Enhanced Data Security Model for Cloud Computing ABSTRACT

advertisement
Enhanced Data Security Model for Cloud Computing
ABSTRACT:
Cloud Computing becomes the next generation architecture of IT Enterprise. In
contrast to traditional solutions, Cloud computing moves the application software
and databases to the large data centers, where the management of the data and
services may not be fully trustworthy. This unique feature, however, raises many
new security challenges which have not been well understood. In cloud computing,
both data and software are fully not contained on the user's computer; Data
Security concerns arising because both user data and program are residing in
Provider Premises. Clouds typically have a single security architecture but have
many customers with different demands. Every cloud provider solves this problem
by encrypting the data by using encryption algorithms. This paper investigates the
basic problem of cloud computing data security. We present the data security
model of cloud computing based on the study of the cloud architecture. We
improve data security model for cloud computing. We implement software to
enhance work in a data security model for cloud computing. Finally apply this
software in the Amazon EC2 Micro instance.
EXISTING SYSTEM:
In cloud computing, both data and software are fully not contained on the user's
computer; Data Security concerns arising because both user data and program are
residing in Provider Premises.
Clouds typically have single security architecture but have many customers with
different demands. Every cloud provider solves this problem by encrypting the
data by using encryption algorithms.
DISADVANTAGES OF EXISTING SYSTEM:
 The management of the data and services may not be fully trustworthy.
PROPOSED SYSTEM:
This paper enhances data security model for cloud computing. We propose a new
data .security model based on studying of cloud computing architecture. We
Implement software to select the suitable and the highest security encryption
algorithm.
ADVANTAGES OF PROPOSED SYSTEM:
 Highly Secure
MODULES:
 Three-layer system Construction module
 Storage data Module
 Transmission data Module
 Processing data Module
MODULES DESCRIPTION:
Three-layer system Construction module
The model used three-layer system structure, in which each floor performs its own
duty to ensure that the data security of cloud layers. The first layer: responsible for
user authentication, almost this is two factor authentication, but free cloud
providers use one factor as examples eyeos, cloudo, and freezoha. The second
layer: responsible for user's data encryption, and protect the privacy of users
through a certain way by using one symmetric encryption algorithms. Also allow
protection from user. The third layer: The user data for fast recovery this depends
on the speed of decryption.
Storage data Module
We make improvement to data security model in cloud computing. We implement
software to the cloud provider. This software is implemented with two factor
authentication. This software compares between eight modem encryption
algorithms. This comparison based on Statistical Tests to get the most security
algorithms. This software gets the faster and the highest security algorithm based
on cloud infrastructure. So we proposed to cloud provider the suitable, more
security encryption algorithm to its platform.
Transmission data Module
Clouds are massively complex systems can be reduced to simple primitives that are
replicated thousands of times and common functional units, These complexities
create many issues related to security as well as all aspects of Cloud computing. So
users always worry about its data, so users can transmit the data’s to others to
make a copy of data so as not to lose it.
Processing data Module
A proposed software solves some problems. This software implements strong API
access control, by using two way authentications. This software encrypts and
protects data, by using the highest security algorithm. This software analysis data
protection at lAAS, we use Amazon EC2 as a case study to run this software. This
software ensures that protection algorithm is highest security algorithm to satisfy
the user, by using NIST statistical tests. This software Ensure faster retrieval, when
using faster encryption/decryption algorithm
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System
: Pentium IV 2.4 GHz.
• Hard Disk
: 40 GB.
• Floppy Drive
: 1.44 Mb.
• Monitor
: 15 VGA Colour.
• Mouse
: Logitech.
• Ram
: 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base
: SQL Server 2005
REFERENCE:
Eman M.Mohamed, Hatem S. Abdelkader,” Enhanced Data Security Model for
Cloud Computing”, IEEE CONFERENCE (INFOS2012), 2012.
Download