Doktorarbeit / Dissertation, 2019
113 Seiten
Chapter 1. Introduction of Cloud Computing
1.1 Introduction
1.2 Concept of Cloud Computing
1.3 Cloud Architecture
1.4 Service/Delivery Model of Cloud Computing
1.4.1 SaaS(Software as a Service)
1.4.2 PaaS(Platform as a Service)
1.4.3 IaaS(Infrastructure as a service)
1.5 Layered Architecture Description
1.6 Deployment Model of Cloud Computing
1.6.1 General Division
1.6.2 Other Divisions
1.7 Characteristics of Cloud Computing
1.7.1 Rapid Elasticity
1.7.2 On demand
1.7.3 Broad network access
1.7.4 Multi Tenancy
1.7.5 Pay per use
1.7.6 Scalability
1.7.7 Resiliency
1.8 Categorization of Cloud Computing
1.8.1 Terminology of Cloud computing
1.8.2 Cloud Security Standards
1.8.3 Cloud Apps
1.9 Technologies Related with Cloud
1.9.1 Grid Computing
1.9.2 Utility Computing
1.9.3 Virtualization
1.9.4 Autonomic Computing
1.9.5 Cluster Computing
1.10 Benefits of Cloud Computing
1.10.1 Reduce Business Risk
1.10.2 Remove Complexity of Installing Software
1.10.3 New Research area
1.10.4 Easy Access
1.10.5 Provide service based on our needs
1.10.6 Scope for SME
1.10.7 Bigger software market
1.11 Problem with Cloud Computing
1.11.1 Loss of Governance
1.11.2 Data Loss
1.11.3 Account or Service Hijacking
1.11.4 Insecure Interfaces and Application Program Interfaces
1.11.5 Abuse and Nefarious use of Cloud Computing
1.12 Contribution of the Book
1.13 Conclusion
Chapter 2. Research Background
2.1 Survey of Existing Work
2.2 Definitions of Cloud Computing
2.3 Issues with Cloud Computing
2.4 Solution of Cloud Adoption Issue
2.4.1 Cloud security using Third Party Auditor
2.4.2 Cloud Computing Security Using Cryptographic Technique
2.5 Problem Yet To Be Solved
2.6 Problem Definitions
2.7 Objective
2.8 Conceptual Framework of Model
2.9 Conclusion
Chapter 3. Analysis of Cryptographic Mechanism
3.1 Introduction of Cryptography
3.2 Cryptography
3.2.1 Process of Cryptography
3.2.2 Encryption
3.2.3 Decryption
3.2.4 Cryptosystem
3.2.5 Symbolic Representation
3.3 Algorithms
3.3.1 Homomorphic Encryption
3.3.2 Fully Homomorphic
3.3.3 Partial Homomorphic
3.3.4 Hashing
3.4 Conclusion
Chapter 4. Data Security and Integrity in Cloud Computing based on RSA Partial Homomorphic and MD5 Algorithm
4.1 Introduction
4.2 Overview of Architecture
4.3 Model Description
4.3.1 Prerequisites
4.3.2 Secure Data Sharing
4.3.3 Secure Data Storage at Cloud Server
4.4 Algorithm Applied in Proposed Architecture
4.4.1 RSA Partial Homomorphic
4.4.2 Working of RSA Partial
4.4.3 MD5 Hashing Algorithm
4.4.4 Working of MD5
4.5 Implementation
4.6 Snapshot of Model
4.7 Pseudo Code of RSA Homomorphic Encryption Algorithm
4.8 Pseudo Code of MD5 Hashing Technique
4.9 Conclusion
Chapter 5. Experimental Study on Performance Evaluation of Proposed Architecture
5.1 Result Analysis
5.2 Triple DES (3 DES)
5.3 SHA (Secure Hash Algorithm)
5.4 Investigation and Analysis Based on Performance Parameters
5.4.1 Experimental Result
5.4.2 File Encryption Time
5.4.3 Graph of Encryption
5.4.4 File Decryption Time
5.4.5 Decryption Graph
5.5 Conclusion
Chapter 6. Conclusion & Future Work
6.1 Summary
6.2 Security Discussion
6.2.1 Confidentiality
6.2.2 Access control
6.2.3 Integrity
6.3 Final Thought
6.4 Future Work
This work aims to enhance the security and integrity of data within cloud computing environments by proposing a new architectural model. The primary research goal is to address the diminishing adoption rates of cloud services due to security concerns, specifically focusing on data unauthorized access, potential data loss, and modification by untrusted parties. The authors investigate a framework that utilizes cryptographic techniques to maintain data control under the owner’s authority without relying exclusively on third-party auditors.
1.1 INTRODUCTION OF CLOUD COMPUTING
Over the past couple of years many technologies and trends has been evolved in the field of computer science. These technologies have changed our centralized working system to handy and private pc. It has been said that “The computer industry is the only industry that is more fashion driven than women’s fashion” [3]. Somehow it seems to be true as many computing techniques like Grid, Utility, Elastic and Mobile have been evolved and they are providing variety of services in the growth of Information Technology sector. These computing techniques make the way of sharing data economical and easier for users. Among this computing technique there is one more name added that is cloud computing. Cloud computing can be described as anything people need on internet and get it with the help of cloud. In cloud computing the term cloud is used to denote internet. Cloud computing is not about purchasing hardware or software; It is about receiving IT services as a commodity via internet [56]. Cloud computing is a set of different server and computers which all are assembled in a network region to provide services to its users. It is considered as the ability to use application over internet which stores and protect data while providing services [85]. People can take benefits of Cloud computing by any device just with an internet connection. They normally came across cloud on daily basis like checking emails, downloading of files, sharing of photos on social networking sits etc. All these are activities of cloud computing and it is strange that people are not aware that indirectly they are utilizing the benefits of cloud computing.
Chapter 1. Introduction of Cloud Computing: Provides an overview of cloud computing evolution, service models (SaaS, PaaS, IaaS), and the fundamental challenges regarding security and data governance.
Chapter 2. Research Background: Reviews existing literature on cloud security, identifying common threats and analyzing previous research attempts to mitigate data privacy issues.
Chapter 3. Analysis of Cryptographic Mechanism: Explores the theoretical foundations of cryptography, specifically focusing on homomorphic encryption and hashing algorithms suitable for data protection.
Chapter 4. Data Security and Integrity in Cloud Computing based on RSA Partial Homomorphic and MD5 Algorithm: Details the proposed architecture, which integrates RSA partial homomorphic encryption and MD5 hashing to ensure data confidentiality and integrity.
Chapter 5. Experimental Study on Performance Evaluation of Proposed Architecture: Presents a comparative performance analysis of the proposed model versus the Triple DES and SHA combination in terms of encryption and decryption time.
Chapter 6. Conclusion & Future Work: Summarizes the thesis findings and suggests potential future improvements, such as the application of fully homomorphic algorithms.
Cloud Computing, RSA Partial Homomorphic, MD5 Hashing, Data Integrity, Data Security, Cryptographic Mechanism, Cloud Architecture, Triple DES, SHA, Data Confidentiality, Access Control, Cloud Service Provider, Performance Evaluation, Cloud Adoption, Information Security
The research primarily focuses on improving the security and performance of data storage and access in cloud computing environments to foster higher adoption rates among users.
The work addresses critical concerns such as loss of data governance, unauthorized data access, potential data loss during transfer or storage, and the manipulation of data by untrusted cloud service providers.
The objective is to design and implement a security architecture that provides robust data integrity and confidentiality without the heavy reliance on third-party auditors, ultimately reducing computational costs.
The authors employ a combination of RSA Partial Homomorphic encryption for securing data and MD5 hashing algorithms to perform periodic integrity verification.
The main part includes a thorough literature review, a detailed description of the proposed architectural model, the specific implementation details on the OpenShift platform using Java, and experimental results comparing the system with standard security protocols.
Key terms include Cloud Computing, RSA Partial Homomorphic, MD5 Hashing, Data Integrity, and Performance Evaluation.
Data verification is handled by calculating and comparing the hash values of the uploaded file on the cloud against a reference hash maintained by the data owner at their end.
Access control is managed by the data owner, who creates an access list specifying which users have "Read Only" or "Read and Write" permissions, ensuring only authorized individuals can decrypt the files using a provided private key.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

