Masterarbeit, 2014
44 Seiten
Chapter 1: INTRODUCTION
1.1 Cloud Computing
1.2 History of Cloud Computing
1.3 Service Models in Cloud Computing
1.4 Deployment Models of Cloud Computing
1.5 Benefits of Cloud Computing
1.6 Challenges of Cloud Computing
1.7 Cloud Computing with the Communication Services
1.8 Accessing through Internet APIs
1.9 Cloud Computing Trends for 2014
1.10 Cloud Security Threats
1.11 Advantages of Cloud Computing
1.12 Disadvantages of Cloud Computing
Chapter 2: LITERATURE SURVE
Chapter 3: PRESENT WORK
3.1 Problem Formulation
3.2 Research Objective
3.3 Research Methodology
Chapter 4: IMPLEMENTATION AND RESULTS
4.1 Implementation
Chapter 5: CONCLUSION AND FUTURE SCOPE
5.1 Conclusion
5.2 Future Scope
This dissertation aims to address the critical security challenges in cloud computing environments by implementing a multi-level security approach that ensures data confidentiality, integrity, and user authenticity through a combination of image-based sequencing passwords and RSA encryption.
3.1 Problem Formulation
Now days, information security has been a vital issue in cloud computing environments. Clouds don't have any borders and therefore the information may be physically set anyplace in any information centre across the network geographically distributed. That the nature of cloud computing raises serious problems relating to user authentication, info integrity and confidentiality. With the cloud model, you lose management over physical security. In a public cloud, you're sharing computing resources with different corporations. In a shared pool outside the enterprise, you do not have any data or management of wherever the resources run. Storage services provided by one cloud seller could also be incompatible with another vendor services. Information integrity is assurance that the information is consistent and proper. Guaranteeing the integrity of the information very implies that it changes solely in response to licensed transactions. The cloud service supplier for cloud makes certain that the client doesn't face any drawback like loss information or data thievery. There’s conjointly an opportunity wherever a malicious user will penetrate the cloud by impersonating a legitimate user, there by infecting the complete cloud.
Chapter 1: INTRODUCTION: This chapter provides an overview of cloud computing, covering its history, service models, deployment methods, benefits, challenges, and current security threats.
Chapter 2: LITERATURE SURVE: This chapter reviews various existing academic papers and research studies regarding trust, security models, and privacy-preserving techniques in cloud computing.
Chapter 3: PRESENT WORK: This chapter outlines the identified problems in cloud security, defines the research objectives, and describes the proposed methodology using image sequencing and RSA encryption.
Chapter 4: IMPLEMENTATION AND RESULTS: This chapter details the practical implementation of the proposed security approach using NetBeans and demonstrates the authentication and encryption processes through screenshots.
Chapter 5: CONCLUSION AND FUTURE SCOPE: This chapter summarizes the findings of the project, highlighting how the proposed security hierarchy effectively addresses CIA (Confidentiality, Integrity, Authenticity) issues.
Cloud Computing, Data Security, RSA Algorithm, Image Sequencing, Authentication, Confidentiality, Integrity, Information Security, Cryptography, Multi-level Security, Data Encryption, Network Security, Access Control, Cloud Service Provider, User Identity
The research focuses on implementing a multi-level security approach in cloud computing to address critical issues regarding the Confidentiality, Integrity, and Authenticity (CIA) of user data stored on remote servers.
The solution integrates image-based sequencing for secure user authentication and the RSA algorithm for robust data encryption and integrity verification.
The primary objective is to enhance the overall security and reliability of cloud environments by protecting sensitive data from third-party service providers and malicious attackers.
The effectiveness is demonstrated through a practical implementation using the NetBeans environment, showing how the system reacts to unauthorized access attempts and validates legitimate data storage and retrieval.
The study addresses common threats such as data breaches, data loss, service traffic hijacking, insecure APIs, malicious insiders, and authentication attacks.
The literature review covers proactive models, privacy-preserving public auditing, trust-based innovations, and data storage security techniques like Sobol sequence integration.
It provides an extra layer of authentication at the user end where the user must input a numeric sequence corresponding to specific positions of images, which shuffle with each session to prevent replay attacks.
RSA is employed to ensure data integrity and confidentiality, allowing the user to encrypt information locally before storage, ensuring that the cloud service provider cannot read the original content.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

