cloud service providers           Cloud Computing security and the Web Services security
provide service that time might be hacker hacked username           frameworks (attacking the Cloud Computing system itself),
and Password. For Prevent this problem we implement the             stating the importance and capabilities of browser security in
concept of digital Signature. Digital signatures enable the         the Cloud computing context, and sketched the threat of
"authentication" and ―non-repudiation‖ of digital messages,         flooding attacks on Cloud systems. Showed, the threats to
assuring the recipient of a digital message of both the identity    Cloud Computing security are numerous, and each of them
of the sender and the integrity of the message.                     requires an in-depth analysis on their potential impact and
                                                                    relevance to real-world Cloud Computing scenarios.

                   II. RELATED WORKS                                           III . REQUIREMENTS SPECIFICATION
                                                                    3.1 Hardware Requirements
                                                                    The system running the application should have following
       Yuh-Min Tseng a,*, Jinn-Ke Jan b, Hung-Yu                    Requirements:
Chien b[5]-proposed a digital signature scheme using                1. Intel I3 Core to dual
self-certified public keys in the ISP era. It provides the          2. RAM Size 4GB
message recovery property. The authenticated encryption             3. Processor 64bit Upper limit 7400E
scheme only allows a specified receiver to verify and recover
the message. The authenticated encryption scheme with               3.2 Software Requirements
message linkages is suitable for transmission of large              The system running the application must have the following:
message, while providing the linkages among signature               1. Supporting OS: Windows 2008 Server, Windows XP,
blocks.                                                             Windows7.
                                                                    2. Java Development Kit - jdk1.6.0_02.
YANG         Xiaoyuan1,     ZHU       Shuaishuai,      PAN          3. Java Runtime Environment - jre1.6.0_06.
Xiaozhong[6]-proposed a new quick data verification                 4. Web Browser with Java Plug-in installed
scheme (Light PoR), with considering not only the secure            5. Wireless connectivity driver.
public data verification but also the communication and             6. Virtual Machine
computing costs. Once the verification fails, our scheme can
automatically maintain the data availability of CCS clusters        3.3 Network Support
at a relatively high level.                                         This project can be used to run on both Wireless and LAN
                                                                    Networks. It supports following network architectures:
Cong Wang et al. [7] stated that data security is a problem in      1. Local Area Network (using network cables)
cloud data storage, which is essentially a distributed storage      2. Wireless Network (Wi-Fi)
system. And explained their proposed scheme to ensure the           3. Ad-Hoc Network
correctness of user’s data in cloud data storage, an effective      4. Dial-up or VPN network to a workplace.
and flexible distributed scheme with explicit dynamic data
support, including block update, delete, and append relying         3.4 Technology Specific Tools used
on erasure correcting code in the file distribution preparation     In this work we use following tools:
to provide redundancy parity vectors and guarantee the data         1. Eclipse3.3
dependability.                                                      2. Tomcat server v_6
                                                                    3. Java.awt package for layout of the applet.
John Harauz et al. [8], described the Security Content              4. Oracle 10G
automation protocol (SCAP) and benefits it can provide with
latest cloud computing paradigm with reference to the latest                      IV. IMPLEMENTATION
report released by NIST, giving insight as to what SCAP is
trying to do, It states that many tools for system security, such   4.1 Module 1: Study of the System

