Professional Documents
Culture Documents
Cloud Computing Dynamin Key Generation
Cloud Computing Dynamin Key Generation
LINEAR PROGRAMMING IN
SECURE
OUTSOURCING OF
CLOUD COMPUTING
Contents
INTRODUCTION LITERATURE REVIEW EXISTING SYSTEM PROPOSED SYSTEM SYSTEM SPECIFICATION METHEDOLOGY CONCLUSION
Introduction
Why Cloud Computing ? A promising computing paradigm for business companies and government agencies holding large volume of data Provide pay-as-you-use billing feature at low price.
Amazon S3 storage service: just $0.12 - $0.15 per
Cloud Outsourcing
It is an arrangement in which one company provides services for another company or user. Cloud-based outsourcing is emerging as one of the biggest changes underway in the outsourcing delivery model, said IAOP chairman Michael Corbett.
Secure Outsourcing
There are some designs on secure outsourcing of scientific
computations, sequence comparisons, and matrix multiplication etc. have been proposed but it is still hardly possible to apply them directly in a practically efficient manner. Secure outsourcing of computational data with cryptography only is not feasible and with hardware only has large online latency.
LITERATURE SURVEY
Managing the Risk of an Extreme Form of IT Outsourcing
1. Standards for cloud computing may reduce many of the risk of opportunistic behaviour on the part of vendors.
2. Despite the enormous concerns of potential cloud customers for lock-in, hold-up, and opportunistic reprising, almost no significant standardization efforts under way today are aimed at ensuring interoperability or portability.
3. Standards efforts cannot mitigate most of the development risks of cloud computing.
Instead of using one cloud, the client uses two or more different clouds to perform his computation. The client can verify the correct result of the computation, as long as at least one of the clouds is honest.
2.
Harnessing the Cloud for Securely Outsourcing Largescale Systems of Linear Equations
1.
Cong Wang investigated the problem of securely outsourcing large-scale LE in cloud computing
2. Different from previous study, the computation outsourcing framework is based on iterative methods, which has the benefits of easy-to-implement and less memory requirement in practice.
2. Later on, Atallah give two protocol designs for both secure sequence comparison outsourcing and secure algebraic computation outsourcing
Existing System
Ordinary data encryption techniques exist for
data security.
The operational details inside the cloud are not
transparent .
Secure outsourcing
computations is
expensive.
No standards or model is defined for secure
Proposed System
Sensitive data have to be encrypted before outsourcing. Provide dynamic key every time, when a user logged in for
cloud service.
Provides more secure environment for
cloud service
access.
20
40
60
80
CONCLUSION
In this paper after literature survey we found that secure
outsourcing of computational data with cryptography only is not feasible and with hardware only has large online latency. We also found that there is lack of secure and practical computational cloud model for secure outsourcing.
From Provider Confidence Level graph shown
in previous slide we get there is less concern about secure user access.
METHODOLOGY
1. Firstly, a dynamic key generation mechanism is developed for security at clients end.
2. KeyGen(1k) {K}. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. 3. ProbEnc(K,) {k}. This algorithm encrypts the input tuple into k with the secret key K. According to problem transformation, the encrypted input k has the same form as , and thus defines the problem to be solved in the cloud. 4. ProofGen(k) {(y, )}. This algorithm augments a generic solver that solves the problem k to produce both the output y and a proof . The output y later decrypts to x, and is used later by the customer to verify the correctness of y or x.
5. ResultDec(K, , y, ) {x,}. This algorithm may choose to verify either y or x via the proof . In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs when the validation fails, indicating the cloud server was not performing the computation faithfully.
USER A After Getting Password Login 1. Enter ID User Gets Password 2. Password Generated in User s Mobile
3.Enter Password
Cloud Server
Secret K
USER B
Hardware Requirements
System
Hard Disk
Floppy Drive Monitor Mouse Ram
Pentium IV 2.4 GHz. 40 GB. 1.44 Mb. 15 VGA Color. Logitech. 512 MB.
Software Requirements
Operating System
Windows xp,
Jdk 1.6 Jsp, Servlet Oracle 10g
References
[1] P. Mell and T. Grance, The NIST definition of cloud computing,National Institute of Standards and Technology, vol. 53, no. 6, p. 50,2009. [2] J. Viega, "Cloud computing and the common man, Computer, 42, 2009, pp. 106-108. [3] C. Cachin, I. Keidar and A. Shraer, "Trusting thecloud", ACM SIGACT News, 40, 2009, pp. 81-86. [4] Clavister, "Security in the cloud", Clavister White Paper, 2008. [5] H.Mei, J. Dawei, L. Guoliang and Z. Yuan, Supporting Database Applications as a Service",ICDE'09:Proc. 25thIntl.Conf. on Data Engineering,2009, pp. 832-843 [6] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing",ARTCOM'10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp. 1-9.5499 [7] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34(1), 2011, pp 1-11. [8] G. Brunette and R. Mogull (eds), "Security guidance of critical areas of focus in cloud, Cloud Security Alliance 2011 [9] S. Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010. [10] Eric K. Clemons, Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcings,
Thanks