SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2560
Data Security Approach in Cloud computing using SHA
Prabhleen Kaur Soul 1, Sunil Saini2
1RESEARCH SCHOOLAR
2ASSISTANT PROFESSOR
Dept. of Computer Science and Engineering KITM Kurukshetra Haryana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract The main idea behind this paper is to provide
integrity to the cloud storage area. In order to provide
security in cloud computing we use SHA algorithm. In
this method some important security services including
key generation, encryption and decryption are provided
in Cloud Computing system. Here the TPA is the trusted
entity that has expertise and capabilities to assess cloud
storage security on behalf of a data owner upon request.
The main goal is to securely store and manage the data
so that only authorized users can have access over the
data.
Key Words: SLA,AES, DES ,HTTPS
1. INTRODUCTION
Cloud computing is considered as major part in a
business for fulfilling the request at low cost. It is an
internet based computingwhereapplication,platform,
infrastructure are provided as services [2]. The main
concept of this technology is that, the customers pay
only for those services which used. Resources can be
allocated geography anywhere and can provide any
type of service that a user wants. Now user needs not
to have any type of physical infrastructure. He/shehas
to just use the services of this technology and pay
according to usage of services.
Cloud computing is a novel type of prototype, is
coming. This term is a novel term that seems by the
fourth season, 2007. The custom of internet and novel
knowledge’s today, for commercial and designed for
the present consumers, is previously portion of daily
lifespan. Slightly info is obtainable wherever in the
domain at marginally time. Thatwasnotprobablelittle
ages before. Today it have ascended a lot of potentials
of admission to open and isolated info similar to
internet speedadmittanceorthesettingoutofportable
dispositive that permit the linking to internet from
virtually universally. Cloud computing discusses[3] to
the provision of computing resources concluded the
internet. In its place of custody information on your
individual hard drive or apprising requests for your
requirements, you practice a facility through the
internet, at alternative place, to accumulate your info
or use its requests. Doing so can provide increase to
convinced confidentialityinsinuations.Thiscomputing
technology is the distribution of facilities through the
net. Cloud facilities permit persons and companies to
custom software and hardware that are achieved by
other peoples at faraway sites. Instances of cloud
facilities comprise on the web document stowage,
communal interacting sites, webmail, and online
commercial services. This computing technology
archetypal lets right to use to info and computer
servers from wherever that a network linking is
offered.Thiscomputing technologydeliversacommon
puddle of servers, comprising infor stowage space,
networks, computer processing power, and specific
business and consumer requests.
II. Characteristics of Cloud Computing
The characteristics of Cloud computing [5] which
explains its relation and differencefromthetraditional
computing are given below:
• Virtualization: Virtualization refers to the
abstraction of computer resources (CPU, storage,
network, memory, application stack anddatabase)
from the applications andtheendusersconsuming
the service [6]. It is a technique which multiplexes
the hardware resources and enables the users to
run multiple operating systems on same physical
hardware. This technology helps in slicing a single
data center or high power server to act as multiple
machines. Thenumberofvirtualmachine,asystem
may be divided depends upon the hardware
configuration of system.
• On-Demand-SelfService:Consumercanprovision
or un-provisiontheserviceswhendesired,without
the human interaction with the service provider.
Whether it is software, platform or infrastructure
everything is offered as a service overthenetwork.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2561
• Elasticity: With elasticity, the user is able to
acquire more resources in an on demand manner,
for a small duration and pays for the capacity or
capability they need. When those resources are no
longer needed, the user is able to return that
capacity.
• Location Independence: Enables the users to
access the systems using awebbrowserregardless
of their location or what device they use (PC or
mobile phone). The services are provided to user
residing at any part of the world using their smart
phones, laptops, tablets and office computers.
These devices can be used wherever they are
located with a simple online access point.
• Multi-tenancy: The cloud providers serve the
multiple companies on same infrastructure and
software. This approach is more energy efficient
than multiple copies of software installed on
different infrastructure [7].
• Autonomic: To provide highly reliable services,
Clouds exhibit autonomic behavior by managing
themselves in case of failures or the performance
degradation.
• Measured Services: Due to affordable nature of
cloud, the user can pay on a pay as peruse model.
The cloud provider can measure the levels of
storageandprocessing,bandwidthandthenumber
of user accounts which can be billed accordingly.
• Maintenance: Maintenance of cloud computing is
easier because they do not need to be installed on
each user’s computer and can be accessed from
different places.
III. Challenges of Cloud Computing
The following are the challenges faced by cloud
computing environment [10]:
• Security and Privacy: It deals with securing the
stored data and to monitor the use of the cloud by
the service providers. This challenge can be
addressed[9] by storing the data into the
organization itself and allowing it to be used in the
cloud. So the security mechanisms between the
organizations and the cloud need to be robust.
• Service Delivery and Billing: The service level
agreements (SLAs) of the provider are not
adequate to guarantee the availability and
scalability as it is difficult to assess the cost
involved due to dynamic nature of services.
• Interoperability and Portability: As the cloud
environment is highly dynamic to user requests
and due to the concept of virtualization, the
leverage of migrating in and out of the resources
and applicationsshouldbeallowed.Also,switching
providers should switch between clouds as per
their need, and no lock-in period should exist.
• Reliability and Availability: Cloud providers still
lack in round-the-clock service which results in
frequent outages. Therefore, it becomes important
to monitor the service being provided using
internal or third party tools.
• Automatedserviceprovisioning:Akeyfeatureof
cloud computing is elasticity; resources can be
allocated or released automatically.Soastrategyis
required to use or release the resources of the
cloud, by keeping the same performance as
traditional systems and using optimal resources.
• Performance and Bandwidth Cost: Businesses
can save money on hardware but they have to
spend more for the bandwidth. This can be low
cost for smaller applications but can be
significantly high for the data-intensive
applications.
• Virtual Machines Migration: With virtualization
technology, an entire machine can be takenasafile
or set of files. To unload a heavily loaded physical
machine, it is required to move a virtual machine
between physical machines. The main objective is
to distribute the load in a datacenter or set of
datacenters. Then a strategy is required to
dynamically distribute load when moving virtual
machine to avoid bottlenecks in Cloud computing
system.
• Energy Cost: Cloud infrastructure consumes
enormous amounts of electricalenergyresultingin
high operating costs and carbon dioxide emissions
[10].
IV. Purposed Work
The purpose of the work is to inspect the safety
restriction and focus the present dangers trendy cloud
computing real safety procedures intended for cloud
computing schemes. It determination contribution the
academics to categorize safety provisions by several
stages to distinguish the fears in the numerous cloud
computing prototypes modeled by mutually interior
and exterior customers. Therefore, it will beneficial to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2562
explain cloud safetyprotocolsthatguaranteethesafety
of the cloud environment.
Although cloud computing has been widely used, the
research on resource management in cloud
environment is still an early stage. The main objective
of the research work is to investigate the relevant
efficient and enhancedresourceutilizationapproaches
for cloud based system. A brief description of the work
to be carried out is as under:
 Scheme will be developed to maintain the
integrity of information exchange between
participating systems.
 Scheme will be developed to authenticate the
participating system involved in
communication.
 Scheme will be developed to ensure the
confidentiality of the information exchanged
between participating systems.
 A secure model will be developed which will
comprise the above developed schemes.
Similar to entire computing schemes, cloud computing
organizations essentially reveal safety problems since
the earlyphasesi.e.requestsphasesandprojectphases
of its improvementprocedure.Itresolveprincipaltoan
extra vigorous, safe and fewer errors willing to system
than those systems that categorize safety substances
only on one occasion, once the scheme is addressed.
Owing to the difficulty of thecloudenvironment,actual
progress of a cloud computing scheme desires an
inspection of these safety difficulties and precondition
thus frequent approaches might be recognizedpriorin
the expansion procedure that drive reflect the
complete cloud. In cloud computing environs, inner
fears have graduallyimprovedabovethepreviouslittle
ages. Inner hazard depicts to individuals fears which
monitor inside the association. Inside customers in a
connotation usually have extra info of the data
reserved there in and in future, extra well-informed
about how to charge that information and
requirements thandoexternalcustomers.Whileinside
fears cannot be totally detached, some actual fences
can be developed to ease them.
