SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Innovative Systems Design and Engineering                                                         www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3


    Extension of Tinny Application for Cloud Based Custom
  Software with Encryption Queue: A Strategy to Protect Data
                          on Cloud
                                             Muhammad Ahmad Jan
           Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan
                                       E-Mail: mr_ahmadjan@yahoo.com


                                            Sheikh Muhammad Saqib
           Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan
                                        E-Mail: saqibsheikh4@yahoo.com


                                                  Bashir Ahmad
           Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan
                                         E-Mail: bashahmad@gmail.com


                                                 Shakeel Ahmad
           Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan
                                       E-Mail: shakeel_1965@yahoo.com
Abstract
Data protection is in your hands, even your data lands in the lap of service providers. Cloud computing is a
new and emerging concept in the field of IT. It means do everything over the internet and put burden on the
shoulders of cloud’s service providers. Individuals or business organizations are hesitant to do their tasks
over public networks like internet. They can’t leave their sensitive data in the hands of service providers. It
is due to lack of confidence and trust on service providers. Protecting customer’s sensitive data on cloud is
the major issue. Here authors purposed a strategy to protect customer’s sensitive data before sending it
towards service providers. The strategy consists of a barrier (Encryption Queue) to protect customer’s data.
With the use of this strategy, encryption procedure will be in the hands of customers themselves. This
concept will help to built up customer’s trust and will prepare them to shift desktop based applications over
the cloud.

Keywords: Cloud Computing, Business Organizations, Encryption Queue, Customer Trust, Desktop Based
Application.

1. Introduction
Data should be protected from frauds, waste or any unauthorized person at any cost. Major runaway
success of cloud computing is the security of data. Cloud is making now high security density zone with
well procedures of encryptions [3].
In cloud environment there are many security management policies such as cloud’s machine should
installed firewalls and VPNs, setting of user permissions, passwords etc. Due to password, unauthorized
person can not access the data but cloud provider is the owner of cloud environment. They can modify or
visit consumer data although contract has been done between them. This is the major issue through which
distrust is growing up in cloud environment. Data encryption is major idea for data security i.e. before
Innovative Systems Design and Engineering                                                         www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3

hosting sensitive data externally, one should encrypt it for fear that the data will be stolen or modified by
the cloud provider [2].
Program like PGP or open-source TrueCrypt encrypts the data before sending it to the third party and can
encrypt the file so that authorized members with their own passwords can access such data [6]. But in case
of CBCS [4] (Cloud Base Custom Software), such application will be itself on third party, then how such
encryption decryption can be lie on client side.
It is still under discussion who will keep the encryption/decryption keys, whether it should be kept on
customer side or on cloud side. Most of the customers want their data should be encrypted both ways across
the internet via SSL (Secure Socket Layer) and also when it is stored at cloud vender’s storage pool [7].
Large companies commonly use custom software for critical functions such as content management,
inventory management, customer relationship management and human resource management [5]. Mostly
these applications are desktop based. Successfully installation of custom software requires different
components such as: Switches, Database Server, Database Software, Operating System, Anti Viruses, and
Backup Devices.
Each organization has its own software such as custom software known as Desktop Based Custom
Software (DBCS). CBCS is the dedicated service for an organization and stored on cloud environment.
Conversion of DBCS (Desktop Based Custom Software) to CBCS (Cloud Based Custom Software) has
already been getting the all advantages of cloud computing but trust of consumer on cloud is still in
discussion. TA (Tinny Application) makes work of CBCS just like DBCS i.e. TA restricts the access of
CBCS outside the organization [4]. Though cloud computing has many advantages, however data security
and privacy over the internet are some of the serious issues faced by organizations. Since CBCS and its
database will be stored on third party spaces. It raises three types of issues for customer trust.
-Third party can delete our data
-Third party can change our data
-Third party can see our data
Although there are service level agreements (SLA) between cloud service providers and customers about
the integrity and privacy of the data, however if people at cloud side delete or change customer, this will
hurt customer’s trust. Major failure of trust is the third option i.e. cloud side people can see customer data.
This problem can be removed by the idea of encryption/decryption. Still issue is on study of road, either
encryption can be done consumer side or on cloud side. It is observed that in case of CBCS, encryption/
decryption should be on cloud side because CBCS will be placed over here. As encryption/ decryption code
will be added in CBCS, so customer can vacillate with such option because encryption code will be placed
on cloud side. EQ (Encryption Queue) is solution of such problem, through which any customer can place
the data (in CBCS) on cloud side without fear of being stolen of data. Setting of EQ will be done on client
side and its running will be executed on cloud side with CBCS. In this way, CBCS will completely remove
the DBCS from organization and can make its position more accurately. Implementation of CBCS will
eliminate all drawbacks related to DBCS and will incorporate all the advantages of cloud computing with
an organization.
2. EQ (Encryption Queue):
EQ (Encryption Queue) which will present the setting of encryption policy on client side can provide a
relief to customer for security issues. Since with CBCS there is a TA application [4], which can be
extended, with encryption procedures i.e. EQ. Consumer high-up can set encryption policy according to
their desire order from encryption list. High-up can change the order of such options and remove or add
some options in EQ with different intervals of time. Since cloud side people does not know whether what
order they have selected and what choices they have added in encryption queue.
2.1. Values for EQ
Following are the some choices for encryption
    1.   Reverse string
Innovative Systems Design and Engineering                                                       www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3

    2.   Add any special symbol after 2 characters (Special Symbol and no of characters will be user
         defined)
    3.   Move character up 2 next position (2 is according to user choice)
    4.   Etc


2.2. Algorithm for EQ
Algoritm for encryption will contain the following items
Fields[]: This list contain the whole input fields which are going to be stored.
encryptionQueue[]: This queue will contain different integer values for encryption choices. And also such
value will be stored on cloud side database.
encryptionQueue.count(): This methode will return value for total selected option.
SaveOnCloudSide(Fields[]): This event will save the encrypted data field to database on cloud side.
Encryption(Fields[],encryptionQueue[ I ]): this methode will apply encryption on Fields[] with respect to
encryptionQueue[ I ].


Table-1 Algorithm for Encryption on Consumer Side


                1.   [Put all input fields in a list]
                     Fields[]
                2.   [Select encryption options from list through TA in you desired order]
                     encryptionQueue[]
                     Perform step 4 for I=1 to encryptionQueue.count()
                3.   [Set encryption on all fields]
                     Encryption(Fields[],encryptionQueue[ I ])
                4.   [After applying encryption on customer side store encrypted data to cloud
                     side]
                     SaveOnCloudSide(Fields[])
                5. [Exit]

Algorithm shows that each next encryption will be applied on previous encrypted data which will be much
secure and any one can not guess, judge or decrypt such data.
3. Extension of TA (Implementation of EQ)
This is implementation of encryption procedures in TA application, which will be installed on all client
sides [2] but EQ will be permitted only to administrator or high-up. This interface will generate a queue for
encryption (encryptionQueue []), this queue will be stored on database of cloud side, since in CBCS there
are no database on consumer side. This queue will contain only integer values for different options. Cloud
side people can not imagine which integer value relates to which type of encryption options.
Fig-1 is showing the different choices for encryption sequence. Here special characters, number of
characters and move character are the user defined choice. User can set the values for such options
according to their desires.
Innovative Systems Design and Engineering                                                    www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




                                       Fig-1: Selecting 1st Option
In Fig-1, 2nd option will be selected as 1st element of encryption queue. Here G will be added after 2
characters of each input data field.




                                      Fig-2: Selecting 2nd Option
In Fig-2, 3rd option will be selected as 2nd element of encryption queue. Here each character of previous
encrypted data will be moved up to 1 character.
Innovative Systems Design and Engineering                                                     www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3

                                       Fig-3: Selecting 3rd Option

In Fig-3, 1st option will be selected as 2nd element of encryption queue. Here previous encrypted data will
be reversed.
Hence by selecting above order of encryption choices encryptionQueue(EQ) will be as:
EQ[1]    EQ[2]     EQ[3]

EQ[1] EQ[2] EQ[3]
 2      3      1


Value of encryptionQueue.count() will be 3.
3.1. Example (Encryption/ Decryption of word ‘Cloud’)
Suppose input Data is “Cloud”.
Field=”Cloud”
Now encryption code shown in Fig-4 will be added to CBCS, so any data on CBCS will be saved on
database in encrypted form.




