Hausarbeiten logo
Shop
Shop
Tutorials
De En
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite › Informatik - IT-Security

To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach

Security in Cloud Computing

Titel: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach

Masterarbeit , 2014 , 44 Seiten

Autor:in: Ashwin Dhivakar (Autor:in)

Informatik - IT-Security

Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Currently cloud computing environments have come up with a serious problem known as security which is in terms of Confidentiality of Data, Integrity of the Message and Authenticity of the users (CIA). Since user’s personal data is being stored in an unencrypted format on a remote machine operated by third party vendors who provide various services, the impact of user’s identity and unauthorized access or disclosure of files are very high. Though we have various techniques and algorithms to protect our data from hackers and intruders still cloud environments are prone to other attacks. In this paper, a novel approach is implemented to protect user’s confidential data from third party service providers, and also to make sure that the data is not disclosed to any unauthentic user or the service provider even, in any cloud environments. This approach provides a multi-level security in three aspects: 1) User authentication for “authorization” to enter the network, 2) Image Sequencing password for “authentication” wherein it is proved that the identity is original user, and 3) RSA algorithm to encrypt the data further for providing “data integrity”. Thus this approach provides an overall security to the client’s personal data and the major issue of confidentiality, integrity and authenticity is fully solved. Implemented results are represented to illustrate that our approach has a reasonable performance.

Leseprobe


Table of Contents

Chapter 1: INTRODUCTION

1.1 Cloud Computing

1.2 History of Cloud Computing

1.3 Service Models in Cloud Computing

1.4 Deployment Models of Cloud Computing

1.5 Benefits of Cloud Computing

1.6 Challenges of Cloud Computing

1.7 Cloud Computing with the Communication Services

1.8 Accessing through Internet APIs

1.9 Cloud Computing Trends for 2014

1.10 Cloud Security Threats

1.11 Advantages of Cloud Computing

1.12 Disadvantages of Cloud Computing

Chapter 2: LITERATURE SURVE

Chapter 3: PRESENT WORK

3.1 Problem Formulation

3.2 Research Objective

3.3 Research Methodology

Chapter 4: IMPLEMENTATION AND RESULTS

4.1 Implementation

Chapter 5: CONCLUSION AND FUTURE SCOPE

5.1 Conclusion

5.2 Future Scope

Research Objectives and Key Focus Areas

This dissertation aims to address the critical security challenges in cloud computing environments by implementing a multi-level security approach that ensures data confidentiality, integrity, and user authenticity through a combination of image-based sequencing passwords and RSA encryption.

  • Enhancement of cloud computing security frameworks.
  • Improvement of data integrity mechanisms within remote environments.
  • Strengthening of data confidentiality to protect against unauthorized third-party access.
  • Evaluation of the proposed novel approach through practical implementation and performance assessment.

Excerpt from the Dissertation

3.1 Problem Formulation

Now days, information security has been a vital issue in cloud computing environments. Clouds don't have any borders and therefore the information may be physically set anyplace in any information centre across the network geographically distributed. That the nature of cloud computing raises serious problems relating to user authentication, info integrity and confidentiality. With the cloud model, you lose management over physical security. In a public cloud, you're sharing computing resources with different corporations. In a shared pool outside the enterprise, you do not have any data or management of wherever the resources run. Storage services provided by one cloud seller could also be incompatible with another vendor services. Information integrity is assurance that the information is consistent and proper. Guaranteeing the integrity of the information very implies that it changes solely in response to licensed transactions. The cloud service supplier for cloud makes certain that the client doesn't face any drawback like loss information or data thievery. There’s conjointly an opportunity wherever a malicious user will penetrate the cloud by impersonating a legitimate user, there by infecting the complete cloud.

Summary of Chapters

Chapter 1: INTRODUCTION: This chapter provides an overview of cloud computing, covering its history, service models, deployment methods, benefits, challenges, and current security threats.

Chapter 2: LITERATURE SURVE: This chapter reviews various existing academic papers and research studies regarding trust, security models, and privacy-preserving techniques in cloud computing.

Chapter 3: PRESENT WORK: This chapter outlines the identified problems in cloud security, defines the research objectives, and describes the proposed methodology using image sequencing and RSA encryption.

Chapter 4: IMPLEMENTATION AND RESULTS: This chapter details the practical implementation of the proposed security approach using NetBeans and demonstrates the authentication and encryption processes through screenshots.

Chapter 5: CONCLUSION AND FUTURE SCOPE: This chapter summarizes the findings of the project, highlighting how the proposed security hierarchy effectively addresses CIA (Confidentiality, Integrity, Authenticity) issues.

Keywords

Cloud Computing, Data Security, RSA Algorithm, Image Sequencing, Authentication, Confidentiality, Integrity, Information Security, Cryptography, Multi-level Security, Data Encryption, Network Security, Access Control, Cloud Service Provider, User Identity

Frequently Asked Questions

What is the primary focus of this research?

The research focuses on implementing a multi-level security approach in cloud computing to address critical issues regarding the Confidentiality, Integrity, and Authenticity (CIA) of user data stored on remote servers.

Which core technologies are utilized in this approach?

The solution integrates image-based sequencing for secure user authentication and the RSA algorithm for robust data encryption and integrity verification.

What is the main research objective?

The primary objective is to enhance the overall security and reliability of cloud environments by protecting sensitive data from third-party service providers and malicious attackers.

How is the effectiveness of the proposed security system verified?

The effectiveness is demonstrated through a practical implementation using the NetBeans environment, showing how the system reacts to unauthorized access attempts and validates legitimate data storage and retrieval.

What are the major threats covered in the study?

The study addresses common threats such as data breaches, data loss, service traffic hijacking, insecure APIs, malicious insiders, and authentication attacks.

Which methodologies are highlighted in the literature review?

The literature review covers proactive models, privacy-preserving public auditing, trust-based innovations, and data storage security techniques like Sobol sequence integration.

How does the "image sequencing" mechanism function?

It provides an extra layer of authentication at the user end where the user must input a numeric sequence corresponding to specific positions of images, which shuffle with each session to prevent replay attacks.

Why is RSA encryption used in this project?

RSA is employed to ensure data integrity and confidentiality, allowing the user to encrypt information locally before storage, ensuring that the cloud service provider cannot read the original content.

Ende der Leseprobe aus 44 Seiten  - nach oben

Details

Titel
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
Untertitel
Security in Cloud Computing
Hochschule
Lovely Professional University, Punjab
Veranstaltung
M.Tech (Computer Science and Engineering)
Autor
Ashwin Dhivakar (Autor:in)
Erscheinungsjahr
2014
Seiten
44
Katalognummer
V273465
ISBN (Buch)
9783656651994
ISBN (eBook)
9783656652021
Sprache
Englisch
Schlagworte
multi-level security cloud computing cryptography novel approach
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Ashwin Dhivakar (Autor:in), 2014, To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach, München, GRIN Verlag, https://www.hausarbeiten.de/document/273465
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  44  Seiten
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum