LITERATURE provides more security to user data stored

Published by admin on

LITERATURE SURVEY

Number of data
security models have been developed to address the data security issues in
cloud computing.

M.R Tribhuwan, V.A Buyar, Shabana pirzade considers the data
security model using Two-Way handshake is a method which utilizes the homomorphic
token with distributed verification of erasure-coded data and achieves the
integration of storage correctness insurance and data error localization, i.e.,
the identification of misbehaving server(s)3.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

P. Syam Kumar, R. Subramanian and D. Thamizh Selvam analyses Sobol
sequence method rely on erasure code for the availability, reliability of data
and utilize token pre computation using Sobol Sequence to verify the integrity
of erasure coded data rather than Pseudorandom Data in existing system, this
scheme provides more security to user data stored in cloud computing. The performance
analysis shows that scheme is more secure than existing system against
Byzantine failure, unauthorized data modification attacks, and even cloud
server colluding attacks 4.

Accoding to Cong Wang, Qian Wang, and Kui Ren, Wenjing
Lou, in public auditing to support efficient handling of multiple auditing
tasks, we further explore the technique of bilinear aggregate signature to
extend our main result into a multi-user setting, where TPA can perform
multiple auditing tasks simultaneously. Extensive security and performance
analysis shows the proposed schemes are provably secure and highly efficient 5.

In RSA cryptosystem
Research Paper, Uma Somani, Kanika
Lakhani, Manish Mundra, have tried to assess Cloud Storage Methodology and Data
Security in cloud by the Implementation of digital signature with RSA algorithm
in paper 6.

Recently, Chengliang Wang, Gebeyehu Belay Gebremeskal
proposed a model which uses computational intelligence performance. Computational
intelligence (CI) is a mathematical modeling technique of cloud computing, which
are vitally importance to simplifying the complex system and designing
proactive and adaptive system in a dynamic and complex environment towards data
security 7.

M. Auxilia , K. Raja proposed the
semantic based access control model, which considers relationships among the
entities in all domains of access control namely Subject (user),
Object(Data/resource), Action(select, open, read, write) and so on, it is also
shown how to reduce the semantic interrelationships into subsumption problem.
This reduction facilitates the propagation of policies in these domains and
also enhances time and space complexity of access control mechanisms 8.

Feng-qing Zhang, Dian-Yuan Han, considers applying
agent’s method introducing agents to data security module, provides more
reliable services 9.

Shuai Han, Jianchuan Xing, proposed a
novel third party auditor scheme a third party auditor which affords trustful authentication
for user to operate their data security in cloud. The obvious advantage of this
scheme is that the cloud service provider can offer the functions which were
provided by the traditional third party auditor and make it trustful. So it
indeed reduces the constitution’s complexity in Cloud Computing 10.

Method proposed in paper 11,

Key generation is an important
part where we have to generate both public key and private key. The sender will
be encrypting the message with receiver’s public key and the receiver will
decrypt using its private key. Now, we have to select a number ‘d’ within the range of ‘n’.

The public key can be generated
by using the following equation:

Q = d * p ——– (1)

Where, d = the random number that
we have selected within the range of (1 to n-1).

P = the point on the curve.

Q = the public key and ‘d’ is the
private key.

Encryption

Let ‘m’ be the message which has
to be sent. We have to represent this message on the curve. Consider ‘m’ as the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from 1 –

(n-1).Cipher texts will be
generated after encryption, let it be C1 and C2.

C1 = k * p —– (2)

C2 = M + k * Q —— (3)

Decryption

The message ‘M’ that was sent is
written as following equation,

M = C2 – d * C1 —– (4)

Proof

The message ‘M’ can be obtained
back using eq. (4)

C2 – d * c1 = (M + k * Q) – d *
(k * p)

We have Q = d * p, by cancelling
out k * d * p,

We get M (original message)

 

OBJECTIVES

1.      To
identify the challenging security issues which has to be addressed in cloud
computing.

2.      To
identify what are the possible solutions to the security issues and challenges.

3.      To
identify the constraints over the elliptic curve cryptography if any.

4.      To
identify how elliptic curve cryptography algorithm can provide efficient data
security and reliability for cloud computing and it is a mechanism which
provides secure data encryption, decryption as well as secure shield against
the theft and attacker

.

METHODOLOGY

While several
different methodologies are being developed in this rapidly emerging
discipline, here we outline one that is particular. Table below shows the main stages
of the methodology. In Step 1 we will develop a ‘concept statement’. This is a
first cut at establishing the need for such a project. The concept statement is
followed by a description of the project’s significance. Once the concept
statement is approved, then we can proceed to Step 2, the proposal development
stage. Here, more details are filled in. Based on the concept statement,
several questions are

 

Table
1 Outline of Data Security in Cloud Computing with Elliptic Curve Cryptography

 

Step
1 Concept statement

• Establish need for Elliptic
Curve Cryptography for data security in Cloud Computing

 

Step
2 Proposal

• What is the problem being
addressed?

• Why is it important and
interesting?

• Why Elliptic Curve Cryptography
approach?

• Background material

 

Step
3 Methodology

• Propositions

• Variable selection

• Data collection

• ETL and data transformation

• Platform/tool selection

• Conceptual model

• Analytic techniques

-Association, clustering,
classification, etc.

• Results & insight

 

Step
4 Deployment

• Evaluation & validation

• Testing

Categories: Relationships

x

Hi!
I'm Iren!

Would you like to get a custom essay? How about receiving a customized one?

Check it out