Projects

Data security model for Cloud Computing using V-GRT methodology


Code:-

JPJA2396


Abstract:-


Existing System:-

Huang and Tso proposed an asymmetric encryption mechanism for databases in the cloud. In the proposed mechanism, the commutative encryption is applied on data more than once and the order of public/private key used for encryption/decryption does not matter.</li> <li>Re encryption mechanism is also used in the proposed scheme which shows that the cipher-text data is encrypted once again for duality.</li>


Disadvantages of Existing System:-

Data confidentiality occurs because the users do not trust the cloud providers and cloud storage service providers are virtually impossible to eliminate potential insider threat, it is very dangerous for users to store their sensitive data in cloud storage directly. Simple encryption is faced with the key management problem and cannot support complex requirements such as query, parallel modification, and fine grained authorization.</li> <li>One of the main drawbacks of cloud is that there are too much of possibility for the cloud service provider for them isuse of the data that is stored in their data center by the client. Due to this, whatever methods that are proposed don&#8217;t have direct impact to reduce this problem. There will be issues continuing in the cloud computing until the cloud service provider knowledge about the data is prohibited. There is also repeated usage of OTP method in the cloud computing techniques which makes this system to an inefficient one.</li>


Proposed System:-

1) Username and the Password provided by the client to the cloud service provider. The password is encrypted by Hybrid Encryption method such as RSA, Ceaser cipher and alphabetic encryption</p> <p style="text-align: justify;">2) Cloud Service Provider (CSP) authenticates the user by verifying username and password by decryption and sends with the login key for the Security Vendor.</p> <p style="text-align: justify;">3) User space in CSP and the memory address allocated for the user is given by the Cloud Service Provider to the Security Vendor.</p> <p style="text-align: justify;">4) Login key for Security vendor</p> <p style="text-align: justify;">5) User authenticated with key provided by Cloud Service Provider</p> <p style="text-align: justify;">6) User selects the encryption method for various options thatCSP does not aware of and stores the data</p> <p style="text-align: justify;">7) Security vendor sends the encrypted data to Cloud Service Provider</p>


Advantages of Proposed System:-

>More Secure System</li> <li>Results show better performance evaluation when compared with existing system</li>


Hardware Requirements:-


Software Requirements:-

  • Operating system : Windows 7.</li> <li style="text-align: justify;">Coding Language : JAVA/J2EE</li> <li style="text-align: justify;">Tool : Netbeans 7.2.1</li> <li style="text-align: justify;">Database : MYSQL</li>

Cost:-

Rs 2000


Tools Used

Java

Cost

₹Rs 2000