Hybrid Intrusion Detection System For Cloud Computing Environments
Hybrid Intrusion Detection System For Cloud Computing Environments
Today data sharing and maintaining its security is major challenge. User in the data
sharing system upload their file with the encryption using private key. This property is
especially important to any large scale data sharing system, as any user leak the key
information then it will become difficult for the data owner to maintain security of the
information. In this paper provide a concrete and efficient instantiation of scheme,
prove its security and provide an implementation to show its practicality. There are
lots of challenges for data owner to share their data on servers or cloud. There are
different solutions to solve these problems. These techniques are very much critical
to handle key shared by the data owner. This paper will introduce the trusted
authority to authenticate user those who have the access to the data on cloud. SHA
algorithm is used by the trusted authority to generate the key and that key will get
share to user as well as the owner. The trusted authority module receives encrypted
file using AES Algorithm from the data owner and computes hash value using MD-5
algorithm. It stores key in its database which will be used during the dynamic
operations and to determine the cheating party in the system (CSP or Owner).
Trusted authority send file to CSP module to store on cloud. The resulting key sets
are shown to have a number of desirable properties that ensure the confidentiality of
communication sessions against collusion attacks by other network nodes
V
TABLE OF CONTENTS
2 SYSTEM REQUIREMENTS 08
2.1 Hardware Requirements 08
2.2 Software Requirements 08
2.3 Introduction 08
2.4 Application of Java 08
2.5 Features of Java 09
2.6 Collection Framework 10
2.7 MySql 11
2.8 Feasibility Study 12
2.10 Technical Feasibility 12
VI
2.11 Social Feasibilty 13
2.12 Requirement Analysis 13
2.13 Functional Requirements 13
2.14 Non Functional Requirements 14
2.14.1 Portability 14
2.14.2 Performance 14
2.14.3 Accuracy 14
3 SYSTEM IMPLEMENTATION 15
3.1 Implementation 15
3.2 Login Module 15
3.3 Registration Module 15
3.4 Creation Storage and Instance 16
3.5 Find Collusion Module 16
3.6 Find Third Party Module 16
3.7 UML Diagram 16
3.8 Goals 17
3.9 Use Case Diagram 17
3.10 Class Diagram 18
3.11 Sequence Diagram 19
VII
4.4 Integration Testing 25
4.4.1 Acceptance Testing 26
4.4.2 Alpha Testing 26
4.4.3 Beta Testing 26
VIII
LIST OF FIGURES
IX
LIST OF ABBREVIATIONS
X
CHAPTER-1
INTRODUCTION
1.1 ESTABLISHMENT
A salted hash algorithm is improved to hash the character sequences and the indexes
of cost matrices, so as to defend against statistical attacks. An additive order
preserving encryption algorithm is designed to encrypt the elements of cost matrices.
Also, this algorithm can achieve an indistinguishability under additive ordered chosen-
plaintext attack with linear time complexity.
1
A single cloud server works for the first time to provide a privacy-preserving
computable outsourcing service to effectively resist collusion attacks from the cloud.
Withpre-processing modules of padding,partition,and expansion, there is no need to
decrypt any outsourced data in the non-interactive sequence comparison stage.
Simulation results show that the overall execution performance of our E-SC is
negatively correlated with its security.
1.2 OBJECTIVE
The main objective of this system is, SHA algorithm is used by the trusted
authority to generate the key and that key will get share to user as well as the owner.
The trusted authority module receives encrypted file using AES Algorithm from the
data owner and computes hash value using MD-5 algorithm.
The major part of the project development sector considers and fully survey all
the required needs for developing the project. For every project Literature survey is
the most important sector in software development process. Before developing the
tools and the associated designing it is necessary to determine and survey the time
factor, resource requirement, man power, economy, and company strength. Once
these things are satisfied and fully surveyed, then the next step is to determine about
the software specifications in the respective system such as what type of operating
system the project would require, and what are all the necessary software are needed
to proceed with the next step such as developing the tools, and the associated
operations.
2
1.3.1 TITLE: Efficient and verifiable outsourcing scheme of sequence
comparisons
AUTHOR:Y.Feng,H.Ma,andX.Chen
With the rapid development of cloud computing, the techniques for securely
outsourcing prohibitively expensive computations are getting widespread attentions in
the scientific community. In the outsourcing computation paradigm, the clients with
resource-constrained abilities can outsource the heavy computation workloads into
the cloud server and enjoy unlimited computing resources in a pay-per-use manner.
One of the most critical functionalities in outsourcing computation is the verifiability of
the result. That is, the client should efficiently verify the validity of the result returned
by the cloud servers. In this paper, we solve the problem of verifiable outsourcing
computation of sequence comparisons by integrating the technique of Yao‟s garbled
circuit with homomorphic encryption. Compared with the existing schemes, our
proposed solution enables clients to efficiently detect the misbehavior of dishonest
servers. Furthermore, our construction re-garbles the circuit only for malformed
responses and thus is very efficient for real-world applications. Besides, we also
present the formal analysis for our proposed construction.
3
AUTHOR: M. J. Atallah, F. Kerschbaum, and W. Du
4
represents an important first step toward providing data privacy for a practical and
important real-world algorithm.