SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2560
Data Security Approach in Cloud computing using SHA
Prabhleen Kaur Soul 1, Sunil Saini2
1RESEARCH SCHOOLAR
2ASSISTANT PROFESSOR
Dept. of Computer Science and Engineering KITM Kurukshetra Haryana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract The main idea behind this paper is to provide
integrity to the cloud storage area. In order to provide
security in cloud computing we use SHA algorithm. In
this method some important security services including
key generation, encryption and decryption are provided
in Cloud Computing system. Here the TPA is the trusted
entity that has expertise and capabilities to assess cloud
storage security on behalf of a data owner upon request.
The main goal is to securely store and manage the data
so that only authorized users can have access over the
data.
Key Words: SLA,AES, DES ,HTTPS
1. INTRODUCTION
Cloud computing is considered as major part in a
business for fulfilling the request at low cost. It is an
internet based computingwhereapplication,platform,
infrastructure are provided as services [2]. The main
concept of this technology is that, the customers pay
only for those services which used. Resources can be
allocated geography anywhere and can provide any
type of service that a user wants. Now user needs not
to have any type of physical infrastructure. He/shehas
to just use the services of this technology and pay
according to usage of services.
Cloud computing is a novel type of prototype, is
coming. This term is a novel term that seems by the
fourth season, 2007. The custom of internet and novel
knowledge’s today, for commercial and designed for
the present consumers, is previously portion of daily
lifespan. Slightly info is obtainable wherever in the
domain at marginally time. Thatwasnotprobablelittle
ages before. Today it have ascended a lot of potentials
of admission to open and isolated info similar to
internet speedadmittanceorthesettingoutofportable
dispositive that permit the linking to internet from
virtually universally. Cloud computing discusses[3] to
the provision of computing resources concluded the
internet. In its place of custody information on your
individual hard drive or apprising requests for your
requirements, you practice a facility through the
internet, at alternative place, to accumulate your info
or use its requests. Doing so can provide increase to
convinced confidentialityinsinuations.Thiscomputing
technology is the distribution of facilities through the
net. Cloud facilities permit persons and companies to
custom software and hardware that are achieved by
other peoples at faraway sites. Instances of cloud
facilities comprise on the web document stowage,
communal interacting sites, webmail, and online
commercial services. This computing technology
archetypal lets right to use to info and computer
servers from wherever that a network linking is
offered.Thiscomputing technologydeliversacommon
puddle of servers, comprising infor stowage space,
networks, computer processing power, and specific
business and consumer requests.
II. Characteristics of Cloud Computing
The characteristics of Cloud computing [5] which
explains its relation and differencefromthetraditional
computing are given below:
• Virtualization: Virtualization refers to the
abstraction of computer resources (CPU, storage,
network, memory, application stack anddatabase)
from the applications andtheendusersconsuming
the service [6]. It is a technique which multiplexes
the hardware resources and enables the users to
run multiple operating systems on same physical
hardware. This technology helps in slicing a single
data center or high power server to act as multiple
machines. Thenumberofvirtualmachine,asystem
may be divided depends upon the hardware
configuration of system.
• On-Demand-SelfService:Consumercanprovision
or un-provisiontheserviceswhendesired,without
the human interaction with the service provider.
Whether it is software, platform or infrastructure
everything is offered as a service overthenetwork.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2561
• Elasticity: With elasticity, the user is able to
acquire more resources in an on demand manner,
for a small duration and pays for the capacity or
capability they need. When those resources are no
longer needed, the user is able to return that
capacity.
• Location Independence: Enables the users to
access the systems using awebbrowserregardless
of their location or what device they use (PC or
mobile phone). The services are provided to user
residing at any part of the world using their smart
phones, laptops, tablets and office computers.
These devices can be used wherever they are
located with a simple online access point.
• Multi-tenancy: The cloud providers serve the
multiple companies on same infrastructure and
software. This approach is more energy efficient
than multiple copies of software installed on
different infrastructure [7].
• Autonomic: To provide highly reliable services,
Clouds exhibit autonomic behavior by managing
themselves in case of failures or the performance
degradation.
• Measured Services: Due to affordable nature of
cloud, the user can pay on a pay as peruse model.
The cloud provider can measure the levels of
storageandprocessing,bandwidthandthenumber
of user accounts which can be billed accordingly.
• Maintenance: Maintenance of cloud computing is
easier because they do not need to be installed on
each user’s computer and can be accessed from
different places.
III. Challenges of Cloud Computing
The following are the challenges faced by cloud
computing environment [10]:
• Security and Privacy: It deals with securing the
stored data and to monitor the use of the cloud by
the service providers. This challenge can be
addressed[9] by storing the data into the
organization itself and allowing it to be used in the
cloud. So the security mechanisms between the
organizations and the cloud need to be robust.
• Service Delivery and Billing: The service level
agreements (SLAs) of the provider are not
adequate to guarantee the availability and
scalability as it is difficult to assess the cost
involved due to dynamic nature of services.
• Interoperability and Portability: As the cloud
environment is highly dynamic to user requests
and due to the concept of virtualization, the
leverage of migrating in and out of the resources
and applicationsshouldbeallowed.Also,switching
providers should switch between clouds as per
their need, and no lock-in period should exist.
• Reliability and Availability: Cloud providers still
lack in round-the-clock service which results in
frequent outages. Therefore, it becomes important
to monitor the service being provided using
internal or third party tools.
• Automatedserviceprovisioning:Akeyfeatureof
cloud computing is elasticity; resources can be
allocated or released automatically.Soastrategyis
required to use or release the resources of the
cloud, by keeping the same performance as
traditional systems and using optimal resources.
• Performance and Bandwidth Cost: Businesses
can save money on hardware but they have to
spend more for the bandwidth. This can be low
cost for smaller applications but can be
significantly high for the data-intensive
applications.
• Virtual Machines Migration: With virtualization
technology, an entire machine can be takenasafile
or set of files. To unload a heavily loaded physical
machine, it is required to move a virtual machine
between physical machines. The main objective is
to distribute the load in a datacenter or set of
datacenters. Then a strategy is required to
dynamically distribute load when moving virtual
machine to avoid bottlenecks in Cloud computing
system.
• Energy Cost: Cloud infrastructure consumes
enormous amounts of electricalenergyresultingin
high operating costs and carbon dioxide emissions
[10].
IV. Purposed Work
The purpose of the work is to inspect the safety
restriction and focus the present dangers trendy cloud
computing real safety procedures intended for cloud
computing schemes. It determination contribution the
academics to categorize safety provisions by several
stages to distinguish the fears in the numerous cloud
computing prototypes modeled by mutually interior
and exterior customers. Therefore, it will beneficial to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2562
explain cloud safetyprotocolsthatguaranteethesafety
of the cloud environment.
Although cloud computing has been widely used, the
research on resource management in cloud
environment is still an early stage. The main objective
of the research work is to investigate the relevant
efficient and enhancedresourceutilizationapproaches
for cloud based system. A brief description of the work
to be carried out is as under:
 Scheme will be developed to maintain the
integrity of information exchange between
participating systems.
 Scheme will be developed to authenticate the
participating system involved in
communication.
 Scheme will be developed to ensure the
confidentiality of the information exchanged
between participating systems.
 A secure model will be developed which will
comprise the above developed schemes.
Similar to entire computing schemes, cloud computing
organizations essentially reveal safety problems since
the earlyphasesi.e.requestsphasesandprojectphases
of its improvementprocedure.Itresolveprincipaltoan
extra vigorous, safe and fewer errors willing to system
than those systems that categorize safety substances
only on one occasion, once the scheme is addressed.
Owing to the difficulty of thecloudenvironment,actual
progress of a cloud computing scheme desires an
inspection of these safety difficulties and precondition
thus frequent approaches might be recognizedpriorin
the expansion procedure that drive reflect the
complete cloud. In cloud computing environs, inner
fears have graduallyimprovedabovethepreviouslittle
ages. Inner hazard depicts to individuals fears which
monitor inside the association. Inside customers in a
connotation usually have extra info of the data
reserved there in and in future, extra well-informed
about how to charge that information and
requirements thandoexternalcustomers.Whileinside
fears cannot be totally detached, some actual fences
can be developed to ease them.
4.1 Symbolization and Initiations
• FEncod: This is a script document that subjects the
encoded information and document is kept in CSP3.
• FTemp: It is determined through information
handling period (recovery process and drive to be
free) and this one is a provisional document.
• Gen_Key(): This produces a protected key.
• Ks: This is a key which is produced through
Gen_Key procedure in CSP-2.
• Encoding (): This is encoding procedure to encrypt
document.
• Decoding (): This is a decoding procedure to
decipher document.
This procedure negotiates of numerous additional
rules. The customers interrelate over the gateway
server over HTTPS procedure to upload their
information. The Docker repository clustering
procedure Docker Swarm obligates the situation
superior arrangement on gateway server. Thus
document send by customer is directly promoted
towards a nodule of the swarm collection wherever
swarm supervisor leads an indication to introduce a
repository and the information drive be equestriennes
arranged it and the repository willprocedureopenSSL
procedure to encode theinformationthroughAES,RSA
or some supplementarytypicalencodingprocedure.As
quickly as the encoding is complete, the repository
dismisses andtheencodedinformationishaggardback
towards the gateway server besides previously
endorsedtowardsthestowageserver.Thedocumentis
stimulatedaftergatewayservertoadditionalknotsand
servers through SSH procedure. The stowage server
obligates a collection of Docker nodules successively
that receipts disk space after the chief scheme.
Glusterfs procedure is castoff to band the information
interested in numerous pieces and also duplicates it to
a reserve nodule uncertaintysomeandaccumulationit
on the repository collection. In circumstance, the
customerstressestotransferhisinformationhesetsan
appeal over HTTPS on gateway server and at that time
the gateway server recovers the document from the
stowage server and forward it to its nodule for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2563
decoding that includes similar procedure as encoding.
The decoded information is dragged after the gateway
server and then accessible for the customer to get it.
Our suggested arrangement has two key assistances:
1) Effectiveness and safety: - The strategy suggested
through the innocuous is to depend on a unrestricted
and reserved key encoding willbeclear,effectiveinthe
practice of undisclosed key gen and Hash procedure.
Therefore each interval constraints are produced and
key interchangeproceedsplacesoextraprotectedthan
symmetric and asymmetric procedure. Though, our
strategy is supplementary effectual than the other
procedures, since, it does not need a lot of information
encoded in subcontracted and not any extra supports
on the representation chunk, and proportion is
supplementary protectedsinceweencodeinformation
to avoid illegal third revelries to distinguish its
subjects.
2) Open verifiability: We strategy a main difference to
deliver free authentication. Permit, person
supplementary than owner for info on the server has
verified proficient since it does not require the info for
individual chunk encoding.
V. Result Analysis
Implementation is the phase of the development at
what time the conjectural proposal is revolvedoutinto
a functioning method. Therefore it can be reflected to
remain the maximum precarious phase in attaining an
effective novel scheme and in giving the customer,
sureness that the novel system wills effort and stay
operative. The operational phase includes suspicious
preparation, examinationofthepresentsystemandit’s
limitations on execution, conniving of approaches to
accomplish exchange and assessment of exchange
approaches.
Here, our goal is to measure the Encryption and
Decryptionspeedofeachalgorithmfordifferentpacket
sizes. Encryption time is used to calculate the
throughput of an encryption scheme. It indicates the
speed of encryption. The throughput of the encryption
scheme is calculated by dividing the total plaintext in
Megabytes encrypted on the total encryption time for
each algorithmin.Asthethroughputvalueisincreased,
the powerconsumptionof this encryptiontechniqueis
decreased. By consideringdifferentsizes ofdatablocks
(0.5MB to 20MB) the algorithms were evaluated in
terms of the time required to encrypt and decrypt the
data block. All theimplementationswereexacttomake
sure that the results will be relatively fair and accurate
Firstly open the .NET. Encrypt and hashforencryption
purpose.
File successfully uploaded” after uploading of file.
e
encrypted file of that uploaded file.
3
fields username, email id and mobile number of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2564
user which are used earlier .
Now we have to choose the file which is to beuploaded
by clicking on choose file button. Then click on upload
file button to upload it.
VI. Conclusion and Future Scope
In this proposal, we have offered a summary of
information stowage safety in cloud computing and
projected a frame constructed on encryption system.
To guarantee the safety of customers’ information in
cloud stowage, we planned an operative and effective
encryptionapproachforimprovingsafetyondata-a-at-
rest. We have presented that our arrangement nearly
assurances the safety of information when it is kept in
the informationcenter of some Cloud Service Provider
(CSP). It will assistance to construct a ideal to protect
the information in the arena of cloud calculation. This
architecture is capable to expand the client fulfilment
to a countless degree and it will appeal numerous
nominees in this arena for developed as well as
upcoming investigation farms.
REFERENCES
[1] Aderemi A. Atayero, Oluwaseyi Feyisetan,“Security
Issues in Cloud Computing: The Potentials of
Homomorphic Encryption”, In Journal of Emerging
Trends in Computing and Information Sciences, Vol-2,
No.10, pp.546-552, October 2011
[2] Pengfei You, Yuxing Peng,WeidongLiu,ShoufuXue,
“Security Issues and Solutions in Cloud Computing”. In
32nd International Conference on Distributed
Computing System Workshops, pp.573-577, 2012
(2012)
[3] W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.t.
Abdullaha, “Cloud-Based Intrusion Detection Service
Framework”. In the Proceedings of the International
Conference on Cyber Security, pp. 213-218, IEEE, June
2012 .
[4] Abhishek Jain, Ashwani Kumar Singh, “Distributed
Denial of Service (DDOS) Attacks – Classification And
Implications”.InJournalofInformationandOperations
Management, ISSN: 0976-7754 & E-ISSN: 0976-7762,
Vol. 3, Issue 1, pp 136-140, 2012
[5]http://www.symantec.com/connect/articles/justify
ing-expense-ids-part-one-overview-rois-ids
[6]http://netsecurity.about.com/cs/hackertools/a/aa0
30504.htm
[36] Sanjay B Ankali, Dr. D V Ashoka, “Detection of
Request Layer DDoS Attack for Internet”. In
International Journal of Advanced Networking and
Applications, Vol-o3, Issue: 01, pp. 984-990, 2011.
[7]S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and
A.Ghalasi, “Cloud Compuating- The business
perspective”, DecisionSupport Systems, Vol.51(1),pp.
176-189, 2011.
[8]The NIST Definition of Cloud Computing,
http://csrc.nist.gov/publications/nistpubs/800-
/SP800-145.pdf.
[9] I. Brandic, “Towards self-manageable cloud
services”, IEEE International Conference on
Computer Software and Applications, pp.128-133,
2009.
[10] M. Alhamad, T. Dillon and E. Chang, “A survey on
SLA and performance measurement in cloud
computing”, On the Move to Meaningful Internet
Systems: OTM 2011, Springer Berlin Heidelberg,
pp. 469-477, 2011.
Ad

Recommended

IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET Journal
 
IRJET- Cloud Computing Review
IRJET- Cloud Computing Review
IRJET Journal
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
ijcsa
 
70 74
70 74
Editor IJARCET
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
50120140503020
50120140503020
IAEME Publication
 
Ad4502189193
Ad4502189193
IJERA Editor
 
G033030035
G033030035
ijceronline
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
106248842 cc
106248842 cc
homeworkping7
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
Les Williams
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
CSCJournals
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Get Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog Computing
Biren Gandhi
 
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
 
Cloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Chapeter 2 introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
IRJET - Cloud Computing Application
IRJET - Cloud Computing Application
IRJET Journal
 

More Related Content

What's hot (19)

Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
50120140503020
50120140503020
IAEME Publication
 
Ad4502189193
Ad4502189193
IJERA Editor
 
G033030035
G033030035
ijceronline
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
106248842 cc
106248842 cc
homeworkping7
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
Les Williams
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
CSCJournals
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Get Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog Computing
Biren Gandhi
 
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
 
Cloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET Journal
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
Les Williams
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
CSCJournals
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Get Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog Computing
Biren Gandhi
 
Addressing the cloud computing security menace
Addressing the cloud computing security menace
eSAT Publishing House
 
Cloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
 

Similar to Data Security Approach in Cloud computing using SHA (20)

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Chapeter 2 introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
IRJET - Cloud Computing Application
IRJET - Cloud Computing Application
IRJET Journal
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
IRJET Journal
 
Cloud computing
Cloud computing
pgayatrinaidu
 
Cloud security
Cloud security
Mohamed Shalash
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
IJERA Editor
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Eswar Publications
 
Ch-1-INTRODUCTION (1).pdf
Ch-1-INTRODUCTION (1).pdf
2BA19CS016BharatiJad
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
Cloud computing security
Cloud computing security
maheralgamdi
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
IJECEIAES
 
Fundamental of cloud computing
Fundamental of cloud computing
Vietnam Open Infrastructure User Group
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
A220113
A220113
irjes
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Cloud computing
Cloud computing
Sonu Khanna
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Chapeter 2 introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
IRJET - Cloud Computing Application
IRJET - Cloud Computing Application
IRJET Journal
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
IRJET Journal
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
IJERA Editor
 
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...
Eswar Publications
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
Cloud computing security
Cloud computing security
maheralgamdi
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
IJECEIAES
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
A220113
A220113
irjes
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Ad

More from IRJET Journal (20)

Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
Machine Learning - Classification Algorithms
Machine Learning - Classification Algorithms
resming1
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 

Data Security Approach in Cloud computing using SHA

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2560 Data Security Approach in Cloud computing using SHA Prabhleen Kaur Soul 1, Sunil Saini2 1RESEARCH SCHOOLAR 2ASSISTANT PROFESSOR Dept. of Computer Science and Engineering KITM Kurukshetra Haryana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract The main idea behind this paper is to provide integrity to the cloud storage area. In order to provide security in cloud computing we use SHA algorithm. In this method some important security services including key generation, encryption and decryption are provided in Cloud Computing system. Here the TPA is the trusted entity that has expertise and capabilities to assess cloud storage security on behalf of a data owner upon request. The main goal is to securely store and manage the data so that only authorized users can have access over the data. Key Words: SLA,AES, DES ,HTTPS 1. INTRODUCTION Cloud computing is considered as major part in a business for fulfilling the request at low cost. It is an internet based computingwhereapplication,platform, infrastructure are provided as services [2]. The main concept of this technology is that, the customers pay only for those services which used. Resources can be allocated geography anywhere and can provide any type of service that a user wants. Now user needs not to have any type of physical infrastructure. He/shehas to just use the services of this technology and pay according to usage of services. Cloud computing is a novel type of prototype, is coming. This term is a novel term that seems by the fourth season, 2007. The custom of internet and novel knowledge’s today, for commercial and designed for the present consumers, is previously portion of daily lifespan. Slightly info is obtainable wherever in the domain at marginally time. Thatwasnotprobablelittle ages before. Today it have ascended a lot of potentials of admission to open and isolated info similar to internet speedadmittanceorthesettingoutofportable dispositive that permit the linking to internet from virtually universally. Cloud computing discusses[3] to the provision of computing resources concluded the internet. In its place of custody information on your individual hard drive or apprising requests for your requirements, you practice a facility through the internet, at alternative place, to accumulate your info or use its requests. Doing so can provide increase to convinced confidentialityinsinuations.Thiscomputing technology is the distribution of facilities through the net. Cloud facilities permit persons and companies to custom software and hardware that are achieved by other peoples at faraway sites. Instances of cloud facilities comprise on the web document stowage, communal interacting sites, webmail, and online commercial services. This computing technology archetypal lets right to use to info and computer servers from wherever that a network linking is offered.Thiscomputing technologydeliversacommon puddle of servers, comprising infor stowage space, networks, computer processing power, and specific business and consumer requests. II. Characteristics of Cloud Computing The characteristics of Cloud computing [5] which explains its relation and differencefromthetraditional computing are given below: • Virtualization: Virtualization refers to the abstraction of computer resources (CPU, storage, network, memory, application stack anddatabase) from the applications andtheendusersconsuming the service [6]. It is a technique which multiplexes the hardware resources and enables the users to run multiple operating systems on same physical hardware. This technology helps in slicing a single data center or high power server to act as multiple machines. Thenumberofvirtualmachine,asystem may be divided depends upon the hardware configuration of system. • On-Demand-SelfService:Consumercanprovision or un-provisiontheserviceswhendesired,without the human interaction with the service provider. Whether it is software, platform or infrastructure everything is offered as a service overthenetwork.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2561 • Elasticity: With elasticity, the user is able to acquire more resources in an on demand manner, for a small duration and pays for the capacity or capability they need. When those resources are no longer needed, the user is able to return that capacity. • Location Independence: Enables the users to access the systems using awebbrowserregardless of their location or what device they use (PC or mobile phone). The services are provided to user residing at any part of the world using their smart phones, laptops, tablets and office computers. These devices can be used wherever they are located with a simple online access point. • Multi-tenancy: The cloud providers serve the multiple companies on same infrastructure and software. This approach is more energy efficient than multiple copies of software installed on different infrastructure [7]. • Autonomic: To provide highly reliable services, Clouds exhibit autonomic behavior by managing themselves in case of failures or the performance degradation. • Measured Services: Due to affordable nature of cloud, the user can pay on a pay as peruse model. The cloud provider can measure the levels of storageandprocessing,bandwidthandthenumber of user accounts which can be billed accordingly. • Maintenance: Maintenance of cloud computing is easier because they do not need to be installed on each user’s computer and can be accessed from different places. III. Challenges of Cloud Computing The following are the challenges faced by cloud computing environment [10]: • Security and Privacy: It deals with securing the stored data and to monitor the use of the cloud by the service providers. This challenge can be addressed[9] by storing the data into the organization itself and allowing it to be used in the cloud. So the security mechanisms between the organizations and the cloud need to be robust. • Service Delivery and Billing: The service level agreements (SLAs) of the provider are not adequate to guarantee the availability and scalability as it is difficult to assess the cost involved due to dynamic nature of services. • Interoperability and Portability: As the cloud environment is highly dynamic to user requests and due to the concept of virtualization, the leverage of migrating in and out of the resources and applicationsshouldbeallowed.Also,switching providers should switch between clouds as per their need, and no lock-in period should exist. • Reliability and Availability: Cloud providers still lack in round-the-clock service which results in frequent outages. Therefore, it becomes important to monitor the service being provided using internal or third party tools. • Automatedserviceprovisioning:Akeyfeatureof cloud computing is elasticity; resources can be allocated or released automatically.Soastrategyis required to use or release the resources of the cloud, by keeping the same performance as traditional systems and using optimal resources. • Performance and Bandwidth Cost: Businesses can save money on hardware but they have to spend more for the bandwidth. This can be low cost for smaller applications but can be significantly high for the data-intensive applications. • Virtual Machines Migration: With virtualization technology, an entire machine can be takenasafile or set of files. To unload a heavily loaded physical machine, it is required to move a virtual machine between physical machines. The main objective is to distribute the load in a datacenter or set of datacenters. Then a strategy is required to dynamically distribute load when moving virtual machine to avoid bottlenecks in Cloud computing system. • Energy Cost: Cloud infrastructure consumes enormous amounts of electricalenergyresultingin high operating costs and carbon dioxide emissions [10]. IV. Purposed Work The purpose of the work is to inspect the safety restriction and focus the present dangers trendy cloud computing real safety procedures intended for cloud computing schemes. It determination contribution the academics to categorize safety provisions by several stages to distinguish the fears in the numerous cloud computing prototypes modeled by mutually interior and exterior customers. Therefore, it will beneficial to
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2562 explain cloud safetyprotocolsthatguaranteethesafety of the cloud environment. Although cloud computing has been widely used, the research on resource management in cloud environment is still an early stage. The main objective of the research work is to investigate the relevant efficient and enhancedresourceutilizationapproaches for cloud based system. A brief description of the work to be carried out is as under:  Scheme will be developed to maintain the integrity of information exchange between participating systems.  Scheme will be developed to authenticate the participating system involved in communication.  Scheme will be developed to ensure the confidentiality of the information exchanged between participating systems.  A secure model will be developed which will comprise the above developed schemes. Similar to entire computing schemes, cloud computing organizations essentially reveal safety problems since the earlyphasesi.e.requestsphasesandprojectphases of its improvementprocedure.Itresolveprincipaltoan extra vigorous, safe and fewer errors willing to system than those systems that categorize safety substances only on one occasion, once the scheme is addressed. Owing to the difficulty of thecloudenvironment,actual progress of a cloud computing scheme desires an inspection of these safety difficulties and precondition thus frequent approaches might be recognizedpriorin the expansion procedure that drive reflect the complete cloud. In cloud computing environs, inner fears have graduallyimprovedabovethepreviouslittle ages. Inner hazard depicts to individuals fears which monitor inside the association. Inside customers in a connotation usually have extra info of the data reserved there in and in future, extra well-informed about how to charge that information and requirements thandoexternalcustomers.Whileinside fears cannot be totally detached, some actual fences can be developed to ease them. 4.1 Symbolization and Initiations • FEncod: This is a script document that subjects the encoded information and document is kept in CSP3. • FTemp: It is determined through information handling period (recovery process and drive to be free) and this one is a provisional document. • Gen_Key(): This produces a protected key. • Ks: This is a key which is produced through Gen_Key procedure in CSP-2. • Encoding (): This is encoding procedure to encrypt document. • Decoding (): This is a decoding procedure to decipher document. This procedure negotiates of numerous additional rules. The customers interrelate over the gateway server over HTTPS procedure to upload their information. The Docker repository clustering procedure Docker Swarm obligates the situation superior arrangement on gateway server. Thus document send by customer is directly promoted towards a nodule of the swarm collection wherever swarm supervisor leads an indication to introduce a repository and the information drive be equestriennes arranged it and the repository willprocedureopenSSL procedure to encode theinformationthroughAES,RSA or some supplementarytypicalencodingprocedure.As quickly as the encoding is complete, the repository dismisses andtheencodedinformationishaggardback towards the gateway server besides previously endorsedtowardsthestowageserver.Thedocumentis stimulatedaftergatewayservertoadditionalknotsand servers through SSH procedure. The stowage server obligates a collection of Docker nodules successively that receipts disk space after the chief scheme. Glusterfs procedure is castoff to band the information interested in numerous pieces and also duplicates it to a reserve nodule uncertaintysomeandaccumulationit on the repository collection. In circumstance, the customerstressestotransferhisinformationhesetsan appeal over HTTPS on gateway server and at that time the gateway server recovers the document from the stowage server and forward it to its nodule for
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2563 decoding that includes similar procedure as encoding. The decoded information is dragged after the gateway server and then accessible for the customer to get it. Our suggested arrangement has two key assistances: 1) Effectiveness and safety: - The strategy suggested through the innocuous is to depend on a unrestricted and reserved key encoding willbeclear,effectiveinthe practice of undisclosed key gen and Hash procedure. Therefore each interval constraints are produced and key interchangeproceedsplacesoextraprotectedthan symmetric and asymmetric procedure. Though, our strategy is supplementary effectual than the other procedures, since, it does not need a lot of information encoded in subcontracted and not any extra supports on the representation chunk, and proportion is supplementary protectedsinceweencodeinformation to avoid illegal third revelries to distinguish its subjects. 2) Open verifiability: We strategy a main difference to deliver free authentication. Permit, person supplementary than owner for info on the server has verified proficient since it does not require the info for individual chunk encoding. V. Result Analysis Implementation is the phase of the development at what time the conjectural proposal is revolvedoutinto a functioning method. Therefore it can be reflected to remain the maximum precarious phase in attaining an effective novel scheme and in giving the customer, sureness that the novel system wills effort and stay operative. The operational phase includes suspicious preparation, examinationofthepresentsystemandit’s limitations on execution, conniving of approaches to accomplish exchange and assessment of exchange approaches. Here, our goal is to measure the Encryption and Decryptionspeedofeachalgorithmfordifferentpacket sizes. Encryption time is used to calculate the throughput of an encryption scheme. It indicates the speed of encryption. The throughput of the encryption scheme is calculated by dividing the total plaintext in Megabytes encrypted on the total encryption time for each algorithmin.Asthethroughputvalueisincreased, the powerconsumptionof this encryptiontechniqueis decreased. By consideringdifferentsizes ofdatablocks (0.5MB to 20MB) the algorithms were evaluated in terms of the time required to encrypt and decrypt the data block. All theimplementationswereexacttomake sure that the results will be relatively fair and accurate Firstly open the .NET. Encrypt and hashforencryption purpose. File successfully uploaded” after uploading of file. e encrypted file of that uploaded file. 3 fields username, email id and mobile number of the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2564 user which are used earlier . Now we have to choose the file which is to beuploaded by clicking on choose file button. Then click on upload file button to upload it. VI. Conclusion and Future Scope In this proposal, we have offered a summary of information stowage safety in cloud computing and projected a frame constructed on encryption system. To guarantee the safety of customers’ information in cloud stowage, we planned an operative and effective encryptionapproachforimprovingsafetyondata-a-at- rest. We have presented that our arrangement nearly assurances the safety of information when it is kept in the informationcenter of some Cloud Service Provider (CSP). It will assistance to construct a ideal to protect the information in the arena of cloud calculation. This architecture is capable to expand the client fulfilment to a countless degree and it will appeal numerous nominees in this arena for developed as well as upcoming investigation farms. REFERENCES [1] Aderemi A. Atayero, Oluwaseyi Feyisetan,“Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”, In Journal of Emerging Trends in Computing and Information Sciences, Vol-2, No.10, pp.546-552, October 2011 [2] Pengfei You, Yuxing Peng,WeidongLiu,ShoufuXue, “Security Issues and Solutions in Cloud Computing”. In 32nd International Conference on Distributed Computing System Workshops, pp.573-577, 2012 (2012) [3] W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah, M.t. Abdullaha, “Cloud-Based Intrusion Detection Service Framework”. In the Proceedings of the International Conference on Cyber Security, pp. 213-218, IEEE, June 2012 . [4] Abhishek Jain, Ashwani Kumar Singh, “Distributed Denial of Service (DDOS) Attacks – Classification And Implications”.InJournalofInformationandOperations Management, ISSN: 0976-7754 & E-ISSN: 0976-7762, Vol. 3, Issue 1, pp 136-140, 2012 [5]http://www.symantec.com/connect/articles/justify ing-expense-ids-part-one-overview-rois-ids [6]http://netsecurity.about.com/cs/hackertools/a/aa0 30504.htm [36] Sanjay B Ankali, Dr. D V Ashoka, “Detection of Request Layer DDoS Attack for Internet”. In International Journal of Advanced Networking and Applications, Vol-o3, Issue: 01, pp. 984-990, 2011. [7]S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A.Ghalasi, “Cloud Compuating- The business perspective”, DecisionSupport Systems, Vol.51(1),pp. 176-189, 2011. [8]The NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800- /SP800-145.pdf. [9] I. Brandic, “Towards self-manageable cloud services”, IEEE International Conference on Computer Software and Applications, pp.128-133, 2009. [10] M. Alhamad, T. Dillon and E. Chang, “A survey on SLA and performance measurement in cloud computing”, On the Move to Meaningful Internet Systems: OTM 2011, Springer Berlin Heidelberg, pp. 469-477, 2011.