Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite › Informatik - IT-Security

To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach

Security in Cloud Computing

Titel: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach

Masterarbeit , 2014 , 44 Seiten

Autor:in: Ashwin Dhivakar (Autor:in)

Informatik - IT-Security

Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user’s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user’s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user’s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for “authorization” to enter the network, 2) Image Sequencing password for “authentication” wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing “data integrity”. Thus this approach provides an overall security to the client’s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.

Leseprobe


Inhaltsverzeichnis (Table of Contents)

  • Introduction
  • Literature Survey
    • Cloud Computing
    • Security Issues in Cloud Computing
    • Encryption Techniques
    • RSA Algorithm
  • Proposed System
    • System Architecture
    • Multi-level Security Approach
      • User Authentication
      • Image Sequencing Password
      • RSA Encryption
  • Implementation and Results
    • Implementation Details
    • Performance Evaluation
  • Conclusion
  • References

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This dissertation proposal aims to address the security concerns of data confidentiality, message integrity, and user authenticity in cloud computing environments. The proposed system introduces a multi-level security approach utilizing novel cryptographic techniques to safeguard user data from unauthorized access and disclosure.

  • Security in Cloud Computing Environments
  • Multi-level Security Approach
  • User Authentication and Authorization
  • Data Encryption and Integrity
  • Performance Evaluation of the Proposed System

Zusammenfassung der Kapitel (Chapter Summaries)

  • Introduction: This chapter provides an overview of cloud computing and its growing popularity. It discusses the critical security challenges that arise in such environments, particularly regarding data confidentiality, message integrity, and user authenticity. The chapter highlights the need for robust security solutions to address these vulnerabilities.
  • Literature Survey: This chapter presents a comprehensive review of existing literature related to cloud computing security. It explores various security issues and their impact on cloud environments. The chapter also examines different encryption techniques, focusing on the RSA algorithm, which forms the foundation of the proposed multi-level security approach.
  • Proposed System: This chapter outlines the architecture and design of the proposed system. It details the multi-level security approach, which incorporates user authentication, image sequencing passwords, and RSA encryption to ensure data integrity and confidentiality. The chapter also explains how this approach addresses the identified security challenges.
  • Implementation and Results: This chapter discusses the implementation details of the proposed system. It presents the results of performance evaluation, demonstrating the effectiveness and efficiency of the multi-level security approach in protecting user data in cloud environments.

Schlüsselwörter (Keywords)

This dissertation proposal focuses on cloud computing security, multi-level security, user authentication, data encryption, RSA algorithm, image sequencing passwords, confidentiality, integrity, authenticity, and performance evaluation.

Ende der Leseprobe aus 44 Seiten  - nach oben

Details

Titel
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
Untertitel
Security in Cloud Computing
Hochschule
Lovely Professional University, Punjab
Veranstaltung
M.Tech (Computer Science and Engineering)
Autor
Ashwin Dhivakar (Autor:in)
Erscheinungsjahr
2014
Seiten
44
Katalognummer
V273465
ISBN (eBook)
9783656652021
ISBN (Buch)
9783656651994
Sprache
Englisch
Schlagworte
multi-level security cloud computing cryptography novel approach
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Ashwin Dhivakar (Autor:in), 2014, To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach, München, GRIN Verlag, https://www.hausarbeiten.de/document/273465
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  44  Seiten
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum