SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 225
ENHANCED SECURITY FRAMEWORK TO ENSURE DATA SECURITY
IN CLOUD USING SECURITY BLANKET ALGORITHM
Sanjeev Kumar Mandal1
, Farzeen Basith2
1
Post Graduate student, 2
Assistant Professor, Department of MCA, Acharya Institute of Technology, Karnataka, India,
sanjeev.mandal93@gmail.com, farzeen107@gmail.com
Abstract
Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and
confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized
entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend
using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames
and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person
using Security blanket algorithm.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is a paradigm of computing, a new way of
thinking about IT industry but not any specific technology. It
is a paradigm shift whereby details are abstracted from the
users who no longer need knowledge of, expertise in, or
control over the technology infrastructure "in the cloud" that
supports them.
The main concept of cloud computing services is that these
services are carried out on behalf of users with hardware that
the customers do not own or operate. The user inputs data to
the cloud, the data are processed by the cloud service provider
according to the instructions of the user, and the output is
delivered back to the user.
1.1 Service Models
The cloud computing service models are Software as a Service
(SaaS), Platform as a Service (PaaS) and Infrastructure as a
Service (IaaS). In Software as a Service model, a pre-made
application, along with any required software, operating
system, hardware, and network are provided. In PaaS, an
operating system, hardware, and network are provided, and the
customer installs or develops its own software and
applications. The IaaS model provides just the hardware and
network; the customer installs or develops its own operating
systems, software and applications.
1.2 Cloud Services
Cloud services are typically made available via a private
cloud, community cloud, public cloud or hybrid cloud.
Generally speaking, services provided by a public cloud are
offered over the Internet and are owned and operated by a
cloud provider. Some examples include services aimed at the
general public, such as online photo storage services, e-mail
services, or social networking sites. However, services for
enterprises can also be offered in a public cloud.In a private
cloud, the cloud infrastructure is operated solely for a specific
organization, and is managed by the organization or a third
party. In a community cloud, the service is shared by several
organizations and made available only to those groups. The
infrastructure may be owned and operated by the
organizations or by a cloud service provider. A hybrid cloud is
a combination of different methods of resource pooling (for
example, combining public and community clouds).
1.3 Security
Security refers to confidentiality, integrity and availability,
which pose major issues for cloud vendors. Confidentiality
refers to who stores the encryption keys - data from company
A, stored in an encrypted format at company B must be kept
secure from employees of B; thus, the client company should
own the encryption keys. From the perspective of data
security, which has always been an important aspect of quality
of service, Cloud Computing inevitably poses new challenging
security threats for number of reasons. Traditional
cryptographic primitives for the purpose of data security
protection cannot be directly adopted due to the users’ loss
control of data under Cloud Computing. Therefore,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 226
verification of correct data storage in the cloud must be
conducted without explicit knowledge of the whole data.
Recently, the importance of ensuring the remote data integrity
has been highlighted by the following research works [1]–[2].
These techniques, while can be useful to ensure the storage
correctness without having users possessing data, cannot
address all the security threats in cloud data storage, since they
are all focusing on single server scenario and most of them do
not consider dynamic data operations.
2. LITERATURE REVIEW
While coming with this paper we had visited many small scale
industries and companies those are recently using cloud
services for outsourcing there confidential data over the cloud
and are suffering with some problems while exchanging keys
and accessing the services. They are also worried about the
recent security techniques, which are currently available. For
this paper we have refer the technical paper on Secure Data
Access over Cloud Computing and Secure Data Access in
Cloud Computing.
Data outsourcing in Cloud Computing is fast becoming
economically viable for large enterprises. In fact,this data
outsourcing is ultimately retrieving user’s control over its own
data and does not provide any assurance on data integrity and
availability. On behalf of cloud user, a third party auditor
(TPA) who has resources and experience that a user does not
have can be emplaced to audit the integrity of large data
storage. But user data privacy is still exposed to a TPA, which
is required to be secured against unauthorized leakage.
Wang and Sherman et al. [3] have proposed a public auditing
system of data storage security by developing a privacy
preserving auditing protocol. By which auditor can audit
without having knowledge of user’s data contents. Wang and
Sherman also proposed a batch auditing protocol where
multiple auditing tasks from different users can be performed
simultaneously by a TPA. A public auditing scheme consisting
four algorithms (KeyGen, SigGen, GenProof, VerifyProof)
has been used. KeyGen is run by the user to set up the scheme.
SigGen is used to generate verification metadata. GenProof is
executed by Cloud Server to provide a proof of data storage
correctness. VerifyProof is run by TPA to audit the proof from
Cloud Server.
“Enabling Public Vefiraibility and Data Dynamics for Storage
Security in Cloud Computing (2009)” describes that “Cloud
Computing has been envisioned as the next generation
architecture of IT Enterprise. It moves the application software
and databases to the centralized large data centers, where the
management of the data and services may not be fully
trustworthy. This unique paradigm brings about many new
security challenges, which have not been well understood.
This work studies the problem of ensuring the integrity of data
storage in Cloud Computing. We first identify the difficulties
and potential security problems of direct extensions with fully
dynamic data updates from prior works and then show how to
construct an elegant verification scheme for seamless
integration of these two salient features in our protocol design.
Achieving Secure, Scalable, and Fine-grained Data Access
Control in Cloud Computing
This paper proposed some services for data security and
access control when users outsource sensitive data for sharing
on cloud servers. This paper addresses this challenging open
issue by, on one hand, defining and enforcing access policies
based on data attributes, and on the other hand allowing the
data owner to delegate most of the computation tasks involved
in fine grained data access control to untrusted cloud servers
without disclosing the underlying data contents. This scheme
enables the data owner to delegate tasks of data file re-
encryption and user secret key update to cloud servers without
disclosing data contents or user access privilege information.
This goal can be achieved by exploiting and uniquely
combining techniques of attribute-based encryption (ABE),
proxy re-encryption, and lazy re-encryption [4].
3. PROBLEM STATEMENT
Authentication is the process of determining whether someone
or something is, in fact, who or what it is declared to be. In
private and public computer networks (including the Internet),
authentication is commonly done through the use of logon
passwords. Knowledge of the password is assumed to
guarantee that the user is authentic. Each user registers
initially (or is registered by someone else), using an assigned
or self-declared password. On each subsequent use, the user
must know and use the previously declared password. The
weakness in this system for transactions that are significant
(such as the exchange of money) is that passwords can often
be stolen, accidentally revealed, or forgotten.
3.1 User:
User, who have data to be stored in the cloud and rely on the
cloud for data computation, consists of both individual
consumer and organization and want access to cloud server for
doing job with effect of Security blanket algorithm
3.2 Cloud service provider (CSP):
Cloud service providers offer cloud solutions, like Google
Apps, that are delivered electronically over the internet.
Unlike a managed service provider, cloud service providers do
not sell or install hardware – everything they offer is stored
online and accessible securely from anywhere. There are many
advantages to working with a cloud service provider like
Cloud Sherpas when switching from your old email and
collaboration software.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 227
3.3 Authentication Service AS:
An authentication service that knows the password of all users
and stores these in a centralized database in addition, the AS
shares a unique secret key with each server.
Figure 1: Authentication using Security blanket algorithm
4. PROPOSED METHOD
Security blanket algorithm is a new password manager that
can best be described as a mix of Roboform and LastPass.
With Security blanket algorithm users have the ability to
securely store their logins. These logins can then be kept
locally on your computer only or synced with your Security
blanket algorithm account and accessible on any computer or
device that you install Security blanket algorithm on.
Currently Windows, Mac OS X, Android, and iOS are
supported by Security blanket algorithm so with the sync
feature you could potentially have your logins on every
computer or device you use.
Figure 2: Security blanket algorithm Server-AWS
All communications between the Security blanket algorithm
application and the Security blanket algorithm servers are
secured with HTTPS. HTTPS connections on the client side
are performed using OpenSSL.
The HTTPS communications between Security blanket
algorithm application and Security blanket algorithm’s servers
are using SSLv3, TLS_RSA_WITH_AES_256_CBC_SHA
connections.
SSL protocol main steps are as follows:
• The client and the server negotiate to choose the best
cipher and hash algorithm available on both sides.
• The server sends his digital certificate.
• The client verifies the certificate by contacting a
Certificate Authority.
• The client encrypts a random number with the
server’s public key, and sends it to the server.
• The server decrypts this number, and both sides use
this number to generate a symmetric key, used to
encrypt and decrypt data.
Finally, communication between the Security blanket
algorithm Browser Plug-in and the Security blanket algorithm
Application is secured using with AES 256 with the OpenSSL
library:
• A 32 bytes salt is generated using the OpenSSL
RAND_bytes function (ciphering) or reading it from
the inter process message (deciphering) The Security
blanket algorithm Private Key is used, with the salt,
to generate the AES 256 bit key that will be used for
(de)ciphering. This generation is performed using the
OpenSSL EVP_BytesToKey, using SHA1, with 5
iterations.
• The 32 bytes initialization vector is generated with
the OpenSSL EVP_BytesToKey function, using
SHA1 .
• Then, the data is (de)ciphered using CBC mode.
• When ciphering, the salt is written on inter process
message.
5. IMPLEMENTATION
• Allows users to store unlimited logins (usernames
and passwords).
• Logins can be sorted into specific categories, e.g.
email or social media.
• Has excellent browser integration — supports
Firefox, Chrome, and Internet Explorer.
• In addition to logins, users can store credit card
numbers, bank accounts, contacts, social security
numbers, tax ids, and more.
• UPDATE: It looks like notes are only available in
Premium (paid version) now.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 228
• Has an optional built-in receipt tracker to help you
keep track of your purchases, online or offline.
• Has a built-in tool that tells you how strong your
passwords are.
• Can generate random passwords.
• Secures data with AES 256 encryption.
Has the ability to sync data across Security blanket algorithm
on all computers and devices — Windows, Mac OS X,
Android, and iOS
• Sync is optional — users can opt to keep data stored
locally only.
• Has the ability to import data from LastPass,
Roboform, KeePass, Password Wallet, 1Password,
Chrome, Firefox, and Internet Explorer.
Has a web version for access to your logins when at a
computer which doesn’t have Security blanket algorithm
installed.
6. RESULT AND EVOLUTION
The initial registration for a user follows the flow described
Figure 3: Authentication flow during registration.
As can be seen in Figure 3, the User Master Password is never
user to perform Server Authentication, and the only keys
stored on our servers are the User Device keys.
Figure 4: Two-Factor authentication
When adding a second device, the important point is that
Security blanket algorithm needs to make sure the user
adding the additional device is indeed the legitimate owner of
the account. This is to gain additional protection in the event
the user Master Password has been compromised and an
attacker who does not have access to his already enabled
device is trying to access the account from another device.
As shown on Figure 4, when a user is attempting to connect to
a Security blanket algorithm account on a device that has not
yet been authorized for this account, Security blanket
algorithm generates a One-Time Password (a Token) that is
being sent to the user either to the email address used to create
the Security blanket algorithm account initially, or by text
message to the user’s mobile phone if the user has chosen to
provide his mobile phone number.
In order to enable the new device, the user has to enter both
his User Master Password and the Token. Only after this Two-
Factor authentication has been performed will Security blanket
algorithm servers start synchronizing the user data on the new
device. All communication is handled with HTTPS and the
user data only travels in AES-256 encrypted form. Please note
again that the user Master Password never transits on the
Internet.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 229
Even though what goes on in the background during the initial
registration steps is complex (See Figure 3) and highly secure,
the perception by the user could not be simpler. All he has to
do is to pick a (strong) User Master Password. All the other
keys are generated by the application without user
intervention.
When adding an additional device, the process is equally
simple, while remaining highly secure through the use of
Two-Factor authentication described in Figure 4.
CONCLUSIONS
Sensitive data storage on cloud platform is challenging while
adopting cloud services for data storage. Cryptographic keys
are sensitive data and required on cloud platform in different
cases but cannot store directly on cloud. This paper discuses
Security blanket algorithm key management on cloud based
environment. Security blanket algorithm is a new service that
does that, audits those passwords for strength, saves your form
information for quick entry on new web sites, and even keeps
track of the purchases you make with that information so you
can see it all in one view—one that's only available to you, not
even Security blanket algorithm employees.
REFERENCES
[1]. A. Juels and J. Burton S. Kaliski, “PORs: Proofs of
Retrievability for Large Files,” Proc. of CCS ’07, pp. 584–
597, 2007
[2]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik,
“Scalable and Efficient Provable Data Possession,” Proc. of
SecureComm ’08, pp. 1–10, 2008.
[3]. Wang, Sherman, Kui, Lou, “Privacy-Preserving Public
Auditing for Secure Cloud Storage", INFOCOM, 2010
Proceedings IEEE, 14-19March, 2010.
[4]. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure,
scalable, and fine-grained data access control in cloud
computing,” in IEEE INFOCOM'10, 2010.
[5] L. Chen, Gongde Guo “An Efficient Remote Data
Possession Checking in Cloud Storage”, Fujian Normal
University, vol. 5, no. 4, April 2011.
[6] Sheng Zhong and Zhuo Hao. “A Privacy-Preserving
Remote Data Integrity Checking Protocol with Data Dynamics
and Public Verifiability,” IEEE Internet Computing, 2010.
[7] Cong Wang, Kui Ren, Qian Wang and Wenjing Lou
"Towards Secure and Dependable Storage Services in Cloud
Computing," IEEE transactions on Services Computing, vol 5,
no. 3, pp 220-232, 2011.
BIOGRAPHIES
Post Graduate student Department of MCA,
Acharya Institute of Technology, Karnataka,
India,
Assistant Professor, Department of MCA,
Acharya Institute of Technology, Karnataka,
India. Teaching Experience: 9 year

Weitere ähnliche Inhalte

Was ist angesagt?

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 

Was ist angesagt? (18)

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
I42024349
I42024349I42024349
I42024349
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 

Andere mochten auch

Monitoring and control of grain storage using plc
Monitoring and control of grain storage using plcMonitoring and control of grain storage using plc
Monitoring and control of grain storage using plceSAT Publishing House
 
An image crawler for content based image retrieval
An image crawler for content based image retrievalAn image crawler for content based image retrieval
An image crawler for content based image retrievaleSAT Publishing House
 
Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...eSAT Publishing House
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fieSAT Publishing House
 
Analysis of rc bridge decks for selected national and internationalstandard l...
Analysis of rc bridge decks for selected national and internationalstandard l...Analysis of rc bridge decks for selected national and internationalstandard l...
Analysis of rc bridge decks for selected national and internationalstandard l...eSAT Publishing House
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror serverseSAT Publishing House
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Publishing House
 
Three phase vienna rectifier for wind power generation system
Three phase vienna rectifier for wind power generation systemThree phase vienna rectifier for wind power generation system
Three phase vienna rectifier for wind power generation systemeSAT Publishing House
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofeSAT Publishing House
 
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...eSAT Publishing House
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocoleSAT Publishing House
 
Studies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityStudies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityeSAT Publishing House
 
Gps enabled android application for bus
Gps enabled android application for busGps enabled android application for bus
Gps enabled android application for buseSAT Publishing House
 
Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...eSAT Publishing House
 
Simulation and hardware implementation of change in
Simulation and hardware implementation of change inSimulation and hardware implementation of change in
Simulation and hardware implementation of change ineSAT Publishing House
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataeSAT Publishing House
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Publishing House
 

Andere mochten auch (20)

Monitoring and control of grain storage using plc
Monitoring and control of grain storage using plcMonitoring and control of grain storage using plc
Monitoring and control of grain storage using plc
 
An image crawler for content based image retrieval
An image crawler for content based image retrievalAn image crawler for content based image retrieval
An image crawler for content based image retrieval
 
Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
Analysis of rc bridge decks for selected national and internationalstandard l...
Analysis of rc bridge decks for selected national and internationalstandard l...Analysis of rc bridge decks for selected national and internationalstandard l...
Analysis of rc bridge decks for selected national and internationalstandard l...
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
Three phase vienna rectifier for wind power generation system
Three phase vienna rectifier for wind power generation systemThree phase vienna rectifier for wind power generation system
Three phase vienna rectifier for wind power generation system
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
 
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...
Analysis of aerodynamic characteristics of a supercritical airfoil for low sp...
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocol
 
Studies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityStudies on seasonal variation of ground water quality
Studies on seasonal variation of ground water quality
 
Gps enabled android application for bus
Gps enabled android application for busGps enabled android application for bus
Gps enabled android application for bus
 
Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...Integration of artificial intelligence control to the unified power quality c...
Integration of artificial intelligence control to the unified power quality c...
 
Simulation and hardware implementation of change in
Simulation and hardware implementation of change inSimulation and hardware implementation of change in
Simulation and hardware implementation of change in
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and data
 
Embedded wrist watch
Embedded wrist watchEmbedded wrist watch
Embedded wrist watch
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 

Ähnlich wie Enhanced security framework to ensure data security

Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 

Ähnlich wie Enhanced security framework to ensure data security (20)

Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
G033030035
G033030035G033030035
G033030035
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
L04302088092
L04302088092L04302088092
L04302088092
 
50120140503020
5012014050302050120140503020
50120140503020
 
R180203114117
R180203114117R180203114117
R180203114117
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
V04405122126
V04405122126V04405122126
V04405122126
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Kürzlich hochgeladen (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Enhanced security framework to ensure data security