4.1 Symbolization and Initiations
• FEncod: This is a script document that subjects the
encoded information and document is kept in CSP3.
• FTemp: It is determined through information
handling period (recovery process and drive to be
free) and this one is a provisional document.
• Gen_Key(): This produces a protected key.
• Ks: This is a key which is produced through
Gen_Key procedure in CSP-2.
• Encoding (): This is encoding procedure to encrypt
document.
• Decoding (): This is a decoding procedure to
decipher document.
This procedure negotiates of numerous additional
rules. The customers interrelate over the gateway
server over HTTPS procedure to upload their
information. The Docker repository clustering
procedure Docker Swarm obligates the situation
superior arrangement on gateway server. Thus
document send by customer is directly promoted
towards a nodule of the swarm collection wherever
swarm supervisor leads an indication to introduce a
repository and the information drive be equestriennes
arranged it and the repository willprocedureopenSSL
procedure to encode theinformationthroughAES,RSA
or some supplementarytypicalencodingprocedure.As
quickly as the encoding is complete, the repository
dismisses andtheencodedinformationishaggardback
towards the gateway server besides previously
endorsedtowardsthestowageserver.Thedocumentis
stimulatedaftergatewayservertoadditionalknotsand
servers through SSH procedure. The stowage server
obligates a collection of Docker nodules successively
that receipts disk space after the chief scheme.
Glusterfs procedure is castoff to band the information
interested in numerous pieces and also duplicates it to
a reserve nodule uncertaintysomeandaccumulationit
on the repository collection. In circumstance, the
customerstressestotransferhisinformationhesetsan
appeal over HTTPS on gateway server and at that time
the gateway server recovers the document from the
stowage server and forward it to its nodule for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2563
decoding that includes similar procedure as encoding.
The decoded information is dragged after the gateway
server and then accessible for the customer to get it.
Our suggested arrangement has two key assistances:
1) Effectiveness and safety: - The strategy suggested
through the innocuous is to depend on a unrestricted
and reserved key encoding willbeclear,effectiveinthe
practice of undisclosed key gen and Hash procedure.
Therefore each interval constraints are produced and
key interchangeproceedsplacesoextraprotectedthan
symmetric and asymmetric procedure. Though, our
strategy is supplementary effectual than the other
procedures, since, it does not need a lot of information
encoded in subcontracted and not any extra supports
on the representation chunk, and proportion is
supplementary protectedsinceweencodeinformation
to avoid illegal third revelries to distinguish its
subjects.
2) Open verifiability: We strategy a main difference to
deliver free authentication. Permit, person
supplementary than owner for info on the server has
verified proficient since it does not require the info for
individual chunk encoding.
V. Result Analysis
Implementation is the phase of the development at
what time the conjectural proposal is revolvedoutinto
a functioning method. Therefore it can be reflected to
remain the maximum precarious phase in attaining an
effective novel scheme and in giving the customer,
sureness that the novel system wills effort and stay
operative. The operational phase includes suspicious
preparation, examinationofthepresentsystemandit’s
limitations on execution, conniving of approaches to
accomplish exchange and assessment of exchange
approaches.
Here, our goal is to measure the Encryption and
Decryptionspeedofeachalgorithmfordifferentpacket
sizes. Encryption time is used to calculate the
throughput of an encryption scheme. It indicates the
speed of encryption. The throughput of the encryption
scheme is calculated by dividing the total plaintext in
Megabytes encrypted on the total encryption time for
each algorithmin.Asthethroughputvalueisincreased,
the powerconsumptionof this encryptiontechniqueis
decreased. By consideringdifferentsizes ofdatablocks
(0.5MB to 20MB) the algorithms were evaluated in
terms of the time required to encrypt and decrypt the
data block. All theimplementationswereexacttomake
sure that the results will be relatively fair and accurate
Firstly open the .NET. Encrypt and hashforencryption
purpose.
File successfully uploaded” after uploading of file.
e
encrypted file of that uploaded file.
3
fields username, email id and mobile number of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2564
user which are used earlier .
Now we have to choose the file which is to beuploaded
by clicking on choose file button. Then click on upload
file button to upload it.