                                                                                                                               490
                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                       Volume 1, Issue 4, June 2012
This proposed system can be mainly divided into two parts:        The purpose of this appendix is to show that in the DSA, if
1.Server                                                          M= M, r= r and s= s in the signature Verification then v =
2.Client                                                          r. We need the following easy result.
                                                                  LEMMA. Let p and q be primes so that q divides p - 1, h a
                                                                  positive integer less than p, and g = h(p-1)/q mod p. Then gq
                                                                  mod p = 1, and if m mod q = n mod q, then gm mod p = gn mod
                                                                  p.
                                                                  Proof: We have
                                                                  gq mod p = (h(p-1)/q mod p)q mod p
                                                                  = h (p-1) mod p
                                                                  =1
                                                                  By Fermat's Little Theorem. Now let m mod q = n mod q, i.e.,
                                                                  m = n + kq for some integer k. Then
                                                                  gm mod p = gn+kq mod p
                                                                  = (gn gkq) mod p
                                                                  = ((gn mod p) (gq mod p) k) mod p
                                                                  = gn mod p
                                                                  Since gq mod p = 1. 
                                                                  We are now ready to prove the main result.
Figure.1 Design Framework – The High Level Design                 THEOREM. If M= M, r= r, and s= s in the signature
                                                                  verification, then v = r.
This project is mainly depended on client/server model. The       Proof: We have
client requests the server and server responses by granting the   w = (s)-1 mod q = s-1 mod q
clients request. The proposed system should provide both of       u1 = ((SHA-1(M)) w) mod q = ((SHA-1(M))w) mod q
the above Features along with the followed ones:                  u2 = ((r)w) mod q = (rw) mod q.
                                                                  10
a) Server - The server should be able to perform the              Now y = gx mod p, so that by the lemma,
Following features:                                               v = ((gu1 yu2) mod p) mod q
The first and foremost problem is to find the server. We          = ((gSHA-1(M)w yrw) mod p) mod q
should identify the program in the server which processes the     = ((gSHA-1(M)w gxrw) mod p) mod q
client’s request. Authentication of users’ generation of keys     = ((g(SHA-1(M)+xr)w) mod p) mod q.
encryption of data files                                          Also
                                                                  s = (k-1(SHA-1(M) + xr)) mod q.
b) Client: The client should be able to perform the               Hence
Following features:                                               w = (k(SHA-1(M) + xr)-1) mod q
Authenticate itself from server request for keys decrypt data     (SHA-1(M) + xr)w mod q = k mod q.
files                                                             Thus by the lemma,
                                                                  v = (gk mod p) mod q
                                                                  =r
                                                                  = r. 




