phase report
TRANSCRIPT
-
7/31/2019 Phase Report
1/22
Implementing Digital Signature with RSA to the Data on Cloud
1. PROBLEM DEFINITION
Cloud computing doesnt yet have a standard definition, but a good working description of
it is to say that clouds, or clusters of distributed computers, provide on-demand resources
and services over a network, usually the Internet, with the scale and reliability of a data
center. Cloud computing is the Concept Implemented to decipher the Daily Computing
Problems, likes of Hardware Software and Resource Availability unhurried by Computer
users. The prevalent Problem Associated with Cloud Computing is the Cloud security and
the appropriate Implementation of Cloud over the Network. This project is aimed to assess
Data Security in cloud through Public Key Cryptography Technique by the Implementation
of digital signature with RSA algorithm. The need for implementing cloud computing
technology is rising every day after day because of its unmatching benefits but the only
thing that is hindering the process is the security. This project is a step towards filling this
void area so as to increase performance and power of cloud computing. The future ahead
for cloud computing is wide open and so vast that we cant end up its applicative areas at
this moment as its applications go on increasing day by day by breaking challenging
hindrances coming its way. As the data in a cloud is an amalgum of data of its users and
clients, so it becomes the primary problem for us to resolve the confidentiality and integrity
issues of the data in cloud. Cloud computing doesn't exactly introduce new data security
concerns; in most cases, it just amplifies them. Putting data in the cloud potentially exposes
it to a larger audience, which is usually a good thing. But if the data exposed is meant to be
private, or only conditionally accessed, then the results could be catastrophic. The
fundamental issue with cloud computing is that it removes entrusted data from a developer
or system-admin's immediate control. Rather than being stored and managed locally, data in
the cloud is stored on distributed devices that could be located anywhere, and conceivably
accessed by anyone.
Even if your company can live with the fact of a decentralized, far away datastore, you'll
want your applications in the cloud to proceed with a modicum of data security. When you
start to think about data security, two important questions arise:
Is the data secured during transit?
Dept of PG Studies (CNE) VTU, Belgaum.
Page 1
-
7/31/2019 Phase Report
2/22
Implementing Digital Signature with RSA to the Data on Cloud
Is the data secured at rest?
Data in transitrelates to how data passes from one location to another one; that is, which
communication technology and infrastructure you're using. Data at restrelates to how
and how well your data is stored. If, for example, you store user names and passwords in
a database without encrypting them, then your data at rest is not secure.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 2
-
7/31/2019 Phase Report
3/22
Implementing Digital Signature with RSA to the Data on Cloud
2. SYNOPSIS
2.1 INTRODUCTION
What is cloud computing?
Cloud computing is the access to computers and their functionality via the Internet or a
local area network. Users of a cloud request this access from a set of web services that
manage a pool of computing resources (i.e., machines, network, storage, operating systems,
application development environments, application programs). When granted, a fraction of
the resources in the pool is dedicated to the requesting user until he or she releases them. It
is called cloud computing because the user cannot actually see or specify the physical
location and organization of the equipment hosting the resources they are ultimately
allowed to use. That is, the resources are drawn from a cloud of resources when they are
granted to a user and returned to the cloud when they are released. A cloud is a set of
machines and web services that implement cloud computing. Cloud computing, as the name
suggests, is a style of computing where dynamically scalable and often visualized resources
are provided as a service over the internet. These services can be consumed by any user
over a standard HTTP medium. The user doesn't need to have the knowledge, expertise, orcontrol over the technology infrastructure in the "cloud" that supports them. The name
cloud computing was inspired by the cloud symbol that's often used to represent the
Internet inflow charts and diagrams. The clouds denote the abstraction of the complex
infrastructure it conceals.
The diagram below displays the basic high-level layout of cloud computing, where the
provider would create their solution (software, infrastructure, or platform) on the internet
and one or more users can consume that service "on demand".
Dept of PG Studies (CNE) VTU, Belgaum.
Page 3
-
7/31/2019 Phase Report
4/22
Implementing Digital Signature with RSA to the Data on Cloud
How are clouds classified?
Given the broad definition of the term cloud, the current taxonomy differentiates clouds
both in terms of cloud service offerings and cloud types. When categorizing cloud service
offerings we often refer to clouds in terms of service style depending on the portion of
the software stack delivered as a service. Here we discuss the most common service styles
referred to by the acronyms IaaS, PaaS, and SaaS. Cloud types (including public,
private, and hybrid) refer to the nature of access and control with respect to use and
provisioning of virtual and physical resources.