                                   Fig-4: Code for encryption in CBCS

Now applying code (shown in Fig-4) on above data Field.

EQ[1]    EQ[2]    EQ[3]
  2       3        1
Innovative Systems Design and Engineering                                                     www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




Table-2: Encryption through Encryption Queue

   Encrypting Data Filed ‘Cloud’
   When I=1 then option is 2.
   G will be added after 2 characters
   Now Cloud become as ClGouGd.

   When I=2 then option is 3.
   Move each character upto next 1.
   Previous encrypted data is ClGouGd.
   C D
   l   m
   G H
   o p
   u v
   G H
   d e
   DmHpvHe
   When I=3 then option is 1
   Reverse the previous encrypted data.
   Final Encrypted Data: eHvpHmD.


Hence final encrypted word eHvpHmD will be stored in database. People of cloud side can not understand
what its actual value is. Although they ma be familiar with different encryption options for CBCS, but they
can not judge order of selection different options.
Now when user access data from database, it will be first decrypted then appeared on user interface.
Decryption is the inverse of encryption. Now apply encryptionQueue[] in reverse order.

Table-3: Decryption through Encryption Queue

   Decrypting Data Filed ‘eHvpHmD’
   When I=3 then option is 1
   Reverse the previous encrypted data.
   Decrypted Data: DmHpvHe
   When I=2 then option is 3.
   Move each character upto previous 1.
   Previous encrypted data is ClGouGd.
   D C
   m l
   H G
   p o
   v u
   H G
   e d
   Decrypted Data: ClGouGd
   When I=1 then option is 2.
Innovative Systems Design and Engineering                                                        www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3

   G will be removed after 2 characters
   Now ClGouGd become as Cloud.

Hence eHvpHmD is decrypted to Cloud

4. Conclusion
Every new technology replaces the older one with more advantages. Since the trend of cloud computing is
reducing the overheads of previous approaches for utilizing the different services/resources. This concept is
very beneficial for business organizations. But when they utilize the storage resources for their personal
business data, they can’t make trust over such resources. Encryption queue provides a completely user
defined options for encrypting their data. Only organizational high ups will have the knowledge to
construct the Encryption Queue. By using encryption queue with tinny application they can easily replace
their custom application over cloud side and can take different advantages of cloud computing such as [1]:
1. It should be able to quickly allot and relieve resources whenever required by clients
2. It should have real-time backup to offer maximum up time to clients
3. It should be able to cater to the needs of clients without having to involve clients into management of the
service.
4. There is no need of Backup devices.
5. No efforts require on backup and recovery
6. After system crash, only installation of operating system will required for connecting with internet.
Besides above advantage, it will get the all advantages of CBCS[4] such as:
      - No need of Database software.
      - After system crash, only installation of operating system will required for connecting with
          internet.
      - A new system can be easily replaced at once and CBCS will work properly on spot.
      - CBCS does not require any supportable frame work, just internet connections.
      - No need of database server.
      - No need of technical securities on local area network even without local area network, CBCS can
          work properly with the connection of internet.

References
An Introduction to Cloud Computing, http://www.brighthub.com/environment/green-computing/
articles/10026.aspx?image=149096
Arnon Rosenthal, “Cloud computing: A new business paradigm for biomedical information sharing”,
Journal of Biomedical Informatics 43 (2010) 342–353, ELSEVIER.
Subhas Chandra Misra, “Identification of a company’s suitability for the adoption of cloud computing
and modelling its corresponding Return on Investment”, Mathematical and Computer Modelling 53
(2011) 504-521, ELSEVIER
Sheikh Muhammad Saqib, “Custom Software under the Shade of Cloud Computing”, (IJCSIS)
International Journal of Computer Science and Information Security, Vol. 9, No. 5, May 2011, PP 219-
223
Custom software, http://en.wikipedia.org/wiki/Custom_software
Anthony T. Velte, Toby J. Velte, Ph.D, Robert Elsenpeter, ”Cloud Computing: A Practical Approach”,
by The McGraw-Hill Companies, ISBN: 978-0-07-162695-8, 2010
John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and
Security” , CRC Press , ISBN: 978-1-4398-0680-7, 2010.
Innovative Systems Design and Engineering        www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3

Más contenido relacionado

La actualidad más candente

IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 

La actualidad más candente (19)

IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journalA comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 

Similar a 21 muhammad ahmadjan_8

Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 

Similar a 21 muhammad ahmadjan_8 (20)

Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Paper published
Paper published Paper published
Paper published
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
C017421624
C017421624C017421624
C017421624
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
F017414853
F017414853F017414853
F017414853
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

21 muhammad ahmadjan_8

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Extension of Tinny Application for Cloud Based Custom Software with Encryption Queue: A Strategy to Protect Data on Cloud Muhammad Ahmad Jan Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan E-Mail: mr_ahmadjan@yahoo.com Sheikh Muhammad Saqib Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan E-Mail: saqibsheikh4@yahoo.com Bashir Ahmad Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan E-Mail: bashahmad@gmail.com Shakeel Ahmad Institute of Computing and Information Technology Gomal University, D.I.Khan, Pakistan E-Mail: shakeel_1965@yahoo.com Abstract Data protection is in your hands, even your data lands in the lap of service providers. Cloud computing is a new and emerging concept in the field of IT. It means do everything over the internet and put burden on the shoulders of cloud’s service providers. Individuals or business organizations are hesitant to do their tasks over public networks like internet. They can’t leave their sensitive data in the hands of service providers. It is due to lack of confidence and trust on service providers. Protecting customer’s sensitive data on cloud is the major issue. Here authors purposed a strategy to protect customer’s sensitive data before sending it towards service providers. The strategy consists of a barrier (Encryption Queue) to protect customer’s data. With the use of this strategy, encryption procedure will be in the hands of customers themselves. This concept will help to built up customer’s trust and will prepare them to shift desktop based applications over the cloud. Keywords: Cloud Computing, Business Organizations, Encryption Queue, Customer Trust, Desktop Based Application. 1. Introduction Data should be protected from frauds, waste or any unauthorized person at any cost. Major runaway success of cloud computing is the security of data. Cloud is making now high security density zone with well procedures of encryptions [3]. In cloud environment there are many security management policies such as cloud’s machine should installed firewalls and VPNs, setting of user permissions, passwords etc. Due to password, unauthorized person can not access the data but cloud provider is the owner of cloud environment. They can modify or visit consumer data although contract has been done between them. This is the major issue through which distrust is growing up in cloud environment. Data encryption is major idea for data security i.e. before
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 hosting sensitive data externally, one should encrypt it for fear that the data will be stolen or modified by the cloud provider [2]. Program like PGP or open-source TrueCrypt encrypts the data before sending it to the third party and can encrypt the file so that authorized members with their own passwords can access such data [6]. But in case of CBCS [4] (Cloud Base Custom Software), such application will be itself on third party, then how such encryption decryption can be lie on client side. It is still under discussion who will keep the encryption/decryption keys, whether it should be kept on customer side or on cloud side. Most of the customers want their data should be encrypted both ways across the internet via SSL (Secure Socket Layer) and also when it is stored at cloud vender’s storage pool [7]. Large companies commonly use custom software for critical functions such as content management, inventory management, customer relationship management and human resource management [5]. Mostly these applications are desktop based. Successfully installation of custom software requires different components such as: Switches, Database Server, Database Software, Operating System, Anti Viruses, and Backup Devices. Each organization has its own software such as custom software known as Desktop Based Custom Software (DBCS). CBCS is the dedicated service for an organization and stored on cloud environment. Conversion of DBCS (Desktop Based Custom Software) to CBCS (Cloud Based Custom Software) has already been getting the all advantages of cloud computing but trust of consumer on cloud is still in discussion. TA (Tinny Application) makes work of CBCS just like DBCS i.e. TA restricts the access of CBCS outside the organization [4]. Though cloud computing has many advantages, however data security and privacy over the internet are some of the serious issues faced by organizations. Since CBCS and its database will be stored on third party spaces. It raises three types of issues for customer trust. -Third party can delete our data -Third party can change our data -Third party can see our data Although there are service level agreements (SLA) between cloud service providers and customers about the integrity and privacy of the data, however if people at cloud side delete or change customer, this will hurt customer’s trust. Major failure of trust is the third option i.e. cloud side people can see customer data. This problem can be removed by the idea of encryption/decryption. Still issue is on study of road, either encryption can be done consumer side or on cloud side. It is observed that in case of CBCS, encryption/ decryption should be on cloud side because CBCS will be placed over here. As encryption/ decryption code will be added in CBCS, so customer can vacillate with such option because encryption code will be placed on cloud side. EQ (Encryption Queue) is solution of such problem, through which any customer can place the data (in CBCS) on cloud side without fear of being stolen of data. Setting of EQ will be done on client side and its running will be executed on cloud side with CBCS. In this way, CBCS will completely remove the DBCS from organization and can make its position more accurately. Implementation of CBCS will eliminate all drawbacks related to DBCS and will incorporate all the advantages of cloud computing with an organization. 2. EQ (Encryption Queue): EQ (Encryption Queue) which will present the setting of encryption policy on client side can provide a relief to customer for security issues. Since with CBCS there is a TA application [4], which can be extended, with encryption procedures i.e. EQ. Consumer high-up can set encryption policy according to their desire order from encryption list. High-up can change the order of such options and remove or add some options in EQ with different intervals of time. Since cloud side people does not know whether what order they have selected and what choices they have added in encryption queue. 2.1. Values for EQ Following are the some choices for encryption 1. Reverse string
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 2. Add any special symbol after 2 characters (Special Symbol and no of characters will be user defined) 3. Move character up 2 next position (2 is according to user choice) 4. Etc 2.2. Algorithm for EQ Algoritm for encryption will contain the following items Fields[]: This list contain the whole input fields which are going to be stored. encryptionQueue[]: This queue will contain different integer values for encryption choices. And also such value will be stored on cloud side database. encryptionQueue.count(): This methode will return value for total selected option. SaveOnCloudSide(Fields[]): This event will save the encrypted data field to database on cloud side. Encryption(Fields[],encryptionQueue[ I ]): this methode will apply encryption on Fields[] with respect to encryptionQueue[ I ]. Table-1 Algorithm for Encryption on Consumer Side 1. [Put all input fields in a list] Fields[] 2. [Select encryption options from list through TA in you desired order] encryptionQueue[] Perform step 4 for I=1 to encryptionQueue.count() 3. [Set encryption on all fields] Encryption(Fields[],encryptionQueue[ I ]) 4. [After applying encryption on customer side store encrypted data to cloud side] SaveOnCloudSide(Fields[]) 5. [Exit] Algorithm shows that each next encryption will be applied on previous encrypted data which will be much secure and any one can not guess, judge or decrypt such data. 3. Extension of TA (Implementation of EQ) This is implementation of encryption procedures in TA application, which will be installed on all client sides [2] but EQ will be permitted only to administrator or high-up. This interface will generate a queue for encryption (encryptionQueue []), this queue will be stored on database of cloud side, since in CBCS there are no database on consumer side. This queue will contain only integer values for different options. Cloud side people can not imagine which integer value relates to which type of encryption options. Fig-1 is showing the different choices for encryption sequence. Here special characters, number of characters and move character are the user defined choice. User can set the values for such options according to their desires.
  • 4. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Fig-1: Selecting 1st Option In Fig-1, 2nd option will be selected as 1st element of encryption queue. Here G will be added after 2 characters of each input data field. Fig-2: Selecting 2nd Option In Fig-2, 3rd option will be selected as 2nd element of encryption queue. Here each character of previous encrypted data will be moved up to 1 character.
  • 5. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Fig-3: Selecting 3rd Option In Fig-3, 1st option will be selected as 2nd element of encryption queue. Here previous encrypted data will be reversed. Hence by selecting above order of encryption choices encryptionQueue(EQ) will be as: EQ[1] EQ[2] EQ[3] EQ[1] EQ[2] EQ[3] 2 3 1 Value of encryptionQueue.count() will be 3. 3.1. Example (Encryption/ Decryption of word ‘Cloud’) Suppose input Data is “Cloud”. Field=”Cloud” Now encryption code shown in Fig-4 will be added to CBCS, so any data on CBCS will be saved on database in encrypted form. Fig-4: Code for encryption in CBCS Now applying code (shown in Fig-4) on above data Field. EQ[1] EQ[2] EQ[3] 2 3 1
  • 6. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Table-2: Encryption through Encryption Queue Encrypting Data Filed ‘Cloud’ When I=1 then option is 2. G will be added after 2 characters Now Cloud become as ClGouGd. When I=2 then option is 3. Move each character upto next 1. Previous encrypted data is ClGouGd. C D l m G H o p u v G H d e DmHpvHe When I=3 then option is 1 Reverse the previous encrypted data. Final Encrypted Data: eHvpHmD. Hence final encrypted word eHvpHmD will be stored in database. People of cloud side can not understand what its actual value is. Although they ma be familiar with different encryption options for CBCS, but they can not judge order of selection different options. Now when user access data from database, it will be first decrypted then appeared on user interface. Decryption is the inverse of encryption. Now apply encryptionQueue[] in reverse order. Table-3: Decryption through Encryption Queue Decrypting Data Filed ‘eHvpHmD’ When I=3 then option is 1 Reverse the previous encrypted data. Decrypted Data: DmHpvHe When I=2 then option is 3. Move each character upto previous 1. Previous encrypted data is ClGouGd. D C m l H G p o v u H G e d Decrypted Data: ClGouGd When I=1 then option is 2.
  • 7. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 G will be removed after 2 characters Now ClGouGd become as Cloud. Hence eHvpHmD is decrypted to Cloud 4. Conclusion Every new technology replaces the older one with more advantages. Since the trend of cloud computing is reducing the overheads of previous approaches for utilizing the different services/resources. This concept is very beneficial for business organizations. But when they utilize the storage resources for their personal business data, they can’t make trust over such resources. Encryption queue provides a completely user defined options for encrypting their data. Only organizational high ups will have the knowledge to construct the Encryption Queue. By using encryption queue with tinny application they can easily replace their custom application over cloud side and can take different advantages of cloud computing such as [1]: 1. It should be able to quickly allot and relieve resources whenever required by clients 2. It should have real-time backup to offer maximum up time to clients 3. It should be able to cater to the needs of clients without having to involve clients into management of the service. 4. There is no need of Backup devices. 5. No efforts require on backup and recovery 6. After system crash, only installation of operating system will required for connecting with internet. Besides above advantage, it will get the all advantages of CBCS[4] such as: - No need of Database software. - After system crash, only installation of operating system will required for connecting with internet. - A new system can be easily replaced at once and CBCS will work properly on spot. - CBCS does not require any supportable frame work, just internet connections. - No need of database server. - No need of technical securities on local area network even without local area network, CBCS can work properly with the connection of internet. References An Introduction to Cloud Computing, http://www.brighthub.com/environment/green-computing/ articles/10026.aspx?image=149096 Arnon Rosenthal, “Cloud computing: A new business paradigm for biomedical information sharing”, Journal of Biomedical Informatics 43 (2010) 342–353, ELSEVIER. Subhas Chandra Misra, “Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment”, Mathematical and Computer Modelling 53 (2011) 504-521, ELSEVIER Sheikh Muhammad Saqib, “Custom Software under the Shade of Cloud Computing”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 5, May 2011, PP 219- 223 Custom software, http://en.wikipedia.org/wiki/Custom_software Anthony T. Velte, Toby J. Velte, Ph.D, Robert Elsenpeter, ”Cloud Computing: A Practical Approach”, by The McGraw-Hill Companies, ISBN: 978-0-07-162695-8, 2010 John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Security” , CRC Press , ISBN: 978-1-4398-0680-7, 2010.
  • 8. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3