                                                                  Figure 3:- Key Request and Response Design

Figure 2:-Context Diagram – The Low level Design                  Client requests for services to server & server grants the
                                                                  request to a user. Client has to first register himself in the
RSA DIGITAL SIGNATURE ALGORITHM                                   server starts. Server stores the username, password. Then at
The RSA Digital Signature algorithm is a FIPS approved            the time of login client enter username & password then click
cryptographic algorithm for digital signature generation and      to submit button & user that time server generate key by
verification.                                                     using digital algorithm & simulteausly user go to another
A PROOF THAT v = r THE DSA [4]
                           IN                                     page where username, password & key three fields are there
This appendix is for informational purposes only and is not       & key block are also there. Client submits the key then Server
required to meet the standard.
                                                                                                                              491
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                          Volume 1, Issue 3, May 2012
check the key or verified key which key user was entered.              using the private key to be uploaded to the cloud, then heshe
Then go through next page & show message that you have                 send the signed data to the cloud server.
successfully login.
                                                                       2- CS: CS will compute a hash value from the original data to
ALGORITHM FOR COMPUTING m VALUES OF x                                  send it to the user, and then takes this hash value entered in
[4]                                                                    the web page cloud for verification using the public key. At
Let x be the signer's private key. The following may be used           the end, the CS will inform the user if the key is not verified
to generate m values of x:                                             or any error regarding this concept.
Step 1. Choose a new, secret value for the seed-key, XKEY.
Step 2. In hexadecimal notation let                                                             V Result
t = 67452301 EFCDAB89 98BADCFE 10325476
C3D2E1F0.                                                              Consequently, we found that our model provides us a
This is the initial value for H0 || H1 || H2 || H3 || H4 in the SHS.   well-defined and efficient result depends on each situation
Step 3. For j = 0 to m - 1 do                                          we assumed. With the pages which have been created, we
15                                                                     make the system easy to use by the user that does not have
a. XSEEDj = optional user input.                                       background in the digital sign technique. After discussing the
b. XVAL = (XKEY + XSEEDj) mod 2b.                                      situations for the attacking as shown earlier and the forms
c. xj = G (t,XVAL) mod q.                                              that were built using windows Azure application make the
d. XKEY = (1 + XKEY + xj) mod 2b.                                      cloud able to reach the client data integrity and availability.
1- User: who uses and relay on the verification of the cloud to
store a large data files with a secure way.                                              VI   Conclusion & Future Work
2- Cloud Server (CS): who is managed by CSP, which has a               In this paper, we proposed a model for the integrity check
huge storing space and flexible recourses to keep up the               over the cloud computing and we utilize the TPA and digital
client data.                                                           signature to achieve the integrity concept, in such a way to
                                                                       help the user to verify and examine the data from
When user first time open website register profile to him then         unauthorized people that manipulate with the cloud or extract
register in the data base which save in the server. Then user          from the data. Moreover, we are able to evaluate our work
enters your username and password then click on submit                 using a windows azure project that involves digital signature
button. after that digital signature algorithm perform on the          coding. As results, we found that our model worked well
server and generate key which is shown to user then user type          according to our claims. In future it can be enhancing in the
that key it is more important visible key n entered key are            server side updating and data modification. In our paper we
same then server respond to verified key message to user and           decided to concern about the client data storing service in the
user successfully login to their profile and access your data.         cloud. The main objective was to study the ability to verify
To implement our design, we need to achieve some goals in              the client data with the absent of the editing and the deleting.
our model by allowing the Server to verify the Key over the            The approach used for the encryption in the verification
cloud Environment in the virtual machine. Additionally, we             process was the digital signature. In the implementation we
need to ensure that the cloud server does not manipulate or            used as an example of the client data in the cloud a text
alter the user data in the cloud. Furthermore, the model is            entered by the client, this research is not covering other
achieved using the digital signature technique. The digital            various kinds of client data. In this paper we have a future
signature works by taking the user data first, then perform a          work to modification in the data
hash function over it using RSA Algorithm (RSA) Digital
Signature Algorithm. After that, computes the signature for
the generated hash value by encrypting it with the private                               VII .REFERENCES
key. In the other side, the decryption is done by the public
key but the result will be a hash value, and the hash value is          [1] ―Security and high availability in cloud computing
not reversible to its original data.                                   environments‖, IBM Global Technology Services Technical
There are three procedures in our model to satisfy the                 White Paper ,IBM ,June 2011
integrity concept:
                                                                       [2] M. Sudha, Dr.Bandaru Rama Krishna Rao, M. Monica---
1- Digital signature part will be done by the user.                    A Comprehensive Approach to Ensure Secure Data
                                                                       Communication in Cloud Environment /International
2- The CS verifies over the user data in the cloud to check            Journal of Computer Applications (0975 – 8887)Volume 12–
over the manipulation or intrusions in the cloud data.                 No.8, December 2010
In next the paragraphs explanation for each entity function in         [3] Ms. Rashmi A. Akojwar, Ms. Reshma V. Kothari, Mr.
the proposed model:                                                    Sandip A. Kahate,Ms. Ruchika D. Ganvir-
                                                                       Software As A Service With Cloud Computing International
1- User: User first chose a random parameter to construct the          Journal of Electronics Communication and Computer
public and the private keys then heshe will sign the data             Engineering Volume 3, Issue 1, ISSN: 2249 –071X

                                                                                                                                   492
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                  International Journal of Advanced Research in Computer Engineering & Technology
                                                                      Volume 1, Issue 4, June 2012

[4] U.S. DEPARTMENT OF COMMERCE/National
Institute of Standards and Technology-DIGITAL
SIGNATURE STANDARD (DSS)

[5] Digital signature with message recovery
Using self-certified public keys and its variantsYuh-Min
Tseng, Jinn-Ke Jan, Hung-Yu Chien

[6] YANG Xiaoyuan1, ZHU Shuaishuai, PAN Xiaozhong-

[7] Cong Wang, Qian Wang and Kui Ren. ―Ensuring Data
Storage Security in Cloud computing‖ 978-1-4244-3876-
1/2009 IEEE.
[8] John Harauz, Lori M. Kaufman and Bruce Potter, ―Data
security in the world of cloud computing ―,2009 IEEE CO
Published by the IEEE Computer and Reliability Societies.