What are the most popular cloud service styles?
IaaS
IaaS (Infrastructure as a Service) style clouds provide access to collections of
virtualized computer hardware resources, including machines, network, and storage.
With IaaS, users assemble their own virtual cluster on which they are responsible
for installing, maintaining, and executing their own software stack.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 4
-
7/31/2019 Phase Report
5/22
Implementing Digital Signature with RSA to the Data on Cloud
PaaS
PaaS (Platform as a Service) style clouds provide access to a programming or
runtime environment with scalable compute and data structures embedded in it.
With PaaS, users develop and execute their own applications within an environment
offered by the service provider.
SaaS
SaaS (Software as a Service) style clouds deliver access to collections of software
application programs. SaaS providers offer users access to specific application
programs controlled and executed on the provider's infrastructure. SaaS is often
referred to as Software on Demand.
What are cloud types?
Public cloud
Public clouds provide access to computing resources for the general public over the
Internet. The public cloud provider allows customers to self-provision resources
typically via a web service interface. Customer's rent access to resources as needed
on a pay-as-you-go basis. Public clouds offer access to large pools of scalable
resources on a temporary basis without the need for capital investment in data
center infrastructure.
Private cloud
Private clouds give users immediate access to computing resources hosted within an
organization's infrastructure. Users self-provision and scale collections of resources
drawn from the private cloud, typically via web service interface, just as with a
Dept of PG Studies (CNE) VTU, Belgaum.
Page 5
-
7/31/2019 Phase Report
6/22
Implementing Digital Signature with RSA to the Data on Cloud
public cloud. However, because it is deployed within the organization's existing
data centerand behind the organization's firewalla private cloud is subject to
the organization's physical, electronic, and procedural security measures and thus
offers a higher degree of security over sensitive code and data. In addition, private
clouds consolidate and optimize the performance of physical hardware through
virtualization, and can thus markedly improve data center efficiency while reducing
operational expense.
Hybrid cloud
A hybrid cloud combines computing resources (e.g., machines, network, storage,
etc.) drawn from one or more public clouds and one or more private clouds at the
behest of its users.
Why Cloud Computing?
Cloud computing is seen by some as an important forward-looking model for the
distribution and access of computing resources because it offers these potential advantages:
Self-service provisioning: Allows users to deploy their own sets of computing
resources (machines, network, storage, etc.) as needed without the delays and
complications typically involved in resource acquisition; IT supports ongoing
customization and enhancement of cloud user experience, while monitoring,
managing, and expanding as required the underlying cloud infrastructure.
Scalability: Decouples the fluctuating needs of individual users from typical
infrastructure constraints, thus easily accommodating rapid increases or decreases in
resource demand.
Reliability and fault-tolerance: IT can focus on improving critical pieces of
infrastructure to achieve pre-determined levels of reliability. Policies addressing
expected levels of reliability can be continuously reassessed and updated without
user involvement.
Optimization/Consolidation: Maximizes the usage and increases the efficiency of
existing infrastructure resources. Extends infrastructure lifecycle. Reduces capital
expenditure.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 6
-
7/31/2019 Phase Report
7/22
Implementing Digital Signature with RSA to the Data on Cloud
QoS (Quality of Service): Allows IT to dynamically reassess the SLA associated
with users or groups of users for the resources allocated. Allows the organization to
react quickly to changing conditions without unnecessary user involvement or
knowledge.
Well defined API: Using a well-defined and stable industry standard API avoids
lock-in and ensures interoperability with an ever-growing number of tools and
cloud service providers.
As-needed availability: Aligns resource expenditure with actual resource usage thus
allowing the organization to pay only for the resources required, when they are
required.
Implementing Digital Signature with RSA Encryption Algorithm to
Enhance the Data Security of Cloud in Cloud Computing
The cloud is a next generation platform that provides dynamic resource pools,
virtualization, and high availability. Today, we have the ability to utilize scalable,
distributed computing environments within the confines of the Internet, a practice known as
cloud computing. Cloud computing is the Concept Implemented to decipher the Daily
Computing Problems, likes of Hardware, Software and Resource Availability unhurried by
Computer users. The cloud Computing provides an undemanding and Non ineffectual
Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is
the Cloud security and the appropriate Implementation of Cloud over the Network. Good
research is being done to assess Cloud Storage Methodology and Data Security in cloud by
the Implementation of digital signature with RSA algorithm. Cloud computing is the
Internet based development and is used in computer technology. It has become an IT
buzzword for the past a few years. Cloud computing has been often used with synonymous
terms such as software as a service (SaaS), grid computing, cluster computing, autonomic
computing, and utility computing . SaaS is only a special form of services that cloud
computing provides. Grid computing and cluster computing are two types of underlying
computer technologies for the development of cloud computing. It is often difficult to
define the cloud computing. Computing is a virtual pool of computing resources. It
provides computing resources in the pool for users through internet. It provides a
mandatory application programming environment. It can deploy, allocate or reallocate
computing resource dynamically and monitor the usage of resources at all times Cloud
Dept of PG Studies (CNE) VTU, Belgaum.
Page 7
-
7/31/2019 Phase Report
8/22
Implementing Digital Signature with RSA to the Data on Cloud
computing collects all the computing resources and manages them automatically through
software. In the process of data analysis, it integrates the history data and present data to
make the collected information more accurate and provide more intelligent service for users
and enterprises. The users need not care how to buy servers, software solutions and so on.
Users can buy the computing resource through internet according to their own needs. Cloud
computing does not depend on special data center, but we can look it as the inevitable
product of grid computing and efficiency computing. Cloud computing is easy to extend,
and has a simple management style. Cloud is not only simply collecting the computer
resource, but also provides a management mechanism and can provide services for millions
of users simultaneously. Organizations can provide hardware for clouds internally (internal
clouds), or a third party can provide it externally (hosted clouds). A cloud might be
restricted to a single organization or group (private clouds), available to the general public
over the Internet (public clouds), or shared by multiple groups or organizations (hybrid
clouds).
Characteristics of Cloud Computing
1 Ultra large-scale: The scale of cloud is large. The cloud of Google has owned more than
one million servers. Even in Amazon, IBM, Microsoft, Yahoo, they have more than
hundreds of thousands servers. There are hundreds of servers in an enterprise.
2.Virtualization:Cloud computing makes user to get service anywhere, through any kind
of terminal. You can complete all you want through net service using a notebook PC or a
mobile phone. Users can attain or share it safely through an easy way, anytime, anywhere.
Users can
complete a task that cant be completed in a single computer.
3 High reliability: Cloud uses data multitranscript fault tolerant, the computation node
isomorphism exchangeable and so on to ensure the high reliability of the service. Using
cloud computing is more reliable than local computer.
4 Versatility: Cloud computing can produce various applications supported by cloud, and
one cloud can support different applications running it at the same time.
5. High extendibility: The scale of cloud can extend dynamically to meet the increasingly
requirement.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 8
-
7/31/2019 Phase Report
9/22
Implementing Digital Signature with RSA to the Data on Cloud
6. On demand service: Cloud is a large resource pool that you can buy according to your
need; cloud is just like running water, electric, and gas that can be charged by the amount
that you used.
7. Extremely inexpensive: The centered management of cloud make the enterprise neednt
undertake the management cost of data center that increase very fast. The versatility can
increase the utilization rate of the available resources compared with traditional system, so
users can fully enjoy the low cost advantage. Various application and advantage of cloud
computing are listed
below:
1 Cloud computing do not need high quality equipment for user, and it is easy to use.
2 Cloud computing provides dependable and secure data storage center. You dont worry
the problems such as data loss or virus
3 Cloud computing can realize data sharing between different equipments.
4 Cloud provides nearly infinite possibility for users to use internet.
RSA Algorithm
The RSA algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who
invented it in 1977. The basic technique was first discovered in 1973 by Clifford Cocks of
CESG (part of the British GCHQ) but this was a secret until 1997. The patent taken out by
RSA Labs has expired.
The RSA cryptosystem is the most widely-used public key cryptography algorithm in the
world. It can be used to encrypt a message without the need to exchange a secret key
separately. The RSA algorithm can be used for both public key encryption and digital
signatures. Its security is based on the difficulty of factoring large integers. Party A can
send an encrypted message to party B without any prior exchange of secret keys. A just
uses B's public key to encrypt the message and B decrypts it using the private key, which
only he knows. RSA can also be used to sign a message, so A can sign a message using
their private key and B can verify it using A's public key.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 9
-
7/31/2019 Phase Report
10/22
Implementing Digital Signature with RSA to the Data on Cloud
2.2 DIGITAL SIGNATURE WITH RSA ENCRYPTION
ALGORITHM TO ENHANCE DATA SECURITY IN CLOUD
In Cloud computing, we have problem like security of data, files system, backups, network
traffic, host security .Here we are proposing a concept of digital signature with RSA
algorithm, to encrypting the data while we are transferring it over the network. .A digital
signature or digital signature scheme is a mathematical scheme for demonstrating the
authenticity of a digital message or document. A valid digital signature gives a recipient
reason to believe that the message was created by a known sender, and that it was not
altered in transit. We proposed digital signature with RSA algorithm scheme to ensure the
security of data in cloud. RSA is probably the most recognizable asymmetric algorithm.
RSA was created by Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. Till now, it is
the only asymmetric (i.e. needs two different keys) algorithm used for private/public key
generation and encryption. We include both digital signature scheme and public key
cryptography to enhance the security of cloud computing. In Digital Signature, software
will crunch down the data, document into just a few lines by a using hashing algorithm".
These few lines are called a message digest. Software then encrypts the message digest
with his private key. Then it will produce digital signature .Software will Decrypt the
digital signature into message digest with public key of senders and his/her own private
key. We are using Digital signatures so that we are able to distribute software, financial
transactions, over the network and in other cases where it is important to detect forgery and
tampering.
Proposed Internal Working
Steps Taken in Digital Signature with RSA Algorithm
Let us assume we have two enterprises A and B. An enterprise A have a public cloud with
data, softwares and applications. .Company B wants a secure data from As Cloud .We are
here, trying to send a secure data to B by using Digital signature with RSA algorithm. We
are taking some steps to implementing Digital signature with RSA encryption algorithm.
Suppose Alice is an employee of an enterprise A and Bob is an employee of a company B.
Step1.Alice takes a document from cloud, which Bob wants.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 10
-
7/31/2019 Phase Report
11/22
Implementing Digital Signature with RSA to the Data on Cloud
Step2.The document will crunched into few lines by using some Hash function the hash
value is referred as message digest.
Step 3. Alice software then encrypts the message digest with his private key. The result is
the digital signature.
Step 4. Using RSA Algorithm, Alice will encrypt digitally signed signature with bobs
public key and Bob will decrypt the cipher text to plain text with his private key and Alice
public key for verification of signature.
Proposed Algorithm taken for Implementing Digital Signature with
RSA Algorithm
In this algorithm, n is known as the modulus. e is known as the encryption exponent. d is
known as thesecret exponentordecryption exponent.
Step 1. Key Generation Algorithm
1. Choose two distinct large random prime numbersp and q
2. Compute n =p q, where n is used as the modulus for both the public and private keys
3. Compute the totient: phi (n) = (p !1) (q !1)
4. Choose an integere such that 1 < e < phi (n), and e andphi(n) share no factors other than
1 , where e is released as the public key exponent
5. Compute dto satisfy the congruence relation d e = 1 modulusphi (n); dis kept as the
private key exponent
6.The public key is (n, e) and the private key is (n, d). Keep all the values d, p, q and phi
secret.
Step2. Digital signing Sender A does the following:-
A) Creates a message digestof the information to be sent by using hash function.
Hash Function1. Declare character str of unsigned long type.
2. Declare and initialize hash of unsigned integer type
3. unsigned int hash = 0;
int q;
while (q = str+1)
hash =hash + q;
B) Represents this digest as an integermbetween 0 and n-1
Dept of PG Studies (CNE) VTU, Belgaum.
Page 11
-
7/31/2019 Phase Report
12/22
Implementing Digital Signature with RSA to the Data on Cloud
C) Uses her private key (n, d) to compute the signature, s = m d mod n.
D) Sends this signatures to the recipient, B.
Step3. Encryption
Sender A does the following:-
1.Obtains the recipient B's public key (n, e).
2. Represents the plaintext message as a positive integerm
3. Computes the cipher text c = me mod n.
4. Sends the cipher text c to B.
Step4. Decryption
Recipient B does the following:-
1. Uses his private key (n, d) to compute m = cd mod n.
2. Extracts the plaintext from the message representative m.
Step5. Signature verification
Recipient B does the following:-
1. Uses sender A's public key (n, e) to compute integer v = s e mod n.
2. Extracts the message digest from this integer.
3. Independently computes the message digest of the information that has been signed.
4. If both message digests are identical, the signature is valid.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 12
-
7/31/2019 Phase Report
13/22
Implementing Digital Signature with RSA to the Data on Cloud
2.3 IMPLEMENTATION ISSUES
Cloud Security Challenges (Limitations of Cloud Computing)
Although virtualization and cloud computing can help companies accomplish more by
breaking the physical bonds between an IT infrastructure and its users, heightened security
threats must be
overcome in order to benefit fully from this new computing paradigm. This is particularly
true for the SaaS provider. Some security concerns are worth more discussion. With the
cloud model, you lose control over physical security. In a public cloud, you are sharing
computing resources
with other companies. In a shared pool outside the enterprise, you dont have any
knowledge or control of where the resources run. Exposing your data in an environment
shared with other companies could give the government reasonable cause to seize your
assets because another
company has violated the law. Simply because you share the environment in the cloud, may
put your data at risk of seizure. Storage services provided by one cloud vendor may be
incompatible with another vendors services should you decide to move from one to the
other. Vendors are
known for creating what the hosting world calls sticky servicesservices that an end
user may have difficulty transporting from one cloud vendor to another. Data integrity is
assurance that the data is consistent and correct. Ensuring the integrity of the data really
means that it changes only in response to authorized transactions.
Security and Responsibility
Within the cloud computing world, the virtual environment lets user access computing
power that exceeds that contained within their own physical worlds. To enter this virtual
environment requires them to transfer data throughout the cloud. Consequently, several
data storage concerns
can arise. Typically, users will know neither the exact location of their data nor the other
sources of the data collectively stored with theirs. To ensure data confidentiality, integrity,
and availability (CIA), the storage provider must offer capabilities that, at a minimum,
include a tested encryption schema to ensure that the shared storage environment
safeguards all data; stringent
Dept of PG Studies (CNE) VTU, Belgaum.
Page 13
-
7/31/2019 Phase Report
14/22
Implementing Digital Signature with RSA to the Data on Cloud
access controls to prevent unauthorized access to the data; and scheduled data backup and
safe storage of the backup media. Legal issues arise, such as ediscovery, regulatory
compliance (including privacy), and auditing .The range of these legal concerns reflects the
range of interests
that are currently using or could use cloud computing. These issues and their yet-to-be
determined answers provide significant insight into how security plays a vital role in cloud
computing continued growth and development.
Use in Cyber crime
Cyber crimes effects are felt throughout the Internet, and cloud computing offers a
tempting target for many reasons. Providers such as Google and Amazon have the existing
infrastructure to deflect and survive a cyber attack, but not every cloud has such capability.
If a cyber
criminal can identify the provider whose vulnerabilities are the easiest to exploit, then this
entity becomes a highly visible target. If not all cloud providers supply adequate security
measures, then these clouds will become high-priority targets for cyber criminals. By their
architectures
inherent nature, clouds offer the opportunity for simultaneous attacks to numerous sites,
and without proper security, hundreds of sites could be comprised through a single
malicious activity.
Weaknesses in RSA
Small encryption exponent
If you use a small exponent like e=3 and send the same message to different
recipients and just use the RSA algorithm without adding random padding to the
message, then an eavesdropper could recover the plaintext.
Using the same key for encryption and signing
Given that the underlying mathematics is the same for encryption and signing, only
in reverse, if an attacker can convince a key holder to sign an unformatted
encrypted message using the same key then she gets the original.
Acting as an oracle
There are techniques to recover the plaintext if a user just blindly returns the RSA
transformation of the input. So don't do that.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 14
-
7/31/2019 Phase Report
15/22
Implementing Digital Signature with RSA to the Data on Cloud
Solutions
1. Don't use the same RSA key for encryption and signing.
2. If using PKCS#v1.5 encoding, use e=0x10001 for your public exponent.
3. Always format your input before encrypting or signing.
4. Always add fresh random padding - at least 8 bytes - to your message before
encrypting.
5. When decrypting, check the format of the decrypted block. If it is not as expected,
return an error, not the decrypted string.
6. Similarly, when verifying a signature, if there is any error whatsoever, just respond
with "Invalid Signature".
Dept of PG Studies (CNE) VTU, Belgaum.
Page 15
-
7/31/2019 Phase Report
16/22
Implementing Digital Signature with RSA to the Data on Cloud
2.4 EXISTING SYSTEM
From the perspective of data security, which has always been an important aspect of quality
of service, Cloud Computing inevitably poses new challenging security threats for number
of reasons.