VI. Conclusion and Future Scope
In this proposal, we have offered a summary of
information stowage safety in cloud computing and
projected a frame constructed on encryption system.
To guarantee the safety of customers’ information in
cloud stowage, we planned an operative and effective
encryptionapproachforimprovingsafetyondata-a-at-
rest. We have presented that our arrangement nearly
assurances the safety of information when it is kept in
the informationcenter of some Cloud Service Provider
(CSP). It will assistance to construct a ideal to protect
the information in the arena of cloud calculation. This
architecture is capable to expand the client fulfilment
to a countless degree and it will appeal numerous
nominees in this arena for developed as well as
upcoming investigation farms.
REFERENCES
[1] Aderemi A. Atayero, Oluwaseyi Feyisetan,“Security
Issues in Cloud Computing: The Potentials of
Homomorphic Encryption”, In Journal of Emerging
Trends in Computing and Information Sciences, Vol-2,
No.10, pp.546-552, October 2011
[2] Pengfei You, Yuxing Peng,WeidongLiu,ShoufuXue,
“Security Issues and Solutions in Cloud Computing”. In
32nd International Conference on Distributed
Computing System Workshops, pp.573-577, 2012
(2012)
[3] W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.t.
Abdullaha, “Cloud-Based Intrusion Detection Service
Framework”. In the Proceedings of the International
Conference on Cyber Security, pp. 213-218, IEEE, June
2012 .
[4] Abhishek Jain, Ashwani Kumar Singh, “Distributed
Denial of Service (DDOS) Attacks – Classification And
Implications”.InJournalofInformationandOperations
Management, ISSN: 0976-7754 & E-ISSN: 0976-7762,
Vol. 3, Issue 1, pp 136-140, 2012
[5]http://www.symantec.com/connect/articles/justify
ing-expense-ids-part-one-overview-rois-ids
[6]http://netsecurity.about.com/cs/hackertools/a/aa0
30504.htm
[36] Sanjay B Ankali, Dr. D V Ashoka, “Detection of
Request Layer DDoS Attack for Internet”. In
International Journal of Advanced Networking and
Applications, Vol-o3, Issue: 01, pp. 984-990, 2011.
[7]S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and
A.Ghalasi, “Cloud Compuating- The business
perspective”, DecisionSupport Systems, Vol.51(1),pp.
176-189, 2011.
[8]The NIST Definition of Cloud Computing,
http://csrc.nist.gov/publications/nistpubs/800-
/SP800-145.pdf.
[9] I. Brandic, “Towards self-manageable cloud
services”, IEEE International Conference on
Computer Software and Applications, pp.128-133,
2009.
[10] M. Alhamad, T. Dillon and E. Chang, “A survey on
SLA and performance measurement in cloud
computing”, On the Move to Meaningful Internet
Systems: OTM 2011, Springer Berlin Heidelberg,
pp. 469-477, 2011.

More Related Content

PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
PDF
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
PDF
IRJET- Cloud Computing Review
PDF
Security & privacy issues of cloud & grid computing networks
PDF
PDF
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
The Riisk and Challllenges off Clloud Computtiing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET- Cloud Computing Review
Security & privacy issues of cloud & grid computing networks
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
The Riisk and Challllenges off Clloud Computtiing

What's hot (19)

PDF
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
PDF
50120140503020
PDF
Ad4502189193
PDF
G033030035
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
PDF
Total interpretive structural modelling on enablers of cloud computing
DOCX
106248842 cc
PDF
IRJET- Efficient and Secure Data Storage in Cloud Computing
PDF
OCC-Executive-Summary-20150323
PDF
Fog Computing: Issues, Challenges and Future Directions
PDF
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
PDF
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
Get Cloud Resources to the IoT Edge with Fog Computing
PDF
Addressing the cloud computing security menace
PDF
8. 9590 1-pb
PDF
Cloud computing and its security aspects
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Challenges and Proposed Solutions for Cloud Forensic
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
50120140503020
Ad4502189193
G033030035
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Total interpretive structural modelling on enablers of cloud computing
106248842 cc
IRJET- Efficient and Secure Data Storage in Cloud Computing
OCC-Executive-Summary-20150323
Fog Computing: Issues, Challenges and Future Directions
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
A survey on data security in cloud computing issues and mitigation techniques
Get Cloud Resources to the IoT Edge with Fog Computing
Addressing the cloud computing security menace
8. 9590 1-pb
Cloud computing and its security aspects
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Challenges and Proposed Solutions for Cloud Forensic
Ad

Similar to Data Security Approach in Cloud computing using SHA (20)

PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PDF
Chapeter 2 introduction to cloud computing
PDF
IRJET - Cloud Computing Application
PDF
Improving Cloud Performance through Performance Based Load Balancing Approach
PPTX
Cloud computing
DOC
Cloud security
PDF
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
PDF
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
PDF
Ch-1-INTRODUCTION (1).pdf
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
Cloud computing security
PDF
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
PPTX
Fundamental of cloud computing
PDF
Iaetsd cloud computing and security challenges
PDF
A study on_security_and_privacy_issues_o
PDF
A220113
RTF
Secure third party cloud computing services a proposal by shibwabo anyembe
PDF
IRJET- Single to Multi Cloud Data Security in Cloud Computing
PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
PPTX
Cloud computing
Analysis of Cloud Computing Security Concerns and Methodologies
Chapeter 2 introduction to cloud computing
IRJET - Cloud Computing Application
Improving Cloud Performance through Performance Based Load Balancing Approach
Cloud computing
Cloud security
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Ch-1-INTRODUCTION (1).pdf
Cloud Data Security using Elliptic Curve Cryptography
Cloud computing security
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
Fundamental of cloud computing
Iaetsd cloud computing and security challenges
A study on_security_and_privacy_issues_o
A220113
Secure third party cloud computing services a proposal by shibwabo anyembe
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Cloud computing
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
web development for engineering and engineering
PPTX
Welding lecture in detail for understanding
PPT
Project quality management in manufacturing
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
PPT on Performance Review to get promotions
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CYBER-CRIMES AND SECURITY A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
web development for engineering and engineering
Welding lecture in detail for understanding
Project quality management in manufacturing
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
OOP with Java - Java Introduction (Basics)
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPT on Performance Review to get promotions
bas. eng. economics group 4 presentation 1.pptx
Internet of Things (IOT) - A guide to understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
Lesson 3_Tessellation.pptx finite Mathematics
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx

Data Security Approach in Cloud computing using SHA

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2560 Data Security Approach in Cloud computing using SHA Prabhleen Kaur Soul 1, Sunil Saini2 1RESEARCH SCHOOLAR 2ASSISTANT PROFESSOR Dept. of Computer Science and Engineering KITM Kurukshetra Haryana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract The main idea behind this paper is to provide integrity to the cloud storage area. In order to provide security in cloud computing we use SHA algorithm. In this method some important security services including key generation, encryption and decryption are provided in Cloud Computing system. Here the TPA is the trusted entity that has expertise and capabilities to assess cloud storage security on behalf of a data owner upon request. The main goal is to securely store and manage the data so that only authorized users can have access over the data. Key Words: SLA,AES, DES ,HTTPS 1. INTRODUCTION Cloud computing is considered as major part in a business for fulfilling the request at low cost. It is an internet based computingwhereapplication,platform, infrastructure are provided as services [2]. The main concept of this technology is that, the customers pay only for those services which used. Resources can be allocated geography anywhere and can provide any type of service that a user wants. Now user needs not to have any type of physical infrastructure. He/shehas to just use the services of this technology and pay according to usage of services. Cloud computing is a novel type of prototype, is coming. This term is a novel term that seems by the fourth season, 2007. The custom of internet and novel knowledge’s today, for commercial and designed for the present consumers, is previously portion of daily lifespan. Slightly info is obtainable wherever in the domain at marginally time. Thatwasnotprobablelittle ages before. Today it have ascended a lot of potentials of admission to open and isolated info similar to internet speedadmittanceorthesettingoutofportable dispositive that permit the linking to internet from virtually universally. Cloud computing discusses[3] to the provision of computing resources concluded the internet. In its place of custody information on your individual hard drive or apprising requests for your requirements, you practice a facility through the internet, at alternative place, to accumulate your info or use its requests. Doing so can provide increase to convinced confidentialityinsinuations.Thiscomputing technology is the distribution of facilities through the net. Cloud facilities permit persons and companies to custom software and hardware that are achieved by other peoples at faraway sites. Instances of cloud facilities comprise on the web document stowage, communal interacting sites, webmail, and online commercial services. This computing technology archetypal lets right to use to info and computer servers from wherever that a network linking is offered.Thiscomputing technologydeliversacommon puddle of servers, comprising infor stowage space, networks, computer processing power, and specific business and consumer requests. II. Characteristics of Cloud Computing The characteristics of Cloud computing [5] which explains its relation and differencefromthetraditional computing are given below: • Virtualization: Virtualization refers to the abstraction of computer resources (CPU, storage, network, memory, application stack anddatabase) from the applications andtheendusersconsuming the service [6]. It is a technique which multiplexes the hardware resources and enables the users to run multiple operating systems on same physical hardware. This technology helps in slicing a single data center or high power server to act as multiple machines. Thenumberofvirtualmachine,asystem may be divided depends upon the hardware configuration of system. • On-Demand-SelfService:Consumercanprovision or un-provisiontheserviceswhendesired,without the human interaction with the service provider. Whether it is software, platform or infrastructure everything is offered as a service overthenetwork.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2561 • Elasticity: With elasticity, the user is able to acquire more resources in an on demand manner, for a small duration and pays for the capacity or capability they need. When those resources are no longer needed, the user is able to return that capacity. • Location Independence: Enables the users to access the systems using awebbrowserregardless of their location or what device they use (PC or mobile phone). The services are provided to user residing at any part of the world using their smart phones, laptops, tablets and office computers. These devices can be used wherever they are located with a simple online access point. • Multi-tenancy: The cloud providers serve the multiple companies on same infrastructure and software. This approach is more energy efficient than multiple copies of software installed on different infrastructure [7]. • Autonomic: To provide highly reliable services, Clouds exhibit autonomic behavior by managing themselves in case of failures or the performance degradation. • Measured Services: Due to affordable nature of cloud, the user can pay on a pay as peruse model. The cloud provider can measure the levels of storageandprocessing,bandwidthandthenumber of user accounts which can be billed accordingly. • Maintenance: Maintenance of cloud computing is easier because they do not need to be installed on each user’s computer and can be accessed from different places. III. Challenges of Cloud Computing The following are the challenges faced by cloud computing environment [10]: • Security and Privacy: It deals with securing the stored data and to monitor the use of the cloud by the service providers. This challenge can be addressed[9] by storing the data into the organization itself and allowing it to be used in the cloud. So the security mechanisms between the organizations and the cloud need to be robust. • Service Delivery and Billing: The service level agreements (SLAs) of the provider are not adequate to guarantee the availability and scalability as it is difficult to assess the cost involved due to dynamic nature of services. • Interoperability and Portability: As the cloud environment is highly dynamic to user requests and due to the concept of virtualization, the leverage of migrating in and out of the resources and applicationsshouldbeallowed.Also,switching providers should switch between clouds as per their need, and no lock-in period should exist. • Reliability and Availability: Cloud providers still lack in round-the-clock service which results in frequent outages. Therefore, it becomes important to monitor the service being provided using internal or third party tools. • Automatedserviceprovisioning:Akeyfeatureof cloud computing is elasticity; resources can be allocated or released automatically.Soastrategyis required to use or release the resources of the cloud, by keeping the same performance as traditional systems and using optimal resources. • Performance and Bandwidth Cost: Businesses can save money on hardware but they have to spend more for the bandwidth. This can be low cost for smaller applications but can be significantly high for the data-intensive applications. • Virtual Machines Migration: With virtualization technology, an entire machine can be takenasafile or set of files. To unload a heavily loaded physical machine, it is required to move a virtual machine between physical machines. The main objective is to distribute the load in a datacenter or set of datacenters. Then a strategy is required to dynamically distribute load when moving virtual machine to avoid bottlenecks in Cloud computing system. • Energy Cost: Cloud infrastructure consumes enormous amounts of electricalenergyresultingin high operating costs and carbon dioxide emissions [10]. IV. Purposed Work The purpose of the work is to inspect the safety restriction and focus the present dangers trendy cloud computing real safety procedures intended for cloud computing schemes. It determination contribution the academics to categorize safety provisions by several stages to distinguish the fears in the numerous cloud computing prototypes modeled by mutually interior and exterior customers. Therefore, it will beneficial to
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2562 explain cloud safetyprotocolsthatguaranteethesafety of the cloud environment. Although cloud computing has been widely used, the research on resource management in cloud environment is still an early stage. The main objective of the research work is to investigate the relevant efficient and enhancedresourceutilizationapproaches for cloud based system. A brief description of the work to be carried out is as under:  Scheme will be developed to maintain the integrity of information exchange between participating systems.  Scheme will be developed to authenticate the participating system involved in communication.  Scheme will be developed to ensure the confidentiality of the information exchanged between participating systems.  A secure model will be developed which will comprise the above developed schemes. Similar to entire computing schemes, cloud computing organizations essentially reveal safety problems since the earlyphasesi.e.requestsphasesandprojectphases of its improvementprocedure.Itresolveprincipaltoan extra vigorous, safe and fewer errors willing to system than those systems that categorize safety substances only on one occasion, once the scheme is addressed. Owing to the difficulty of thecloudenvironment,actual progress of a cloud computing scheme desires an inspection of these safety difficulties and precondition thus frequent approaches might be recognizedpriorin the expansion procedure that drive reflect the complete cloud. In cloud computing environs, inner fears have graduallyimprovedabovethepreviouslittle ages. Inner hazard depicts to individuals fears which monitor inside the association. Inside customers in a connotation usually have extra info of the data reserved there in and in future, extra well-informed about how to charge that information and requirements thandoexternalcustomers.Whileinside fears cannot be totally detached, some actual fences can be developed to ease them. 4.1 Symbolization and Initiations • FEncod: This is a script document that subjects the encoded information and document is kept in CSP3. • FTemp: It is determined through information handling period (recovery process and drive to be free) and this one is a provisional document. • Gen_Key(): This produces a protected key. • Ks: This is a key which is produced through Gen_Key procedure in CSP-2. • Encoding (): This is encoding procedure to encrypt document. • Decoding (): This is a decoding procedure to decipher document. This procedure negotiates of numerous additional rules. The customers interrelate over the gateway server over HTTPS procedure to upload their information. The Docker repository clustering procedure Docker Swarm obligates the situation superior arrangement on gateway server. Thus document send by customer is directly promoted towards a nodule of the swarm collection wherever swarm supervisor leads an indication to introduce a repository and the information drive be equestriennes arranged it and the repository willprocedureopenSSL procedure to encode theinformationthroughAES,RSA or some supplementarytypicalencodingprocedure.As quickly as the encoding is complete, the repository dismisses andtheencodedinformationishaggardback towards the gateway server besides previously endorsedtowardsthestowageserver.Thedocumentis stimulatedaftergatewayservertoadditionalknotsand servers through SSH procedure. The stowage server obligates a collection of Docker nodules successively that receipts disk space after the chief scheme. Glusterfs procedure is castoff to band the information interested in numerous pieces and also duplicates it to a reserve nodule uncertaintysomeandaccumulationit on the repository collection. In circumstance, the customerstressestotransferhisinformationhesetsan appeal over HTTPS on gateway server and at that time the gateway server recovers the document from the stowage server and forward it to its nodule for