[9] Siani Pearson, ―Taking account of Privacy when
Designing Cloud computing Services‖ CLOUD’09, May 23,
2009, Vancouver, Canada, 2009 IEEE.

[10] Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo
Iacono, ―On Technical Security Issues in Cloud Computing‖,
2009 IEEE
International Conference on Cloud Computing

[11] Erica Brasher-Sims, ―SaaS Software as a Service‖, 2008

[12] Michael Gregg, ―10 Security Concerns for Cloud
Computing‖, Expert Reference Series of White Papers,
Global Knowledge, 010




                                                                                               493
                                         All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam readyHai Nguyen
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 

Was ist angesagt? (19)

Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Fog doc
Fog doc Fog doc
Fog doc
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
G033030035
G033030035G033030035
G033030035
 
176
176176
176
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 

Andere mochten auch

تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقمي
تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقميتجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقمي
تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقميMalik Shishtawi
 
قياس مؤشرات النجاح في الميديا الاجتماعية
قياس مؤشرات النجاح في الميديا الاجتماعيةقياس مؤشرات النجاح في الميديا الاجتماعية
قياس مؤشرات النجاح في الميديا الاجتماعيةGhada ALAmoudi
 
social media strategy
social media strategysocial media strategy
social media strategyDahy Gamal
 
Digital Marketing KPIs Measurement - By Waqas Lakhani
Digital Marketing KPIs Measurement - By Waqas LakhaniDigital Marketing KPIs Measurement - By Waqas Lakhani
Digital Marketing KPIs Measurement - By Waqas LakhaniWaqas Lakhani
 
Product Marketing by Numbers - Objectives, Goals and KPI frameworks
Product Marketing by Numbers - Objectives, Goals and KPI frameworksProduct Marketing by Numbers - Objectives, Goals and KPI frameworks
Product Marketing by Numbers - Objectives, Goals and KPI frameworksJono Alderson
 

Andere mochten auch (8)

What digital-stratgy-is-working-in-small-business
What digital-stratgy-is-working-in-small-businessWhat digital-stratgy-is-working-in-small-business
What digital-stratgy-is-working-in-small-business
 
تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقمي
تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقميتجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقمي
تجربة قطر في ريادة الأعمال عبر وسائل الإعلام الاجتماعي الرقمي
 
قياس مؤشرات النجاح في الميديا الاجتماعية
قياس مؤشرات النجاح في الميديا الاجتماعيةقياس مؤشرات النجاح في الميديا الاجتماعية
قياس مؤشرات النجاح في الميديا الاجتماعية
 
Socail Media strategy
Socail Media strategySocail Media strategy
Socail Media strategy
 
social media strategy
social media strategysocial media strategy
social media strategy
 
Digital Marketing KPIs Measurement - By Waqas Lakhani
Digital Marketing KPIs Measurement - By Waqas LakhaniDigital Marketing KPIs Measurement - By Waqas Lakhani
Digital Marketing KPIs Measurement - By Waqas Lakhani
 
Product Marketing by Numbers - Objectives, Goals and KPI frameworks
Product Marketing by Numbers - Objectives, Goals and KPI frameworksProduct Marketing by Numbers - Objectives, Goals and KPI frameworks
Product Marketing by Numbers - Objectives, Goals and KPI frameworks
 
Social media plan
Social media planSocial media plan
Social media plan
 

Ähnlich wie 489 493

Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 

Ähnlich wie 489 493 (20)

Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
G017214849
G017214849G017214849
G017214849
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
G0314043
G0314043G0314043
G0314043
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

489 493

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Secure Data Storage in the Cloud using Digital Signature Mechanism Shobha Rajak, Ashok Verma  available on demand, regard-less of the user location or Abstract— Cloud computing services need to address the device. Cloud computing can be contrasted with the security during the transmission of sensitive data and critical traditional desktop computing model, where the resources of applications to shared and public cloud environments. The a single desktop computer are used to complete tasks, and an cloud environments are scaling large for data processing and expansion of the client/server model. To paraphrase Sun storage needs. Cloud computing environment have various Microsystems, famous adage, in cloud computing the advantages as well as disadvantages on the data security of service consumers. In Cloud computing environment data network becomes the supercomputer.[2-4] protection as the most important security issue. In this issue, it In addition to the different cloud computing models, there are concerns Include the way in which data is accessed and stored, distinctions among the most common cloud service models audit requirements, compliance, and notification as shown in Figure 1. Available to anyone with Internet Requirements, issues involving the cost of data breach, and access, cloud service models include:[1] damage to brand value. In the cloud storage infrastructure, ●Software as a Service (SaaS) cloud model—Enables regulated and sensitive data needs to be properly segregated. It software to be delivered from a host source over a network as is very new Concept which is use for Data securing with the opposed to installations or implementations Help of Digital Signature in the cloud computing. In the service ●Platform as a Service (PaaS) cloud model—Enables provider’s data center, protecting data privacy and managing compliance are critical by using encrypting and managing operating systems and middleware services to be delivered encryption keys of data in transfer to the cloud.In this Research from a man-aged source over a network Paper, we have tried to assess Cloud Storage Methodology and ●Infrastructure as a Service (IaaS) cloud model—Enables Data Security in cloud by the Implementation of digital theentire infrastructure to be delivered as a service over a signature with CFX_MF algorithm. net-work, including storage, routers, virtual systems, hardware and servers. Index Terms— Cloud computing, Data security, Internet, Key, In this paper we will focus on the IaaS cloud computing cloud server, digital signature and encryption. models. INTRODUCTION Cloud computing is a very important computing epitome in which services to assign to a Network connection, software & also services using over a network. This network of servers &connections is collectively known as ―the cloud‖.[2] SaaS stands for Software as a service(SaaS), sometimes it is called ―on-demand software ―because is a used by need to customer according to their responsibility.[3] Like an iphone, Blackberry or Laptop they are using service by thin client or other access point .[2]By users using a thin client, normally using a web browser over the Internet.[3]By releasing the need to install & run the application of cloud on the customer’s own computer.[4] Cloud computing is archive its position in the IT Companies. When we adopting cloud Figure 1. Cloud computing models technology can be an affordable way to get access to a dynamically scalable, virtual-ized computing environment. Optimal IT hardware, software, expertise and infrastructure management resources that may not otherwise be available from a cost perspective can be rapidly deployed and easily scaled.[1] Processes, applications and services can be Manuscript received May, 2012. Shobha Rajak, CSE, GGITS Jabalpur (e-mail:Shobha_2808@yahoo.co.in). Jabalpur , India, +919981784920 Ashok Verma , CSE GGITS Jabalpur, India(e-mail: Benefits of Cloud Computing ashokverma@ggits.org). 489 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012 According to International Data Corporation (IDC), ―The as patch management and vulnerability management proliferation of devices, compliance, improved systems software, use proprietary formats, nomenclatures, performance, online commerce and increased replication to measurements, terminology, and content. Their example secondary or backup sites is contributing to an annual states that, when vulnerability scanners do not use doubling of the amount of information transmitted over the standardized names for vulnerabilities, it might not be clear Internet.