Download - Enhanced Dat Asecurity
-
7/29/2019 Enhanced Dat Asecurity
1/11
Enhanced Data Security
Model for Cloud
Computing
Presented By
-
7/29/2019 Enhanced Dat Asecurity
2/11
ABSTRACT
In cloud computing, both data and software are fully not
contained on the user's computer; Data Security concerns arising
because both user data and program are residing in Provider
Premises.
Every cloud provider solves this problem by encrypting the data
by using encryption algorithms. This paper investigates the basic
problem of cloud computing data security.
We present the data security model of cloud computing based on
the study of the cloud architecture. We improve data securitymodel for cloud computing.
In this paper we are presenting Three-layered security
mechanism.
-
7/29/2019 Enhanced Dat Asecurity
3/11
EXISTING SYSTEMS
In cloud computing, both data and software are fully not
contained on the user's computer; Data Security concerns arising
because both user data and program are residing in Provider
Premises.
Clouds typically have single security architecture but have many
customers with different demands. Every cloud provider solves
this problem by encrypting the data by using encryption
algorithms
DISADVANTAGES OF EXISTING SYSTEM:
The management of the data and services may not be fully
trustworthy
-
7/29/2019 Enhanced Dat Asecurity
4/11
PROPOSED SYSTEM
This paper enhances data security model for cloud computing.
We propose a new data .security model based on studying of
cloud computing architecture. We Implement software to select
the suitable and the highest security encryption algorithm.
ADVANTAGES OF PROPOSED SYSTEM: Highly Secure
-
7/29/2019 Enhanced Dat Asecurity
5/11
MODULES
1. Three-layer system Construction module
2. Storage data Module
3. Transmission data Module
4. Processing data Module
-
7/29/2019 Enhanced Dat Asecurity
6/11
1. Three-layer system Construction module:
The model used three-layer system structure, in which
each floor performs its own duty to ensure that the data securityof cloud layers. The first layer: responsible for user
authentication, almost this is two factor authentication, but free
cloud providers use one factor as examples eyeos, cloudo, and
freezoha. The second layer: responsible for user's dataencryption, and protect the privacy of users through a certain
way by using one symmetric encryption algorithms. Also allow
protection from user. The third layer: The user data for fast
recovery this depends on the speed of decryption.
.
-
7/29/2019 Enhanced Dat Asecurity
7/11
We make improvement to data security model in cloud computing.We implement software to the cloud provider. This software is
implemented with two factor authentication. This software compares
between eight modem encryption algorithms. This comparison based on
Statistical Tests to get the most security algorithms. This software gets thefaster and the highest security algorithm based on cloud infrastructure. So
we proposed to cloud provider the suitable, more security encryption
algorithm to its platform.
2.Storage data Module
-
7/29/2019 Enhanced Dat Asecurity
8/11
3.Transmission data Module
In this module, Auditor views the all user data and
verifying data and also changed data. Auditor directly views
all user data without key. Admin provided the permission to
Auditor. After auditing data, store to the cloud.4. User Module
User store large amount of data to clouds and access data
using secure key. Secure key provided admin after encrypting
data. Encrypt the data using TPM. User store data afterauditor, view and verifying data and also changed data. User
again views data at that time admin provided the message to
user only changes data.
-
7/29/2019 Enhanced Dat Asecurity
9/11
HARDWARE REQUIREMENTSPROCESSOR : PENTIUM IV 2.6 GHz
RAM : 512 MB DD RAM
HARD DISK : 20 GB
-
7/29/2019 Enhanced Dat Asecurity
10/11
SOFTWARE REQUIREMENTSTechnology : Jsp,servlets
Tools Used : IDE(Eclipse)
Operating System : WindowsXP
-
7/29/2019 Enhanced Dat Asecurity
11/11
REFERENCE
1.C. Dwork, The Differential Privacy Frontier Extended
Abstract, Proc. 6th Theory of Cryptography Conf. (TCC 09),
LNCS 5444, Springer, 2009, pp. 496-502.
2. C. Gentry, Fully Homomorphic Encryption Using
Ideal
Lattices, Proc. 41st Ann. ACM Symp. Theory Computing
(STOC 09), ACM, 2009, pp. 169-178.
3. E. Naone, The Slow-Motion Internet, Technology Rev.,
Mar./Apr. 2011; www.technologyreview.com/files/54902/
GoogleSpeed_charts.pdf