+ All Categories
Home > Documents > Enhanced Dat Asecurity

Enhanced Dat Asecurity

Date post: 03-Apr-2018
Category:
Upload: smile2ali
View: 219 times
Download: 0 times
Share this document with a friend

of 11

Transcript
  • 7/29/2019 Enhanced Dat Asecurity

    1/11

    Enhanced Data Security

    Model for Cloud

    Computing

    Presented By

  • 7/29/2019 Enhanced Dat Asecurity

    2/11

    ABSTRACT

    In cloud computing, both data and software are fully not

    contained on the user's computer; Data Security concerns arising

    because both user data and program are residing in Provider

    Premises.

    Every cloud provider solves this problem by encrypting the data

    by using encryption algorithms. This paper investigates the basic

    problem of cloud computing data security.

    We present the data security model of cloud computing based on

    the study of the cloud architecture. We improve data securitymodel for cloud computing.

    In this paper we are presenting Three-layered security

    mechanism.

  • 7/29/2019 Enhanced Dat Asecurity

    3/11

    EXISTING SYSTEMS

    In cloud computing, both data and software are fully not

    contained on the user's computer; Data Security concerns arising

    because both user data and program are residing in Provider

    Premises.

    Clouds typically have single security architecture but have many

    customers with different demands. Every cloud provider solves

    this problem by encrypting the data by using encryption

    algorithms

    DISADVANTAGES OF EXISTING SYSTEM:

    The management of the data and services may not be fully

    trustworthy

  • 7/29/2019 Enhanced Dat Asecurity

    4/11

    PROPOSED SYSTEM

    This paper enhances data security model for cloud computing.

    We propose a new data .security model based on studying of

    cloud computing architecture. We Implement software to select

    the suitable and the highest security encryption algorithm.

    ADVANTAGES OF PROPOSED SYSTEM: Highly Secure

  • 7/29/2019 Enhanced Dat Asecurity

    5/11

    MODULES

    1. Three-layer system Construction module

    2. Storage data Module

    3. Transmission data Module

    4. Processing data Module

  • 7/29/2019 Enhanced Dat Asecurity

    6/11

    1. Three-layer system Construction module:

    The model used three-layer system structure, in which

    each floor performs its own duty to ensure that the data securityof cloud layers. The first layer: responsible for user

    authentication, almost this is two factor authentication, but free

    cloud providers use one factor as examples eyeos, cloudo, and

    freezoha. The second layer: responsible for user's dataencryption, and protect the privacy of users through a certain

    way by using one symmetric encryption algorithms. Also allow

    protection from user. The third layer: The user data for fast

    recovery this depends on the speed of decryption.

    .

  • 7/29/2019 Enhanced Dat Asecurity

    7/11

    We make improvement to data security model in cloud computing.We implement software to the cloud provider. This software is

    implemented with two factor authentication. This software compares

    between eight modem encryption algorithms. This comparison based on

    Statistical Tests to get the most security algorithms. This software gets thefaster and the highest security algorithm based on cloud infrastructure. So

    we proposed to cloud provider the suitable, more security encryption

    algorithm to its platform.

    2.Storage data Module

  • 7/29/2019 Enhanced Dat Asecurity

    8/11

    3.Transmission data Module

    In this module, Auditor views the all user data and

    verifying data and also changed data. Auditor directly views

    all user data without key. Admin provided the permission to

    Auditor. After auditing data, store to the cloud.4. User Module

    User store large amount of data to clouds and access data

    using secure key. Secure key provided admin after encrypting

    data. Encrypt the data using TPM. User store data afterauditor, view and verifying data and also changed data. User

    again views data at that time admin provided the message to

    user only changes data.

  • 7/29/2019 Enhanced Dat Asecurity

    9/11

    HARDWARE REQUIREMENTSPROCESSOR : PENTIUM IV 2.6 GHz

    RAM : 512 MB DD RAM

    HARD DISK : 20 GB

  • 7/29/2019 Enhanced Dat Asecurity

    10/11

    SOFTWARE REQUIREMENTSTechnology : Jsp,servlets

    Tools Used : IDE(Eclipse)

    Operating System : WindowsXP

  • 7/29/2019 Enhanced Dat Asecurity

    11/11

    REFERENCE

    1.C. Dwork, The Differential Privacy Frontier Extended

    Abstract, Proc. 6th Theory of Cryptography Conf. (TCC 09),

    LNCS 5444, Springer, 2009, pp. 496-502.

    2. C. Gentry, Fully Homomorphic Encryption Using

    Ideal

    Lattices, Proc. 41st Ann. ACM Symp. Theory Computing

    (STOC 09), ACM, 2009, pp. 169-178.

    3. E. Naone, The Slow-Motion Internet, Technology Rev.,

    Mar./Apr. 2011; www.technologyreview.com/files/54902/

    GoogleSpeed_charts.pdf


Recommended