‖ The cost of dealing with this amount of data is to security staff whether multiple scanners are referencing the something that companies must address. In today’s economy, same vulnerabilities in their reports. companies are looking at any cost saving measures, and the bottom line is that cloud computing provides much greater Siani Pearson, et al. [9], described the overview of privacy flexibility than previous computing models.[12]In this time issues within cloud computing and a detailed analysis on Data security is the very main issues in the cloud it is very privacy threat based on different type of cloud scenario was important that how to secure data in the cloud. Hackers and explained, the level of threat seem to vary according to the Malware virus would be attack on data. These are concerns application area. Their work has stated the basic guidelines about the security issues. for software engineers when designing cloud services in particular to ensure that privacy are not mitigated. I. PROBLEM STATEMENT Meiko Jensen et al. [10], described a selection of issues of The problem is that when cloud service providers Cloud Computing security and the Web Services security provide service that time might be hacker hacked username frameworks (attacking the Cloud Computing system itself), and Password. For Prevent this problem we implement the stating the importance and capabilities of browser security in concept of digital Signature. Digital signatures enable the the Cloud computing context, and sketched the threat of "authentication" and ―non-repudiation‖ of digital messages, flooding attacks on Cloud systems. Showed, the threats to assuring the recipient of a digital message of both the identity Cloud Computing security are numerous, and each of them of the sender and the integrity of the message. requires an in-depth analysis on their potential impact and relevance to real-world Cloud Computing scenarios. II. RELATED WORKS III . REQUIREMENTS SPECIFICATION 3.1 Hardware Requirements The system running the application should have following Yuh-Min Tseng a,*, Jinn-Ke Jan b, Hung-Yu Requirements: Chien b[5]-proposed a digital signature scheme using 1. Intel I3 Core to dual self-certified public keys in the ISP era. It provides the 2. RAM Size 4GB message recovery property. The authenticated encryption 3. Processor 64bit Upper limit 7400E scheme only allows a specified receiver to verify and recover the message. The authenticated encryption scheme with 3.2 Software Requirements message linkages is suitable for transmission of large The system running the application must have the following: message, while providing the linkages among signature 1. Supporting OS: Windows 2008 Server, Windows XP, blocks. Windows7. 2. Java Development Kit - jdk1.6.0_02. YANG Xiaoyuan1, ZHU Shuaishuai, PAN 3. Java Runtime Environment - jre1.6.0_06. Xiaozhong[6]-proposed a new quick data verification 4. Web Browser with Java Plug-in installed scheme (Light PoR), with considering not only the secure 5. Wireless connectivity driver. public data verification but also the communication and 6. Virtual Machine computing costs. Once the verification fails, our scheme can automatically maintain the data availability of CCS clusters 3.3 Network Support at a relatively high level. This project can be used to run on both Wireless and LAN Networks. It supports following network architectures: Cong Wang et al. [7] stated that data security is a problem in 1. Local Area Network (using network cables) cloud data storage, which is essentially a distributed storage 2. Wireless Network (Wi-Fi) system. And explained their proposed scheme to ensure the 3. Ad-Hoc Network correctness of user’s data in cloud data storage, an effective 4. Dial-up or VPN network to a workplace. and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append relying 3.4 Technology Specific Tools used on erasure correcting code in the file distribution preparation In this work we use following tools: to provide redundancy parity vectors and guarantee the data 1. Eclipse3.3 dependability. 2. Tomcat server v_6 3. Java.awt package for layout of the applet. John Harauz et al. [8], described the Security Content 4. Oracle 10G automation protocol (SCAP) and benefits it can provide with latest cloud computing paradigm with reference to the latest IV. IMPLEMENTATION report released by NIST, giving insight as to what SCAP is trying to do, It states that many tools for system security, such 4.1 Module 1: Study of the System 490 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 This proposed system can be mainly divided into two parts: The purpose of this appendix is to show that in the DSA, if 1.Server M= M, r= r and s= s in the signature Verification then v = 2.Client r. We need the following easy result. LEMMA. Let p and q be primes so that q divides p - 1, h a positive integer less than p, and g = h(p-1)/q mod p. Then gq mod p = 1, and if m mod q = n mod q, then gm mod p = gn mod p. Proof: We have gq mod p = (h(p-1)/q mod p)q mod p = h (p-1) mod p =1 By Fermat's Little Theorem. Now let m mod q = n mod q, i.e., m = n + kq for some integer k. Then gm mod p = gn+kq mod p = (gn gkq) mod p = ((gn mod p) (gq mod p) k) mod p = gn mod p Since gq mod p = 1.  We are now ready to prove the main result. Figure.1 Design Framework – The High Level Design THEOREM. If M= M, r= r, and s= s in the signature verification, then v = r. This project is mainly depended on client/server model. The Proof: We have client requests the server and server responses by granting the w = (s)-1 mod q = s-1 mod q clients request. The proposed system should provide both of u1 = ((SHA-1(M)) w) mod q = ((SHA-1(M))w) mod q the above Features along with the followed ones: u2 = ((r)w) mod q = (rw) mod q. 10 a) Server - The server should be able to perform the Now y = gx mod p, so that by the lemma, Following features: v = ((gu1 yu2) mod p) mod q The first and foremost problem is to find the server. We = ((gSHA-1(M)w yrw) mod p) mod q should identify the program in the server which processes the = ((gSHA-1(M)w gxrw) mod p) mod q client’s request. Authentication of users’ generation of keys = ((g(SHA-1(M)+xr)w) mod p) mod q. encryption of data files Also s = (k-1(SHA-1(M) + xr)) mod q. b) Client: The client should be able to perform the Hence Following features: w = (k(SHA-1(M) + xr)-1) mod q Authenticate itself from server request for keys decrypt data (SHA-1(M) + xr)w mod q = k mod q. files Thus by the lemma, v = (gk mod p) mod q =r = r.  Figure 3:- Key Request and Response Design Figure 2:-Context Diagram – The Low level Design Client requests for services to server & server grants the request to a user. Client has to first register himself in the RSA DIGITAL SIGNATURE ALGORITHM server starts. Server stores the username, password. Then at The RSA Digital Signature algorithm is a FIPS approved the time of login client enter username & password then click cryptographic algorithm for digital signature generation and to submit button & user that time server generate key by verification. using digital algorithm & simulteausly user go to another A PROOF THAT v = r THE DSA [4] IN page where username, password & key three fields are there This appendix is for informational purposes only and is not & key block are also there. Client submits the key then Server required to meet the standard. 491 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012 check the key or verified key which key user was entered. using the private key to be uploaded to the cloud, then heshe Then go through next page & show message that you have send the signed data to the cloud server. successfully login. 2- CS: CS will compute a hash value from the original data to ALGORITHM FOR COMPUTING m VALUES OF x send it to the user, and then takes this hash value entered in [4] the web page cloud for verification using the public key. At Let x be the signer's private key. The following may be used the end, the CS will inform the user if the key is not verified to generate m values of x: or any error regarding this concept. Step 1. Choose a new, secret value for the seed-key, XKEY. Step 2. In hexadecimal notation let V Result t = 67452301 EFCDAB89 98BADCFE 10325476 C3D2E1F0. Consequently, we found that our model provides us a This is the initial value for H0 || H1 || H2 || H3 || H4 in the SHS. well-defined and efficient result depends on each situation Step 3. For j = 0 to m - 1 do we assumed. With the pages which have been created, we 15 make the system easy to use by the user that does not have a. XSEEDj = optional user input. background in the digital sign technique. After discussing the b. XVAL = (XKEY + XSEEDj) mod 2b. situations for the attacking as shown earlier and the forms c. xj = G (t,XVAL) mod q. that were built using windows Azure application make the d. XKEY = (1 + XKEY + xj) mod 2b. cloud able to reach the client data integrity and availability. 1- User: who uses and relay on the verification of the cloud to store a large data files with a secure way. VI Conclusion & Future Work 2- Cloud Server (CS): who is managed by CSP, which has a In this paper, we proposed a model for the integrity check huge storing space and flexible recourses to keep up the over the cloud computing and we utilize the TPA and digital client data. signature to achieve the integrity concept, in such a way to help the user to verify and examine the data from When user first time open website register profile to him then unauthorized people that manipulate with the cloud or extract register in the data base which save in the server. Then user from the data. Moreover, we are able to evaluate our work enters your username and password then click on submit using a windows azure project that involves digital signature button. after that digital signature algorithm perform on the coding. As results, we found that our model worked well server and generate key which is shown to user then user type according to our claims. In future it can be enhancing in the that key it is more important visible key n entered key are server side updating and data modification. In our paper we same then server respond to verified key message to user and decided to concern about the client data storing service in the user successfully login to their profile and access your data. cloud. The main objective was to study the ability to verify To implement our design, we need to achieve some goals in the client data with the absent of the editing and the deleting. our model by allowing the Server to verify the Key over the The approach used for the encryption in the verification cloud Environment in the virtual machine. Additionally, we process was the digital signature. In the implementation we need to ensure that the cloud server does not manipulate or used as an example of the client data in the cloud a text alter the user data in the cloud. Furthermore, the model is entered by the client, this research is not covering other achieved using the digital signature technique. The digital various kinds of client data. In this paper we have a future signature works by taking the user data first, then perform a work to modification in the data hash function over it using RSA Algorithm (RSA) Digital Signature Algorithm. After that, computes the signature for the generated hash value by encrypting it with the private VII .REFERENCES key. In the other side, the decryption is done by the public key but the result will be a hash value, and the hash value is [1] ―Security and high availability in cloud computing not reversible to its original data. environments‖, IBM Global Technology Services Technical There are three procedures in our model to satisfy the White Paper ,IBM ,June 2011 integrity concept: [2] M. Sudha, Dr.Bandaru Rama Krishna Rao, M. Monica--- 1- Digital signature part will be done by the user. A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment /International 2- The CS verifies over the user data in the cloud to check Journal of Computer Applications (0975 – 8887)Volume 12– over the manipulation or intrusions in the cloud data. No.8, December 2010 In next the paragraphs explanation for each entity function in [3] Ms. Rashmi A. Akojwar, Ms. Reshma V. Kothari, Mr. the proposed model: Sandip A. Kahate,Ms. Ruchika D. Ganvir- Software As A Service With Cloud Computing International 1- User: User first chose a random parameter to construct the Journal of Electronics Communication and Computer public and the private keys then heshe will sign the data Engineering Volume 3, Issue 1, ISSN: 2249 –071X 492 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [4] U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology-DIGITAL SIGNATURE STANDARD (DSS) [5] Digital signature with message recovery Using self-certified public keys and its variantsYuh-Min Tseng, Jinn-Ke Jan, Hung-Yu Chien [6] YANG Xiaoyuan1, ZHU Shuaishuai, PAN Xiaozhong- [7] Cong Wang, Qian Wang and Kui Ren. ―Ensuring Data Storage Security in Cloud computing‖ 978-1-4244-3876- 1/2009 IEEE. [8] John Harauz, Lori M. Kaufman and Bruce Potter, ―Data security in the world of cloud computing ―,2009 IEEE CO Published by the IEEE Computer and Reliability Societies. [9] Siani Pearson, ―Taking account of Privacy when Designing Cloud computing Services‖ CLOUD’09, May 23, 2009, Vancouver, Canada, 2009 IEEE. [10] Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono, ―On Technical Security Issues in Cloud Computing‖, 2009 IEEE International Conference on Cloud Computing [11] Erica Brasher-Sims, ―SaaS Software as a Service‖, 2008 [12] Michael Gregg, ―10 Security Concerns for Cloud Computing‖, Expert Reference Series of White Papers, Global Knowledge, 010 493 All Rights Reserved © 2012 IJARCET