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 225 ENHANCED SECURITY FRAMEWORK TO ENSURE DATA SECURITY IN CLOUD USING SECURITY BLANKET ALGORITHM Sanjeev Kumar Mandal1 , Farzeen Basith2 1 Post Graduate student, 2 Assistant Professor, Department of MCA, Acharya Institute of Technology, Karnataka, India, sanjeev.mandal93@gmail.com, farzeen107@gmail.com Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cloud computing is a paradigm of computing, a new way of thinking about IT industry but not any specific technology. It is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. The main concept of cloud computing services is that these services are carried out on behalf of users with hardware that the customers do not own or operate. The user inputs data to the cloud, the data are processed by the cloud service provider according to the instructions of the user, and the output is delivered back to the user. 1.1 Service Models The cloud computing service models are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). In Software as a Service model, a pre-made application, along with any required software, operating system, hardware, and network are provided. In PaaS, an operating system, hardware, and network are provided, and the customer installs or develops its own software and applications. The IaaS model provides just the hardware and network; the customer installs or develops its own operating systems, software and applications. 1.2 Cloud Services Cloud services are typically made available via a private cloud, community cloud, public cloud or hybrid cloud. Generally speaking, services provided by a public cloud are offered over the Internet and are owned and operated by a cloud provider. Some examples include services aimed at the general public, such as online photo storage services, e-mail services, or social networking sites. However, services for enterprises can also be offered in a public cloud.In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the organization or a third party. In a community cloud, the service is shared by several organizations and made available only to those groups. The infrastructure may be owned and operated by the organizations or by a cloud service provider. A hybrid cloud is a combination of different methods of resource pooling (for example, combining public and community clouds). 1.3 Security Security refers to confidentiality, integrity and availability, which pose major issues for cloud vendors. Confidentiality refers to who stores the encryption keys - data from company A, stored in an encrypted format at company B must be kept secure from employees of B; thus, the client company should own the encryption keys. From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. Traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore,
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 226 verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Recently, the importance of ensuring the remote data integrity has been highlighted by the following research works [1]–[2]. These techniques, while can be useful to ensure the storage correctness without having users possessing data, cannot address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. 2. LITERATURE REVIEW While coming with this paper we had visited many small scale industries and companies those are recently using cloud services for outsourcing there confidential data over the cloud and are suffering with some problems while exchanging keys and accessing the services. They are also worried about the recent security techniques, which are currently available. For this paper we have refer the technical paper on Secure Data Access over Cloud Computing and Secure Data Access in Cloud Computing. Data outsourcing in Cloud Computing is fast becoming economically viable for large enterprises. In fact,this data outsourcing is ultimately retrieving user’s control over its own data and does not provide any assurance on data integrity and availability. On behalf of cloud user, a third party auditor (TPA) who has resources and experience that a user does not have can be emplaced to audit the integrity of large data storage. But user data privacy is still exposed to a TPA, which is required to be secured against unauthorized leakage. Wang and Sherman et al. [3] have proposed a public auditing system of data storage security by developing a privacy preserving auditing protocol. By which auditor can audit without having knowledge of user’s data contents. Wang and Sherman also proposed a batch auditing protocol where multiple auditing tasks from different users can be performed simultaneously by a TPA. A public auditing scheme consisting four algorithms (KeyGen, SigGen, GenProof, VerifyProof) has been used. KeyGen is run by the user to set up the scheme. SigGen is used to generate verification metadata. GenProof is executed by Cloud Server to provide a proof of data storage correctness. VerifyProof is run by TPA to audit the proof from Cloud Server. “Enabling Public Vefiraibility and Data Dynamics for Storage Security in Cloud Computing (2009)” describes that “Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and on the other hand allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to untrusted cloud servers without disclosing the underlying data contents. This scheme enables the data owner to delegate tasks of data file re- encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. This goal can be achieved by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption [4]. 3. PROBLEM STATEMENT Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten. 3.1 User: User, who have data to be stored in the cloud and rely on the cloud for data computation, consists of both individual consumer and organization and want access to cloud server for doing job with effect of Security blanket algorithm 3.2 Cloud service provider (CSP): Cloud service providers offer cloud solutions, like Google Apps, that are delivered electronically over the internet. Unlike a managed service provider, cloud service providers do not sell or install hardware – everything they offer is stored online and accessible securely from anywhere. There are many advantages to working with a cloud service provider like Cloud Sherpas when switching from your old email and collaboration software.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 227 3.3 Authentication Service AS: An authentication service that knows the password of all users and stores these in a centralized database in addition, the AS shares a unique secret key with each server. Figure 1: Authentication using Security blanket algorithm 4. PROPOSED METHOD Security blanket algorithm is a new password manager that can best be described as a mix of Roboform and LastPass. With Security blanket algorithm users have the ability to securely store their logins. These logins can then be kept locally on your computer only or synced with your Security blanket algorithm account and accessible on any computer or device that you install Security blanket algorithm on. Currently Windows, Mac OS X, Android, and iOS are supported by Security blanket algorithm so with the sync feature you could potentially have your logins on every computer or device you use. Figure 2: Security blanket algorithm Server-AWS All communications between the Security blanket algorithm application and the Security blanket algorithm servers are secured with HTTPS. HTTPS connections on the client side are performed using OpenSSL. The HTTPS communications between Security blanket algorithm application and Security blanket algorithm’s servers are using SSLv3, TLS_RSA_WITH_AES_256_CBC_SHA connections. SSL protocol main steps are as follows: • The client and the server negotiate to choose the best cipher and hash algorithm available on both sides. • The server sends his digital certificate. • The client verifies the certificate by contacting a Certificate Authority. • The client encrypts a random number with the server’s public key, and sends it to the server. • The server decrypts this number, and both sides use this number to generate a symmetric key, used to encrypt and decrypt data. Finally, communication between the Security blanket algorithm Browser Plug-in and the Security blanket algorithm Application is secured using with AES 256 with the OpenSSL library: • A 32 bytes salt is generated using the OpenSSL RAND_bytes function (ciphering) or reading it from the inter process message (deciphering) The Security blanket algorithm Private Key is used, with the salt, to generate the AES 256 bit key that will be used for (de)ciphering. This generation is performed using the OpenSSL EVP_BytesToKey, using SHA1, with 5 iterations. • The 32 bytes initialization vector is generated with the OpenSSL EVP_BytesToKey function, using SHA1 . • Then, the data is (de)ciphered using CBC mode. • When ciphering, the salt is written on inter process message. 5. IMPLEMENTATION • Allows users to store unlimited logins (usernames and passwords). • Logins can be sorted into specific categories, e.g. email or social media. • Has excellent browser integration — supports Firefox, Chrome, and Internet Explorer. • In addition to logins, users can store credit card numbers, bank accounts, contacts, social security numbers, tax ids, and more. • UPDATE: It looks like notes are only available in Premium (paid version) now.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 228 • Has an optional built-in receipt tracker to help you keep track of your purchases, online or offline. • Has a built-in tool that tells you how strong your passwords are. • Can generate random passwords. • Secures data with AES 256 encryption. Has the ability to sync data across Security blanket algorithm on all computers and devices — Windows, Mac OS X, Android, and iOS • Sync is optional — users can opt to keep data stored locally only. • Has the ability to import data from LastPass, Roboform, KeePass, Password Wallet, 1Password, Chrome, Firefox, and Internet Explorer. Has a web version for access to your logins when at a computer which doesn’t have Security blanket algorithm installed. 6. RESULT AND EVOLUTION The initial registration for a user follows the flow described Figure 3: Authentication flow during registration. As can be seen in Figure 3, the User Master Password is never user to perform Server Authentication, and the only keys stored on our servers are the User Device keys. Figure 4: Two-Factor authentication When adding a second device, the important point is that Security blanket algorithm needs to make sure the user adding the additional device is indeed the legitimate owner of the account. This is to gain additional protection in the event the user Master Password has been compromised and an attacker who does not have access to his already enabled device is trying to access the account from another device. As shown on Figure 4, when a user is attempting to connect to a Security blanket algorithm account on a device that has not yet been authorized for this account, Security blanket algorithm generates a One-Time Password (a Token) that is being sent to the user either to the email address used to create the Security blanket algorithm account initially, or by text message to the user’s mobile phone if the user has chosen to provide his mobile phone number. In order to enable the new device, the user has to enter both his User Master Password and the Token. Only after this Two- Factor authentication has been performed will Security blanket algorithm servers start synchronizing the user data on the new device. All communication is handled with HTTPS and the user data only travels in AES-256 encrypted form. Please note again that the user Master Password never transits on the Internet.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 229 Even though what goes on in the background during the initial registration steps is complex (See Figure 3) and highly secure, the perception by the user could not be simpler. All he has to do is to pick a (strong) User Master Password. All the other keys are generated by the application without user intervention. When adding an additional device, the process is equally simple, while remaining highly secure through the use of Two-Factor authentication described in Figure 4. CONCLUSIONS Sensitive data storage on cloud platform is challenging while adopting cloud services for data storage. Cryptographic keys are sensitive data and required on cloud platform in different cases but cannot store directly on cloud. This paper discuses Security blanket algorithm key management on cloud based environment. Security blanket algorithm is a new service that does that, audits those passwords for strength, saves your form information for quick entry on new web sites, and even keeps track of the purchases you make with that information so you can see it all in one view—one that's only available to you, not even Security blanket algorithm employees. REFERENCES [1]. A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07, pp. 584– 597, 2007 [2]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008. [3]. Wang, Sherman, Kui, Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage", INFOCOM, 2010 Proceedings IEEE, 14-19March, 2010. [4]. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM'10, 2010. [5] L. Chen, Gongde Guo “An Efficient Remote Data Possession Checking in Cloud Storage”, Fujian Normal University, vol. 5, no. 4, April 2011. [6] Sheng Zhong and Zhuo Hao. “A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability,” IEEE Internet Computing, 2010. [7] Cong Wang, Kui Ren, Qian Wang and Wenjing Lou "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE transactions on Services Computing, vol 5, no. 3, pp 220-232, 2011. BIOGRAPHIES Post Graduate student Department of MCA, Acharya Institute of Technology, Karnataka, India, Assistant Professor, Department of MCA, Acharya Institute of Technology, Karnataka, India. Teaching Experience: 9 year