Enhancing Cloud Security by Using Hybrid Encryption Scheme: Research Paper
Enhancing Cloud Security by Using Hybrid Encryption Scheme: Research Paper
Enhancing Cloud Security by Using Hybrid Encryption Scheme: Research Paper
E-ISSN 0976-3945
Research Paper
INTRODUCTION
Cloud computing model has emerged recently and it
has taken commercial computing to a new level. The
concept of cloud computing aim on the idea that
computing resources will reside somewhere other
than the computer room and that the customers will
attach to it using the resources as and when required.
In effect, it displaces the infrastructure to the network
so that the net price with respect to the management
of hardware/software resources is reduced. It appears
to be highly disruptive technology hinting to the
future where computation moves from local
computers to integrate opportunities operated by third
party compute and storage utilities. Cloud Computing
is typically defined as a type of computing that
depends on distributing computing resources rather
than having local server or personal device to manage
services. In Cloud Computing, the term cloud is used
as a metaphor for the Internet, so the phrase cloud
computing means a type of Internet-based
computing, where different facilities such as servers,
storage and applications are provided to a company
computers and devices through the internet. One of
the key characteristics of cloud computing is the
mouldability that it offers and one of the ways that
mouldability is offered is through scalability. This
refers to the capability of a system to adjust and scale
to changes in workload. Cloud technology allows for
the automatic provision and deprivation of resource
as and when it is necessary, thus ensuring that the
level of resource available is as closely resembled to
latest demand as possible. This is a defining
characteristic that differentiates it from other
computing models where facility is delivered in parts
(e.g., individual servers, downloaded software
applications), usually with confirmed volume and
upfront costs. With cloud computing, the end user
usually pays only for the resource they use and so
keep away the disorganization and cost of any unused
capacity.
PROBLEM FORMULATION
This system developed a cloud-computing
environment by using 5 machines with minimum
dual Core processor and 2 gigabytes of random
access memory. These machines are connected to
each other and are loosely coupled to each other for
synchronization process. MacAfee security solutions
are used for prevention of attacks on every machine.
Int J Adv Engg Tech/Vol. VI/Issue IV/Oct.-Dec.,2015/34-40
TOOL USED
Introduction of CloudSim
CloudSim is a toolkit (library) for simulation of
Cloud computing framework. It gives fundamental
classes for describing data centers, virtual machines,
applications, users, computational services, and
policies for administration of diverse parts of the
system (e.g., scheduling and provisioning).
MAC layer Protocol: TDMA, CDMA, IEEE Mac
802.x etc.
Introduction of Cloud Analyst
CloudAnalyst is built directly on top of CloudSim
toolkit, leveraging the features of the real structure
and extending some of the capabilities of CloudSim.
CloudAnalyst design. Even though Clouds make
deployment of large scale applications easier and
cheaper, it also creates new issues for planers.
Because Cloud frameworks are distributed,
applications can be deployed in different geographic
locations, and the selected distribution of the
application effects its performance for users that are
far from the data center. Because users around the
world access Internet applications, and because
popularity of applications varies along the world,
experience in the use of application will also vary.
Quantifying impact of number of simultaneous users,
geographic location of relevant components, and
network in applications is hard to achieve in real
testbeds, because of the presence of elements that
cannot be predicted nor controlled by developers.
E-ISSN 0976-3945
E-ISSN 0976-3945
E-ISSN 0976-3945
B = B + S[1];
for i = 1 to r do
A = (( A B ) <<< B ) + S[ 2 * i ];
B = (( B A) <<< A ) + S[ 2 * i + 1];
1.
2.
3.
4.
Fig. 4.4- Time taken for file downloading (1)
E-ISSN 0976-3945
Fig. 4.6- Shows cloud allocation complete region wise after creating various datacenter
Fig. 4.8- Hour base usage and response time after using proposed Algorithm
E-ISSN 0976-3945
13.
14.
15.
16.
17.
18.
19.
E-ISSN 0976-3945