0% found this document useful (0 votes)
65 views5 pages

Cloud Security Ecosystem For Data Security and Privacy: Domain Algorithms Framework Platform

The document proposes a hybrid cryptographic system using a combination of symmetric and asymmetric encryption algorithms to create a secure cloud computing environment. The system aims to provide security measures at all levels including user authentication, authorization, data transmission, and encryption. It will leverage RSA (asymmetric) and AES (symmetric) algorithms and be implemented as a framework in Java with a live cloud deployment on services like Amazon Web Services, Azure, and Heroku.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views5 pages

Cloud Security Ecosystem For Data Security and Privacy: Domain Algorithms Framework Platform

The document proposes a hybrid cryptographic system using a combination of symmetric and asymmetric encryption algorithms to create a secure cloud computing environment. The system aims to provide security measures at all levels including user authentication, authorization, data transmission, and encryption. It will leverage RSA (asymmetric) and AES (symmetric) algorithms and be implemented as a framework in Java with a live cloud deployment on services like Amazon Web Services, Azure, and Heroku.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cloud Security Ecosystem for Data Security

and Privacy

Domain Cloud Computing

Algorithms Hybrid Cryptographic System

Framework Java

Platform Live Cloud Deployment through Amazon Web service/


Azure/ Heroku

Abstract

In the past couple of years Cloud Computing has become an eminent part of
the IT industry. Because of its economic benefits more and more people are
heading towards Cloud adoption.

In present times there are numerous Cloud Service providers (CSP) allowing
customers to host their applications and data onto Cloud.

However Cloud Security continues to be the biggest obstacle in Cloud


adoption and thereby prevents customers from accessing its services. Various
techniques have been implemented by cloud service providers in order to mitigate
risks pertaining to Cloud security.

In this project, we present a Hybrid Cryptographic System (HCS) that


combines the benefits of both symmetric and asymmetric encryption thus resulting
in a secure Cloud environment.
The project focuses on creating a secure Cloud ecosystem wherein we make
use of multifactor authentication along with multiple levels of hashing and
encryption.

The proposed system along with the algorithm are simulated using the
CloudSim simulator. To this end, we illustrate the working of our proposed system
along with the simulated results.

Background

In today’s times Cloud computing has a significant impact on the IT industry.


With growing popularity more and more organizations are making use of cloud
services. Although cloud services have a widespread acceptance but the fear
pertaining to security and privacy of these services still continue to be an open
challenge. With rapid technological advancements these services could be easily
accessed through smart phones thus allowing users to share pictures, video,
documents and other important data across various platforms on a real time basis.
However, a security breach in there cloud account could lead to stolen data which
would indeed result in huge losses

Security has always been a concern in the domain of information technology.


With Cloud services handling critical data which can be accessed from anywhere
through the internet makes security a prominent concern. The pervasive nature of
Cloud and its disbursal of data across various geographical locations amounts to
high security risks. While talking of Cloud Security there are many aspects which
one needs to consider such as, trusted authentication, appropriate authorization
,data security and privacy. These are some of the basic security goals which are
extremely essential for every cloud provider to incorporate. Since security has been
seen as an attribute for information technology, data encryption has been one of its
key measures in ensuring data security protection. Many algorithms in the past
have been proposed for conducting efficient data encryption. These algorithms
range from Diffie-Hellman, RSA, DES to AES, RC4 and 3DES. Each of these
algorithms have their own advantages along with their demerits. These algorithms
are broadly classified as being symmetric or asymmetric in nature

Existing Systems and their Drawbacks

 Diffie-Hellman
 RSA
 DES/ AES
 RC4 and
 3DES

Many solutions have been proposed to provide security measures using one or the
other algorithms listed above.

Drawbacks

Each algorithm have its own drawback and none of the existing solutions provide
security measures at all the levels of user/system operations.

Proposed System

Our focus in this project would be to create a Secure Cloud Ecosystem that
leverages from the benefits of both symmetric and asymmetric encryption. We
make use of RSA (Asymmetric) and AES (Symmetric) algorithms for carrying out
data encryption. We aim at creating a comprehensive Cloud Environment that has
security measures at all levels from creating and storing username and password,
multifactor authentication, transmission of user data and data encryption

Advantages of the proposed system


Security measures have been taken at all levels from creating and storing
username and password, multifactor authentication, transmission of user
data and data encryption

System Architecture

Hardware Requirements

Processor Intel Core i5 or AMD FX 8 core series with clock speed


of 2.4 GHz or above
RAM 2GB or above
Hard disk 40 GB or above
Input device Keyboard or mouse or compatible pointing devices
Display XGA (1024*768 pixels) or higher resolution monitor
with 32 bit color settings
Miscellaneous USB Interface, Power adapter, etc
Software Requirements

Operating System Windows XP or above


Programming Language Core Java, Advanced Java, J2EE, Map Reduce
– Backend Framework, MVC Framework
Programming language Bootstrap Framework, HTML, CSS, JavaScript, Ajax,
- Frontend JQuery
Development Eclipse Oxygen IDE
environment
Application Server Apache Tomcat v9.0
Database MySQL or Oracle

You might also like