CHAPTER 1 Old
CHAPTER 1 Old
CHAPTER 1
INTRODUCTION
A system providing a secured vault in cloud environment using “Simple and Secured
Cryptography System of Cloud Computing” [1].
There are various cryptographic algorithms that can be used. Ideally, a user needs a
cryptographic algorithm which is of low cost and high performance. However, in reality
such algorithm which is a one stop solution does not exist. There are several algorithms
with a cost performance trade-off [5].
The old-style approach of storing documents was to write the min MS Word but that might
be substituted by Cloud Computing. It is a more effective way of doing that task as the
user can just log into his account and use the Google Document Service provided by
Google [12].
Many researchers tried to secure various credentials of users such as secure login, storing
data/file with encryption, key management etc. By any means, if a hacker enters into the
system, he may steal data/files from could end. If one intruder may successfully enter to
cloud environment, then there is no way to detect him as a thief. By his credential he may
access all data of the system. We offered such a system/environment that if anyone enters
into cloud end by any means; he will not succeed to get data/files from the cloud end [1].
They used multi-factor authentication for ensuring data security. They also send One Time
Password (OTP) to the users by mail for successfully login. After successfully login, users
can send or retrieve data from cloud environment. Ones data reaches to cloud end, data
will undergo in encryption process and stored in the cloud. They used hybrid cryptography
system including RSA and AES. This system seems to be good for data security, but if
any intruder gets credentials of any user, he will able to change or modify data [1].
1|Page
Introduction
➢ Cloud data security is an actively research area in the field of cloud computing. Data
privacy, data integrity has emerged as an important problem in cloud storage and
Public cloud.
➢ A number of algorithms have been applied to secure the data in cloud storage.
Algorithms like RSA, BLOWFISH, AES, SHA - 128 etc have been successfully
applied to cloud data storage, though this algorithm will be depreciated soon and
computing power is increasing.
➢ To check the possibility of using this technique in Environment like Public Cloud,
If possible then determine maximum number of users that can access the system
without any issues
➢ Determine the parameters required for successful implementation of this system for
“say 1 million users”
▪ Processing power
▪ Memory
▪ IO Access
▪ Band Width
1.3 Motivation
2|Page
Introduction
Public Cloud: Secure Vault can be useful in secure personal data/ important Files of
users.
Secure Vault: if anyone can apply these technics in Vault then it will good for security.
3|Page
Introduction
Chapter 1 deals with the introduction to FER system and the introduction of research
work.
Chapter 2 deals with the detail explanation of the theoretical background and literature
survey of the research work.
Chapter 3 explain the proposed work and the experimental tools used for implementing
the proposed work.
Chapter 4 includes the experimental results and implementation details. This includes
the comparison of the proposed work.
Chapter 5 contains the main conclusions of all the work proposed in this thesis. It also
covers the future directions for this proposed work.
4|Page