Secure Cloud Simulation: A Synopsis Submitted by
Secure Cloud Simulation: A Synopsis Submitted by
Secure Cloud Simulation: A Synopsis Submitted by
A Synopsis submitted
by
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING,
DIT UNIVERSITY, DEHRADUN
(State Private University through State Legislature Act No. 10 of 2013 of Uttarakhand and approved by UGC)
1. INTRODUCTION 1
2. FEASIBILITY STUDY 3
3. METHODOLOGY 4
4. FACILITIES REQUIRED 5
7. REFERENCES 7
Introduction
After doing the survey and studying the research papers it is found that the major security
concerns of cloud computing includes Data leakage, Distributed Denial of Service (DDOS).
The data security can be improved by implementing various symmetric key algorithms so
that data on the server is stored in a manner that even if a person gets access then also he
can't open the original data. As it needs to be decrypted. Apart from storage security,
authorised access of users enable may help in avoiding DDOS as only genuine users will
have access to the cloud.
Problem Statement:
Currently, data security and privacy policy has been regarded as one of the biggest concerns
in cloud computing. Data stored at remote storage is unsafe and susceptible to get hacked.
Due to this, users do not trust their data over the cloud. Cloud consumers wants an assurance
that they can access their data where ever they want and no one else is able to get it.
Moreover, authentication of users over the cloud is also an important concern to think about.
Benefits are:
2
Feasibility Study
The Project simulates a model that is already quite common for consumer apps like email
and photo sharing, and for certain business applications. But in this project, we present a
way to secure the data using different compression and encryption algorithms and to hide its
location from the users that stores and retrieves it. As with the Internet, on-demand
applications have grown so ubiquitous that almost every business user interacts with at least
one, whether it's an email service, a Web conferencing application, or a file hosting system.
The data is stored at multiple places over the information space (over the Internet). It sounds
similar to file hosting websites which stores the data that is being uploaded by different
users and can be retrieved using proper authentication. The only difference is that the
system for which project is targeted is an application based system like which will run on
the clients own system. This application will allow users to upload file of different formats
with security features including Encryption and Compression over the cloud securely.
The uploaded files can be accessed from anywhere using the application which is provided.
We believe this system serves as a foundation for future work in integrating and securing
information sources across the World Wide Web.
3
Methodology
As computer science students, our task is to figure out which platform components are
going to allow us to build all of these features. The system architecture shows the core
design of the application. The system serves the purpose of file hosting and hence requires a
server that holds data. Multiple clients can log in to the server and share files. The system
should work in the flow as shown below:
User should register on website and download the application and install it.
User has to log in through the application and performs operation user wants.
User should register on website and download the application and install it.
Database is in 3rd normal form.
Data compression by using zipping up-to 70%.
Data size is 4MB with full binary support.
Existing system is updated from 3 tiers to N tier that improve the security.
256 bit AES encryption algorithm is used for file security.
Proposed system is multi-cloud compatible that is it is independent of backend
services and infrastructure.
All the quality attributes are taken into consideration and it comprises of all persistent
systems standards.
Facilities Required
Hardware Requirements:
Software Requirements:
4
Innovativeness & Usefulness
IaaS (Infrastructure as a service) is the foundation layer of the Cloud Computing delivery
model that consists of multiple components and technologies. Each component in Cloud
infrastructure has its vulnerability which might impact the whole Cloud’s computing
security. Cloud Computing business grows rapidly despite security concerns, so
collaborations between Cloud parties would assist in overcoming security challenges and
promote secure Cloud Computing services. In this project, we will investigate the security
challenges that associate it with IaaS implementation and deployment. The security issues
presented here concern the security of each IaaS component in addition to recent proposed
solutions. Our future research vision will focus on two directions to provide confidentiality,
integrity, and secure Infrastructure management for IaaS service. Finally, a prototype will be
implemented to demonstrate the system feasibility and performance.
Currently, we are in the design phase of our project. We have successfully completed our
survey and research about various security challenges faced in cloud computing industry.
After this, we analysed and compared various algorithms and techniques that could be used
to solve data leakage and other security issues. We are focusing on the implementation of
this prototype using Java technologies to enable portability and platform independence. We
believe that we’ll be able to complete the implementation, deployment and load testing of
the solution in the given time.
5
6
References
1. Qin Liu, Guojun Wang, and Jie Wu“Efficient Sharing of Secure Cloud Storage
Services” 2010 .10th IEEE International Conference on Computer and Information
Technology (CIT - 2010).
2. Uma Somani, Kanika Lakhani, Manish Mundra“Implementing Digital Signature
with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud
Computing” 2010 IEEE 1st International Conference on Parallel, Distributed and
Grid Computing (PDGC - 2010).
3. Ashutosh Kumar Dubey 1, Animesh Kumar Dubey 2, Mayank Namdev3, Shiv
Shakti Shrivastava4 “Cloud-User Security Based on R SA and MD5 Algorithm for
Resource Attestation and Sharing in Java Environment “in 2011.
4. Xiang Tana, Bo Aib“The Issues of Cloud Computing Security in High-speed
Railway “in 2011.
5. Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S.
Lui “A Secure Cloud Backup System with Assured Deletion and Version Control”
2011 International Conference on Parallel Processing Workshops.
6. Eman M.Mohamed and Sherif EI-Etriby “Randomness Testing of Modem
Encryption Techniques in Cloud Environment” in year 2008.