Professional Documents
Culture Documents
19MIS0010
19MIS0010
19MIS0010
Name: Sethumadhavan V
Reg. No: 19MIS0010
• New Advances in Cloud Computing Technology Enable rapid use of cloud
platforms for business purposes it is increasing day by day.
• Gathering data about companies transactions, communications, business
model, etc.
• A lot of information is stored on cloud platforms, visit our business
partners in Anywhere together.
• Consideration should be given to the security features of data stored in the
Abstract cloud to be accessible through high security and authentication..
• It was recommended that the system focus on Checking the integrity
monitoring model of the cloud where security and data protection systems
are located.
• The proposed model is developed using Cryptographic Algorithms where
input data is stored in the cloud Bring Your Own Encryption Key platform.
• The BYOEK model has been evaluated and verified from the following
perspectives.
• For a given test model in terms of comparison of execution Date and Time
trading.
Cloud computing is almost maintenance-free in
terms of managing local storage.
PROPOSED
SYSTEM The safety of the BYOEK model has been
evaluated and verified from the following
perspectives.
Advantages
Auditor Models
Modules
Data User Models,
Admin Models.
DATA OWNER UPLOADING DATA AND
ENCRYPTING DATA
Data owner will be uploading file into the cloud using some key for encrypting the text document.
Data owner outsourcing the data to the cloud while uploading the data it will be encrypting the file
then it will be placed in the cloud in encrypted format.
AUDITOR MODELS
The data user downloading files before that they need to request the key from the auditor after that
key will be apply in the cloud finally they can download required file.
Data user can update, delete and modify data using key and that user modified data’s can be
viewed by admin, data owner and auditor.
ADMIN MODELS
• Admin login then maintains the details of Monitor Data, User Modified, data
Owner and Data Users.
Module Diagram
The more popular and widely adopted symmetric
encryption algorithm likely to be encountered
nowadays is the Advanced Encryption Standard (AES).
AES A replacement for DES was needed as its key size was
too small.
Algorithm
With increasing computing power, it was considered
vulnerable against exhaustive key search attack.