Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Internet, New Technologies

Cloud Computing. Strategies for Improving the Performance and Security

Title: Cloud Computing. Strategies for Improving the Performance and Security

Doctoral Thesis / Dissertation , 2019 , 113 Pages

Autor:in: Dr. Parashu Ram Pal (Author), Dr. Priyanka Ora (Author)

Computer Science - Internet, New Technologies
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user’s personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity.

In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data.

After uploading the file on cloud this file is visible to all users. They can easily download the file but cannot decrypt it as all users don’t have private key. Private key is sent to authenticate users by e-mail so that they can get original data. Data modification is controlled by the owner as cloud stores data in encrypted form. The whole architecture is compared with combination of Triple DES and SHA. The results generated by proposed model have shown that it takes less encryption and decryption time as compare to 3DES and SHA combination. Therefore, the proposed model provides better security and maintains data integrity of the uploaded data on cloud.

Excerpt


Table of Contents

Chapter 1. Introduction of Cloud Computing

1.1 Introduction

1.2 Concept of Cloud Computing

1.3 Cloud Architecture

1.4 Service/Delivery Model of Cloud Computing

1.4.1 SaaS(Software as a Service)

1.4.2 PaaS(Platform as a Service)

1.4.3 IaaS(Infrastructure as a service)

1.5 Layered Architecture Description

1.6 Deployment Model of Cloud Computing

1.6.1 General Division

1.6.2 Other Divisions

1.7 Characteristics of Cloud Computing

1.7.1 Rapid Elasticity

1.7.2 On demand

1.7.3 Broad network access

1.7.4 Multi Tenancy

1.7.5 Pay per use

1.7.6 Scalability

1.7.7 Resiliency

1.8 Categorization of Cloud Computing

1.8.1 Terminology of Cloud computing

1.8.2 Cloud Security Standards

1.8.3 Cloud Apps

1.9 Technologies Related with Cloud

1.9.1 Grid Computing

1.9.2 Utility Computing

1.9.3 Virtualization

1.9.4 Autonomic Computing

1.9.5 Cluster Computing

1.10 Benefits of Cloud Computing

1.10.1 Reduce Business Risk

1.10.2 Remove Complexity of Installing Software

1.10.3 New Research area

1.10.4 Easy Access

1.10.5 Provide service based on our needs

1.10.6 Scope for SME

1.10.7 Bigger software market

1.11 Problem with Cloud Computing

1.11.1 Loss of Governance

1.11.2 Data Loss

1.11.3 Account or Service Hijacking

1.11.4 Insecure Interfaces and Application Program Interfaces

1.11.5 Abuse and Nefarious use of Cloud Computing

1.12 Contribution of the Book

1.13 Conclusion

Chapter 2. Research Background

2.1 Survey of Existing Work

2.2 Definitions of Cloud Computing

2.3 Issues with Cloud Computing

2.4 Solution of Cloud Adoption Issue

2.4.1 Cloud security using Third Party Auditor

2.4.2 Cloud Computing Security Using Cryptographic Technique

2.5 Problem Yet To Be Solved

2.6 Problem Definitions

2.7 Objective

2.8 Conceptual Framework of Model

2.9 Conclusion

Chapter 3. Analysis of Cryptographic Mechanism

3.1 Introduction of Cryptography

3.2 Cryptography

3.2.1 Process of Cryptography

3.2.2 Encryption

3.2.3 Decryption

3.2.4 Cryptosystem

3.2.5 Symbolic Representation

3.3 Algorithms

3.3.1 Homomorphic Encryption

3.3.2 Fully Homomorphic

3.3.3 Partial Homomorphic

3.3.4 Hashing

3.4 Conclusion

Chapter 4. Data Security and Integrity in Cloud Computing based on RSA Partial Homomorphic and MD5 Algorithm

4.1 Introduction

4.2 Overview of Architecture

4.3 Model Description

4.3.1 Prerequisites

4.3.2 Secure Data Sharing

4.3.3 Secure Data Storage at Cloud Server

4.4 Algorithm Applied in Proposed Architecture

4.4.1 RSA Partial Homomorphic

4.4.2 Working of RSA Partial

4.4.3 MD5 Hashing Algorithm

4.4.4 Working of MD5

4.5 Implementation

4.6 Snapshot of Model

4.7 Pseudo Code of RSA Homomorphic Encryption Algorithm

4.8 Pseudo Code of MD5 Hashing Technique

4.9 Conclusion

Chapter 5. Experimental Study on Performance Evaluation of Proposed Architecture

5.1 Result Analysis

5.2 Triple DES (3 DES)

5.3 SHA (Secure Hash Algorithm)

5.4 Investigation and Analysis Based on Performance Parameters

5.4.1 Experimental Result

5.4.2 File Encryption Time

5.4.3 Graph of Encryption

5.4.4 File Decryption Time

5.4.5 Decryption Graph

5.5 Conclusion

Chapter 6. Conclusion & Future Work

6.1 Summary

6.2 Security Discussion

6.2.1 Confidentiality

6.2.2 Access control

6.2.3 Integrity

6.3 Final Thought

6.4 Future Work

Objectives and Core Topics

This work aims to enhance the security and integrity of data within cloud computing environments by proposing a new architectural model. The primary research goal is to address the diminishing adoption rates of cloud services due to security concerns, specifically focusing on data unauthorized access, potential data loss, and modification by untrusted parties. The authors investigate a framework that utilizes cryptographic techniques to maintain data control under the owner’s authority without relying exclusively on third-party auditors.

  • The evaluation of existing cryptographic algorithms for cloud environments.
  • Development of a security architecture using RSA Partial Homomorphic encryption.
  • Implementation of data integrity verification mechanisms via MD5 hashing.
  • Performance comparative analysis against standard Triple DES and SHA algorithms.
  • Addressing the computational overheads associated with high-level cloud security measures.

Auszug aus dem Buch

1.1 INTRODUCTION OF CLOUD COMPUTING

Over the past couple of years many technologies and trends has been evolved in the field of computer science. These technologies have changed our centralized working system to handy and private pc. It has been said that “The computer industry is the only industry that is more fashion driven than women’s fashion” [3]. Somehow it seems to be true as many computing techniques like Grid, Utility, Elastic and Mobile have been evolved and they are providing variety of services in the growth of Information Technology sector. These computing techniques make the way of sharing data economical and easier for users. Among this computing technique there is one more name added that is cloud computing. Cloud computing can be described as anything people need on internet and get it with the help of cloud. In cloud computing the term cloud is used to denote internet. Cloud computing is not about purchasing hardware or software; It is about receiving IT services as a commodity via internet [56]. Cloud computing is a set of different server and computers which all are assembled in a network region to provide services to its users. It is considered as the ability to use application over internet which stores and protect data while providing services [85]. People can take benefits of Cloud computing by any device just with an internet connection. They normally came across cloud on daily basis like checking emails, downloading of files, sharing of photos on social networking sits etc. All these are activities of cloud computing and it is strange that people are not aware that indirectly they are utilizing the benefits of cloud computing.

Summary of Chapters

Chapter 1. Introduction of Cloud Computing: Provides an overview of cloud computing evolution, service models (SaaS, PaaS, IaaS), and the fundamental challenges regarding security and data governance.

Chapter 2. Research Background: Reviews existing literature on cloud security, identifying common threats and analyzing previous research attempts to mitigate data privacy issues.

Chapter 3. Analysis of Cryptographic Mechanism: Explores the theoretical foundations of cryptography, specifically focusing on homomorphic encryption and hashing algorithms suitable for data protection.

Chapter 4. Data Security and Integrity in Cloud Computing based on RSA Partial Homomorphic and MD5 Algorithm: Details the proposed architecture, which integrates RSA partial homomorphic encryption and MD5 hashing to ensure data confidentiality and integrity.

Chapter 5. Experimental Study on Performance Evaluation of Proposed Architecture: Presents a comparative performance analysis of the proposed model versus the Triple DES and SHA combination in terms of encryption and decryption time.

Chapter 6. Conclusion & Future Work: Summarizes the thesis findings and suggests potential future improvements, such as the application of fully homomorphic algorithms.

Keywords

Cloud Computing, RSA Partial Homomorphic, MD5 Hashing, Data Integrity, Data Security, Cryptographic Mechanism, Cloud Architecture, Triple DES, SHA, Data Confidentiality, Access Control, Cloud Service Provider, Performance Evaluation, Cloud Adoption, Information Security

Frequently Asked Questions

What is the core focus of this research?

The research primarily focuses on improving the security and performance of data storage and access in cloud computing environments to foster higher adoption rates among users.

What are the primary security challenges addressed?

The work addresses critical concerns such as loss of data governance, unauthorized data access, potential data loss during transfer or storage, and the manipulation of data by untrusted cloud service providers.

What is the main research objective?

The objective is to design and implement a security architecture that provides robust data integrity and confidentiality without the heavy reliance on third-party auditors, ultimately reducing computational costs.

Which scientific methods are utilized in this approach?

The authors employ a combination of RSA Partial Homomorphic encryption for securing data and MD5 hashing algorithms to perform periodic integrity verification.

What is covered in the main part of the thesis?

The main part includes a thorough literature review, a detailed description of the proposed architectural model, the specific implementation details on the OpenShift platform using Java, and experimental results comparing the system with standard security protocols.

What are the key descriptors for this work?

Key terms include Cloud Computing, RSA Partial Homomorphic, MD5 Hashing, Data Integrity, and Performance Evaluation.

How is the proposed model verified for integrity?

Data verification is handled by calculating and comparing the hash values of the uploaded file on the cloud against a reference hash maintained by the data owner at their end.

How does this architecture handle access control?

Access control is managed by the data owner, who creates an access list specifying which users have "Read Only" or "Read and Write" permissions, ensuring only authorized individuals can decrypt the files using a provided private key.

Excerpt out of 113 pages  - scroll top

Details

Title
Cloud Computing. Strategies for Improving the Performance and Security
Authors
Dr. Parashu Ram Pal (Author), Dr. Priyanka Ora (Author)
Publication Year
2019
Pages
113
Catalog Number
V505234
ISBN (eBook)
9783346065575
ISBN (Book)
9783346065582
Language
English
Tags
cloud computing strategies improving performance security
Product Safety
GRIN Publishing GmbH
Quote paper
Dr. Parashu Ram Pal (Author), Dr. Priyanka Ora (Author), 2019, Cloud Computing. Strategies for Improving the Performance and Security, Munich, GRIN Verlag, https://www.grin.com/document/505234
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  113  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint