Computer Science Education Project Topics

Computer Cloud Security System

Computer Cloud Security System

Computer Cloud Security System

CHAPTER ONE

Objective of the Study

Due to the issue of security and privacy on cloud computer the researcher objectives to this study are as fellows.

  1. Design an encryption system attached to the system that will enable any user before sending data to the cloud be encrypted with security key
  2. Device a means of sharing data in a more secure and reliable manner over the cloud system.
  3. Create the awareness of the security threats in cloud computer to the people so as the alert them on how to secure there information.

CHAPTER TWO

LITERATURE REVIEW

Introduction

Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps is to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration r taken into account for developing the proposed system. (Lee et al, 2009)

Security in the SPI model

The cloud model provides three types of services

  • Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email).
  • Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure his own applications without installing any platform or tools on their local machines. PaaS refers to providing platform layer resources, including operating system support and software development frameworks that can be used to build higher-level services.
  • Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.

With SaaS, the burden of security lies with the cloud provider. In part, this is because of the degree of abstraction, the SaaS model is based on a high degree of integrated functionality with minimal customer control or extensibility. By contrast, the PaaS model offers greater extensibility and greater customer control. Largely because of the relatively lower degree of abstraction, IaaS offers greater tenant or customer control over security than do PaaS or SaaS.

Before analyzing security challenges in Cloud Computing, we need to understand the relationships and dependencies between these cloud service models. PaaS as well as SaaS are hosted on top of IaaS; thus, any breach in IaaS will impact the security of both PaaS and SaaS services, but also it may be true on the other way around. (Takabi, et al, 2019). However, we have to take into account that PaaS offers a platform to build and deploy SaaS applications, which increases the security dependency between them. As a consequence of these deep dependencies, any attack to any cloud service layer can compromise the upper layers. Each cloud service model comprises its own inherent security flaws; however, they also share some challenges that affect all of them. These relationships and dependencies between cloud models may also be a source of security risks. A SaaS provider may rent a development environment from a PaaS provider, which might also rent an infrastructure from an IaaS provider. Each provider is responsible for securing his own services, which may result in an inconsistent combination of security models. It also creates confusion over which service provider is responsible once an attack happens. (Shweta Dinesh and Bijweet, 2015).

 

CHAPTER THREE

SYSTEM DESIGN AND ANALYSIS

Existing System:

From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.

1 . Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging.

2 . Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance.

These techniques, while can be useful to ensure the storage correctness without having users possessing data, can not address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As an complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited.

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND INTEGRATION

Implementation

Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.

CHAPTER FIVE

SUMMARY AND CONCLUSION

5.1 CONCLUSION

In this research, we investigated the problem of data security in cloud data storage, which is essentially a distributed storage system. To ensure the correctness of users’ data in cloud data storage, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block  update, delete, and append.We rely on erasure-correcting code in the file distribution preparation to provide redundancy parity vectors and guarantee the data dependability. By utilizing the homomorphic token with distributed verification of erasurecoded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., whenever data corruption has been detected during the storage correctness verification across the distributed servers, we can almost guarantee the simultaneous identification of the misbehaving server(s). Through detailed security and performance analysis, we show that our scheme is highly efficient and resilient to Byzantine failure, malicious data modification attack, and even server colluding attacks.

Conclusion

We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. We envision several possible directions for future research on this area. The most promising one we believe is a model in which public verifiability is enforced. Public verifiability, supported in allows TPA to audit the cloud data storage without demanding users’ time, feasibility or resources. An interesting question in this model is if we can construct a scheme to achieve both public verifiability and storage correctness assurance of dynamic data. Besides, along with our research on dynamic cloud data storage, we also plan to investigate the problem of fine-grained data error localization.

REFERENCES

  • Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept. University of California, Berkeley, No.UCB/EECS-2009-28[Online]. Available: http://radlab.cs.berkeley.edu/
  • Takabi, J.B.D. Joshi, and G-J. Ahn, ―Security and Privacy Challenges in Cloud Computing Environments, ‖ IEEE Security & Privacy, vol. 8, no. 6, 2010.
  • Shweta Dinesh and Bijweet  (February- 2015) International Journal of Computer Science and Mobile Computing, Vol.4 Issue.2, , pg. 73-79
    © 2015, IJCSMC All Rights Reserved 79 people.cs.uchicago.edu/~aelmore/papers/dasfaa.pdf
  • Armbrust, (2010) A View of Cloud Computing,‖ Comm. ACM, vol. 53, no. 4, , pp. 50–58.
  • Ferrari, (2009) ―Database as a Service: Challenges and So- lutions for Privacy and Security,‖ IEEE Asia-PacificServices Computing Conf. (APSCC 09), IEEE CS Press, , pp. 46–51. http://en.wikipedia.org/wiki/Cloud Computing
  • Prodan and S. Ostermann, (2009) “A survey and taxonomy of infrastructure as a service and web hosting cloud providers,” in Grid Computing, 2009 10th IEEE/ACM International Conference on, pp. 17–25, IEEE,
  • Mahjoub, A. Mdhaffar, R. B. Halima, and M. Jmaiel, (2011) “A comparative study of the current cloud computing technologies and offers,” in Network Cloud Computing and Applications (NCCA), 2011 First International Symposium on, pp. 131–134, IEEE, 2011
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!