1 . Firstly, traditional cryptographic primitives for the purpose of data security protection
can not be directly adopted due to the users loss control of data under Cloud Computing.
Therefore, verification of correct data storage in the cloud must be conducted without
explicit knowledge of the whole data. Considering various kinds of data for each user
stored in the cloud and the demand of long term continuous assurance of their data safety,
the problem of verifying correctness of data storage in the cloud becomes even more
challenging.
2 . Secondly, Cloud Computing is not just a third party data warehouse. The data stored in
the cloud may be frequently updated by the users, including insertion, deletion,
modification, appending, reordering, etc. To ensure storage correctness under dynamic data
update is hence of paramount importance.
These techniques, while can be useful to ensure the storage correctness without having
users possessing data, cannot address all the security threats in cloud data storage, since
they are all focusing on single server scenario and most of them do not consider dynamic
data operations. As a complementary approach, researchers have also proposed distributed
protocols for ensuring storage correctness across multiple servers or peers. Again, none of
these distributed schemes is aware of dynamic data operations. As a result, their
applicability in cloud data storage can be drastically limited.
Dept of PG Studies (CNE) VTU, Belgaum.
Page 16
-
7/31/2019 Phase Report
17/22
Implementing Digital Signature with RSA to the Data on Cloud
3. SYSTEM REQUIREMENTS
Hardware Requirements:
PROCESSOR: Pentium 4 or more.
RAM: 512MB
HARD DISK: 100MB
RESOLUTION: 1024 X 768
LAN Connection: GSM Modem
Software Requirement
JAVA (JDK 1.6 or More)
Net Beans IDE 6.1 or More
Languages Used:
Java 2 Enterprise Edition
Java Swing
RMI (Remote Method Invocation)
Dept of PG Studies (CNE) VTU, Belgaum.
Page 17
-
7/31/2019 Phase Report
18/22
Implementing Digital Signature with RSA to the Data on Cloud
4. DESIGN PHASE
Architecture Diagram:
Dept of PG Studies (CNE) VTU, Belgaum.
Page 18
-
7/31/2019 Phase Report
19/22
Implementing Digital Signature with RSA to the Data on Cloud
Use case Diagram:
Context level DFD:
Dept of PG Studies (CNE) VTU, Belgaum.
Page 19
-
7/31/2019 Phase Report
20/22
Implementing Digital Signature with RSA to the Data on Cloud
Top Level DFD:
Dept of PG Studies (CNE) VTU, Belgaum.
Page 20
-
7/31/2019 Phase Report
21/22
Implementing Digital Signature with RSA to the Data on Cloud
ER Diagram:
5. REFERENCES
[1]http://en.wikipedia.org/wiki/Cloud_computing
[2]http://www.cloudcomputingchina.cn/Article/luilan/200909/306.html
[3]http://searchcloudcomputing.techtarget.com/sDefinition/0, id201_gci1287881,00.html
[4]http://www.boingboing.net/2009/09/02/cloudcomputing-skep.html
Dept of PG Studies (CNE) VTU, Belgaum.
Page 21
-
7/31/2019 Phase Report
22/22
Implementing Digital Signature with RSA to the Data on Cloud
[5] (U.S.) Nicholas. Carr, fresh Yan Yu, "IT is no longer important: the Internet great
change of the high ground - cloud computing," The Big Switch:Rewining the World,from
Edison to Google, , CITIC Publishing House, October 2008 1-1
[6] Ya-Qin Zhang, the future of computing in the "cloud - Client", The Economic Observer
reported, http://www.sina.com.cn, 2008 Nian 07 Yue 12 Ri 14:30
[7] Wang Haopeng (Air Force Aviation University of Computer Teaching, Jilin,
Changchun 130022, China); Liu strong (Air Force Air University, Research Department,
Jilin, Changchun 130022, China), virtualization technology in the application of cloud
computing, TP313.A ,1009-3044 (2008 ) 25- 1554-01,2008 Year 25
[8] http://www.emc.com/digital_universe
[9] http://www.xemacit.com
[10] Aiiad Albeshri and William Caelli, Queensland University, Brisbane (Mutual
Protection in a Cloud Computing Environment).
Dept of PG Studies (CNE) VTU, Belgaum.
Page 22
http://www.emc.com/digital_universehttp://www.xemacit.com/http://www.emc.com/digital_universehttp://www.xemacit.com/