19MIS0010

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Review - 3

Privacy-Preserving Data Security Model


in Cloud using AES Algorithm

Name: Sethumadhavan V
Reg. No: 19MIS0010
• New Advances in Cloud Computing Technology Enable rapid use of cloud
platforms for business purposes it is increasing day by day.
• Gathering data about companies transactions, communications, business
model, etc.
• A lot of information is stored on cloud platforms, visit our business
partners in Anywhere together.
• Consideration should be given to the security features of data stored in the
Abstract cloud to be accessible through high security and authentication..
• It was recommended that the system focus on Checking the integrity
monitoring model of the cloud where security and data protection systems
are located.
• The proposed model is developed using Cryptographic Algorithms where
input data is stored in the cloud Bring Your Own Encryption Key platform.
• The BYOEK model has been evaluated and verified from the following
perspectives.
• For a given test model in terms of comparison of execution Date and Time
trading.
Cloud computing is almost maintenance-free in
terms of managing local storage.

Problem However, it becomes a potential security issue when


the data owner outsources the data to the could as the
cloud server usually is provided by an untrusted third
Statement party.

With the data being shared in a group of users, cloud


computing faces a challenge of managing access
control of the encrypted data.
Scope
• The scope of the project is to provide a secure
auditing method is to store the data on the
cloud in a secure manner.
The system maintains a cloud audit protocol to securely
transfer personal data accounts with privacy protection.

Uses a privacy-preserving data communication protocol with


high-level encryption.

Developed on cloud platform with secure encryption and


decryption processes.
EXISTING
SYSTEM Using the homomorphic transform technique and appropriate
differential models.

Focuses on privacy integrity by protecting encryption


recordings before storing them in the cloud.

Aims at efficient reliability in achieving encrypted data


transmission.
Disadvantage

LOW LOW LOW ON INCREASED LOW ON


PERFORMANCE FLEXIBILITY SECURITY COST PRIVACY
The proposed model is developed using
Cryptographic Algorithms where input data is
stored in the cloud Bring Your Own Encryption
Key (BYOEK) platform.

PROPOSED
SYSTEM The safety of the BYOEK model has been
evaluated and verified from the following
perspectives.
Advantages

INCREASE IMPROVES IMPROVES INCREASE IMPROVES


PERFORMANCE RELIABILITY FLEXIBILITY SECURITY PRIVACY.
System
Architecture
Data Owner Models,

Auditor Models

Modules
Data User Models,

Admin Models.
DATA OWNER UPLOADING DATA AND
ENCRYPTING DATA

Data owner will be uploading file into the cloud using some key for encrypting the text document.

The data owner can upload and download the file.

Data owner outsourcing the data to the cloud while uploading the data it will be encrypting the file
then it will be placed in the cloud in encrypted format.
AUDITOR MODELS

Auditor Model Generating Key for Accessing File.


The auditor will maintaining everything in the cloud, then they generate
key for data which is presented in the cloud and then response which user
sent a request for particular file and then track file.
DATA USER DOWNLOADING FILES USING KEY

 The data user downloading files before that they need to request the key from the auditor after that
key will be apply in the cloud finally they can download required file.
 Data user can update, delete and modify data using key and that user modified data’s can be
viewed by admin, data owner and auditor.
ADMIN MODELS

• Admin login then maintains the details of Monitor Data, User Modified, data
Owner and Data Users.
Module Diagram
The more popular and widely adopted symmetric
encryption algorithm likely to be encountered
nowadays is the Advanced Encryption Standard (AES).

It is found at least six time faster than triple DES.

AES A replacement for DES was needed as its key size was
too small.
Algorithm
With increasing computing power, it was considered
vulnerable against exhaustive key search attack.

Triple DES was designed to overcome this drawback,


but it was found slow.
The features of AES are as follows

SYMMETRIC 128-BIT DATA, STRONGER AND PROVIDE FULL SOFTWARE


KEY 128/192/256-BIT FASTER THAN SPECIFICATION IMPLEMENTABLE
SYMMETRIC KEYS TRIPLE-DES AND DESIGN IN JAVA
BLOCK CIPHER DETAILS
FUTURE ENHANCEMENTS
• In the future work, we will try to implement
these methods using the different algorithms in
the real Cloud like AWS, Azure etc.

You might also like