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2563 decoding that includes similar procedure as encoding. The decoded information is dragged after the gateway server and then accessible for the customer to get it. Our suggested arrangement has two key assistances: 1) Effectiveness and safety: - The strategy suggested through the innocuous is to depend on a unrestricted and reserved key encoding willbeclear,effectiveinthe practice of undisclosed key gen and Hash procedure. Therefore each interval constraints are produced and key interchangeproceedsplacesoextraprotectedthan symmetric and asymmetric procedure. Though, our strategy is supplementary effectual than the other procedures, since, it does not need a lot of information encoded in subcontracted and not any extra supports on the representation chunk, and proportion is supplementary protectedsinceweencodeinformation to avoid illegal third revelries to distinguish its subjects. 2) Open verifiability: We strategy a main difference to deliver free authentication. Permit, person supplementary than owner for info on the server has verified proficient since it does not require the info for individual chunk encoding. V. Result Analysis Implementation is the phase of the development at what time the conjectural proposal is revolvedoutinto a functioning method. Therefore it can be reflected to remain the maximum precarious phase in attaining an effective novel scheme and in giving the customer, sureness that the novel system wills effort and stay operative. The operational phase includes suspicious preparation, examinationofthepresentsystemandit’s limitations on execution, conniving of approaches to accomplish exchange and assessment of exchange approaches. Here, our goal is to measure the Encryption and Decryptionspeedofeachalgorithmfordifferentpacket sizes. Encryption time is used to calculate the throughput of an encryption scheme. It indicates the speed of encryption. The throughput of the encryption scheme is calculated by dividing the total plaintext in Megabytes encrypted on the total encryption time for each algorithmin.Asthethroughputvalueisincreased, the powerconsumptionof this encryptiontechniqueis decreased. By consideringdifferentsizes ofdatablocks (0.5MB to 20MB) the algorithms were evaluated in terms of the time required to encrypt and decrypt the data block. All theimplementationswereexacttomake sure that the results will be relatively fair and accurate Firstly open the .NET. Encrypt and hashforencryption purpose. File successfully uploaded” after uploading of file. e encrypted file of that uploaded file. 3 fields username, email id and mobile number of the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2564 user which are used earlier . Now we have to choose the file which is to beuploaded by clicking on choose file button. Then click on upload file button to upload it. VI. Conclusion and Future Scope In this proposal, we have offered a summary of information stowage safety in cloud computing and projected a frame constructed on encryption system. To guarantee the safety of customers’ information in cloud stowage, we planned an operative and effective encryptionapproachforimprovingsafetyondata-a-at- rest. We have presented that our arrangement nearly assurances the safety of information when it is kept in the informationcenter of some Cloud Service Provider (CSP). It will assistance to construct a ideal to protect the information in the arena of cloud calculation. This architecture is capable to expand the client fulfilment to a countless degree and it will appeal numerous nominees in this arena for developed as well as upcoming investigation farms. REFERENCES [1] Aderemi A. Atayero, Oluwaseyi Feyisetan,“Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”, In Journal of Emerging Trends in Computing and Information Sciences, Vol-2, No.10, pp.546-552, October 2011 [2] Pengfei You, Yuxing Peng,WeidongLiu,ShoufuXue, “Security Issues and Solutions in Cloud Computing”. In 32nd International Conference on Distributed Computing System Workshops, pp.573-577, 2012 (2012) [3] W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.t. Abdullaha, “Cloud-Based Intrusion Detection Service Framework”. In the Proceedings of the International Conference on Cyber Security, pp. 213-218, IEEE, June 2012 . [4] Abhishek Jain, Ashwani Kumar Singh, “Distributed Denial of Service (DDOS) Attacks – Classification And Implications”.InJournalofInformationandOperations Management, ISSN: 0976-7754 & E-ISSN: 0976-7762, Vol. 3, Issue 1, pp 136-140, 2012 [5]http://www.symantec.com/connect/articles/justify ing-expense-ids-part-one-overview-rois-ids [6]http://netsecurity.about.com/cs/hackertools/a/aa0 30504.htm [36] Sanjay B Ankali, Dr. D V Ashoka, “Detection of Request Layer DDoS Attack for Internet”. In International Journal of Advanced Networking and Applications, Vol-o3, Issue: 01, pp. 984-990, 2011. [7]S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A.Ghalasi, “Cloud Compuating- The business perspective”, DecisionSupport Systems, Vol.51(1),pp. 176-189, 2011. [8]The NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800- /SP800-145.pdf. [9] I. Brandic, “Towards self-manageable cloud services”, IEEE International Conference on Computer Software and Applications, pp.128-133, 2009. [10] M. Alhamad, T. Dillon and E. Chang, “A survey on SLA and performance measurement in cloud computing”, On the Move to Meaningful Internet Systems: OTM 2011, Springer Berlin Heidelberg, pp. 469-477, 2011.