Cloud Computing
Cloud Computing
cloud computing
BY
ABDUL RAOOF
HAKIM SHABER
Abstract:-
• The cloud computing platform gives people the opportunity for sharing resources,
services and information among the people of the whole world
• In private cloud system, information is shared among the persons who are in that
cloud.
• In this paper we have proposed new security architecture for cloud computing
platform
• AES based file encryption system and asynchronous key system for exchanging
information or data is included in this model.
• This ensures secure communication system and hiding information from others
Introduction:-
• Cloud computing is one the most important and developing concept for both
the developers and the users
• Resources are shared among all of the servers, users and individuals.
• In the area of cloud computing different security models and algorithms are
applied
• we have proposed new security architecture for cloud computing platform
• In this model high ranked security algorithms are used for giving secured
communication process
Contd.
• Our proposed model distributive server concept is used, thus ensuring
higher security
• It also helps to solve main security issues like malicious intruders,
hacking
• The RSA algorithm is used for secured communication between the
users and the servers.
Previous work
• Identification based cloud computing security model have been worked
out by different researchers
• Yao’s Garbled Circuit is used for secure data saving in cloud servers
• AES based file encryption system is used in some of these models. But
these models keep both the encryption key and encrypted file in one
database server
• Only one successful malicious attack in the server may open the whole
information files to the hacker.
Proposed model
secure Normal
connection connection
Contd.
• In our proposed model we have worked with the following security
algorithms:-
• RSA algorithm for secured communication
• AES for Secured file encryption
• MD5 hashing for cover the tables from user
• One time password for authentication
Cont.
RSA Algorithm
• The RSA algorithm is the most commonly used encryption and authentication
algorithm and is included as part of the Web browsers from Microsoft and Netscape
• RSA is an algorithm for public-key cryptography, involves a public key and a private
key
• The basic steps of RSA algorithm are:
• Key Generation
• Encryption and
• Decryption
AES Algorithm:
• In this paper we have proposed a newer security structure for cloud computing
environment which includes AES file encryption system, RSA system for secure
communication, Onetime password to authenticate users and MD5 hashing for
hiding information. This model ensures security for whole cloud computing
structure
• In our proposed system, an intruder cannot easily get information and upload the
files because he needs to take control over all the servers, which is quite difficult.
The model, though it is developed in a cloud environment, individual servers’
operation has got priority here. So, decision taking is easy for each server, like
authenticate user, give access to a file etc.
Future work
• In our proposed model we have used RSA encryption system which is
deterministic. For this reason, it becomes fragile in long run process.
But the other algorithms make the model highly secured. In future we
want to work with ensuring secure communication system between users
and system, user to user. We also want to work with encryption
algorithms to find out more light and secure encryption system for
secured file information preserving system.
Acknowledgement: