SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
www.ijarcet.org
2232

Abstract— Cloud Computing has been envisioned as the
next-generation architecture of IT Enterprise. In cloud
computing application software and databases are moving to
the centralized large data centres. This mechanism brings
about many new challenges, which have not been well
understood. Security and privacy concerns, however, are
among the top concerns standing in the way of wider adoption
of cloud. In cloud computing the main concern is to provide the
security to end user to protect files or data from unauthorized
user. Security is the main intention of any technology through
which unauthorized intruder can't access your file or data in
cloud. We have designed one proposed design and architecture
that can help to encrypt and decrypt the file at the user side
that provide security to data at rest as well as while moving. In
this research paper, we have used the Rijndael Encryption
Algorithm along with EAP-CHAP.
Index Terms— Authentication, Cloud, EAP-CHAP,
Encryption, Rijndael Algorithm
I. INTRODUCTION
Cloud computing is the next stage in the Internet's evolution,
providing the means through which everything- from
computing power to computing infrastructure, applications,
business processes to personal collaboration -can be
delivered to you as a service wherever and whenever you
need[1].
A.Cloud Computing Deployment Models
The various cloud deployment models are shown in
figure 1 given below:
1. Public Clouds:
In public cloud vendors dynamically allocate resources on a
per-user basis through web applications. For example: Drop
Box ,SkyDrive and Google drive.
Manuscript received June, 2013.
Sanjoli Singla, M.Tech(CSE) Student, RIMT-IET(Punjab Technical
University), Mandi Gobindgarh, India, +91-9815923890
Jasmeet Singh, Assistant Professor in CSE Department,
RIMT-IET(Punjab Technical University), Mandi Gobindgarh, India,
+91-9888265592.
Figure 1. Cloud Computing Deployment Models
2. Private Clouds:
Due to security and availability issues more and more
companies are choosing Private Clouds. It provides more
secure platform to the employees and customers of an
organization. For example Banks, In banks all the
employees and customers can access the bank data which is
assigned to them particularly.
3. Hybrid Cloud:
Hybrid cloud is the combination of the of the Public cloud
and private cloud. In this type of cloud services the internal
resources, stays under the control of the customer, and
external resources delivered by a cloud service provider.
4. Community Cloud:
The community cloud shares the infrastructure around
several organizations which can be managed and hosted
internally or by third party providers.[7]
B.Cloud Models or Layers
The various layers of cloud are shown in figure 2 given
below:
1) SAAS( Software as a service) – In this companies host
applications in the cloud that many users access through
internet connections. E.g. Gmail, facebook.
2) PAAS (Platform as a service) – Developers can design,
build and test applications that run on the cloud provider’s
infrastructure. E.g. Google app Engine.[2]
3) IAAS (infrastructure as a service) – This part is
basically belong to the admin part or we can say the service
provider. In this part the service provider provides the user
with the basic infrastructure. Like platform and the end
Cloud Data Security using Authentication and
Encryption Technique
Sanjoli Singla, Jasmeet Singh
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2233
www.ijarcet.org
applications which become the interface between users and
the cloud.[7]
Figure 2. Cloud Models or Layers
C.Data security issues in the cloud
Securing data is always of vital importance as shown in
figure 3 and because of the critical nature of cloud computing
and large amounts of complex data it carries, the need is even
important. Therefore, data privacy and security are issues
that need to be resolved as they are acting as a major obstacle
in the adoption of cloud computing services.
Figure 3. Cloud Computing Concerns
The major security issues with cloud are:-
1. Privacy and Confidentiality
Once the clients outsource data to the cloud there must be
some assurance that data is accessible to only authorized
users. The cloud user should be assured that data stored on
the cloud will be confidential.
2. Security and Data integrity
Data security can be provided using various encryption and
decryption techniques. With providing the security of the
data, cloud service provider should also implement
mechanism to monitor integrity of the data at the cloud.[3]
II. PROBLEM FORMULATION
Users who put their large data files in the cloud storage
servers can relieve the burden of storage and computation. At
the same time, it is critically important for users to ensure
that their data are being stored correctly and safely. So, users
should be equipped with certain security means so that they
can make sure that their data is safe. The major concern is the
security of data at rest and while moving. So to handle this
problem it is required that data at both user and server end
must be in encrypted form.
III. PROPOSED WORK PLAN
The two different approaches used for ensuring security in
cloud are as follows:-
1. Extensible Authentication Protocol-CHAP:
EAP(Extensible Authentication Protocol) will implement on
Cloud environment for authentication purpose. It is used for
the transport and usage of keying material and parameters
generated by EAP methods. In our purposed model we use
Challenge-Handshake Authentication Protocol (CHAP) for
authentication. [10]
2. Rijndael encryption Algorithm-Rijndael as the
standard symmetric key encryption algorithm to be used to
encrypt sensitive information. Rijndael is an iterated block
cipher, the encryption or decryption of a block of data is
accomplished by the iteration (a round) of a specific
transformation (a round function). As input, Rijndael accepts
one-dimensional 8-bit byte arrays that create data blocks.
The plaintext is input and then mapped onto state bytes. The
cipher keyis also a one-dimensional 8-bit byte array. With an
iterated block cipher, the different transformations operate in
sequence on intermediate cipher results (states). [6]
Figure 4. Methodology
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
www.ijarcet.org
2234
The steps of the methodology shown in figure 4 are given
below:-
1. User sends the authentication request to the Cloud Service
Provider (CSP).
2. CSP checks the authorization using EAP-CHAP and sends
the acknowledgement back to the user.
3. User first encrypts his data and then outsources it to the
server.
4. When the user downloads his data from CSP, it is received
in the encrypted form.
5. To use the data user can decrypt it using same key used for
encryption.
A. Authentication Protocol
EAP will implement on Cloud environment for
authentication purpose. However different categories EAP
are classified by authentication method. In our purposed
model we use Challenge-Handshake Authentication Protocol
(CHAP) for authentication. When client demands data or any
service of cloud computing. Service Provider Authenticator
(SPA) first requests for client identity. The whole process
between client and Cloud provide explain in a figure 5 given
below.
Figure 5. Implementation of CHAP in Cloud Computing
Authentication of CHAP performs in three steps :-
1. When client demands a service, Service Provider
Authentication sends a “challenge” message to client.
2. Client responds with a value that is calculated by using one
way hash function on the challenge.
3. Authenticator verifies the response value against its own
calculated hash value. If the values match, the Cloud
provider will give service, otherwise it should terminate
the connection.
Implementation of EAP-CHAP in Cloud Computing will
solve the authentication and authorization problems.[5]
B.Rijndael Encryption Algorithm Implementation
Encryption:
The code for encryption process is given in table 1.
Table 1. Rijndael Encryption Code
The User data is encrypted by using Rijndeal Encryption.
Symmetric key is used for encryption. The Rijndeal can be
implemented easily and it is one of the most secure
algorithms in the world. Rijndeal implementation has
128,192or 256 bit key lengths. Size of data blocks to be
encrypted with Rijndeal is always 128 bits. Initial round of
Rijndeal is AddRoundKey, this is followed by four iterative
round including subBytes, shiftRows, mixColumns and add
round key. Rijndeal with 128 bit key length has 10
rounds,192-bit has 12 rounds and 256 bit has 14 rounds.
Each round consists of the following steps.
1. Initial AddRoundKey
2. SubBytes () Transformation
3. Substitutional Box Created For Subbytes
4. MixColumns () Transformation
5. AddRoundKey () transformation
The inverse process of encryption gives decryption text.[4]
A. Rijndael Algorithm: Encryption/Decryption Process for
Rijndael Algorithm is shown in Figure 6.
Figure 6. Rijndael Algorithm
Rijndael(State, CipherKey)
{
KeyExpansion(CipherKey,ExpandedKey);
AddRoundKey(State,ExpandedKey);
For( i=1; iFinalRound(State,ExpandedKey +
Nb*Nr);
}
And the round function is defined as:
Round(State, RoundKey)
{ ByteSub(State);
ShiftRow(State);
MixColumn(State);
AddRoundKey(State,RoundKey);
}
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2235
www.ijarcet.org
1) The SubBytes step
The SubByte step is a non-linear byte substitution that
operates on each of the 'state' bytes independently, where a
state is an intermediate cipher result. Here each byte in
the state matrix is replaced with a SubByte using an
8-bit substitution box, the Rijndael S-box.
2) The ShiftRows step
The ShiftRows step operates on the rows of the state; it
cyclically shifts the bytes in each row by a certain offset. For
AES, the first row is left unchanged. Each byte of the second
row is shifted one to the left. Similarly, the third and fourth
rows are shifted by offsets of two and three respectively. For
blocks of sizes 128 bits and 192 bits, the shifting pattern is
the same. Row n is shifted left circular by n-1 bytes
3) The MixColumns step
During this operation, each column is multiplied by the
known matrix that for the 128-bit key is:
The multiplication operation is defined as: multiplication by
1 means no change, multiplication by 2 means shifting to the
left, and multiplication by 3 means shifting to the left and
then performing xor with the initial unshifted value. After
shifting, a conditional xor with 0x11B should be performed
if the shifted value is larger than 0xFF. In more general
sense, each column is treated as a polynomial over GF(28
)
and is then multiplied modulo x4
+1 with a fixed polynomial
c(x) = 0x03 · x3
+ x2
+ x + 0x02
4) The AddRoundKey step
In the AddRoundKey step, the subkey is combined with the
state. For each round, a subkey is derived from the
main key using Rijndael’s key schedule; each subkey is the
same size as the state. The subkey is added by combining
each byte of the state with the corresponding byte of the
subkey using bitwise XOR.[3]
IV. CONCLUSION
Data security has become the vital issue of cloud computing
security. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy
protection issues, remain the primary inhibitor for adoption
of cloud computing services. So in this we focused on client
side securityIn our proposed system, onlythe authorized user
can access the data. Even if some intruder (Unauthorized
user) gets access of the data accidentally or intentionally, he
will not be able to decrypt it. Also it is proposed that
encryption must be done by the user to provide better
security. Henceforth, security is provided using Rijndael
Algorithm.
REFERENCES
[1] Tejas.P.Bhatt, Ashish Maheta, “Security in Cloud Computing using File
Encryption”, International Journal of Engineering Research and Technology
(IJERT), Vol. 1, Issue 9, November 2012.
[2] Pratiyush Guleria, Vikas Sharma, “Development and Usage of Software as
a Service for a Cloud and Non-Cloud based Enviroment-An Empirical Study”,
International Journal of Cloud Computing and Services Sciences(IJ-CLOSER),
Vol. 2, No. 1, February 2013.
[3]Sanjoli Singla, Jasmeet Singh, “Survey on Enhancing Cloud Data Security
using EAP with Rijndael Encryption Algorithm”, Global Journal of Computer
Science and Technology (GJCST), Vol. 13, Issue 5, 2013.
[4] G.Jai Arul Jose, C.Sajeev, “Implementation of Data Security in Cloud
Computing”, International Journals of P2P Network Trends and Technology,
Vol. 1, Issue 1, 2011.
[5] Sadia Marium, Qamar Nazir, Aftab Ahmed, Saira Ahthasham, Mirza
Aamir Mehmood,” Implementation of EAP with RSA for enhancing the
security of cloud computing”, International Journal of Basics and Applied
Sciences, 1 (3) 2012 177-183.
[6] Prashant Rewagad, Yogita Pawar, “Use of Digital Signature and Rijndael
encryption Algorithm to Enhanced Security of data in Cloud computing
Services”, Proceeding published in International Journal of Computer
Applications (IJCA), 2012.
[7]http://thegadgetsquare.com/1552/what-is-cloud-computing/
[8] http://en.wikipedia.org/wiki/Cloud_computing
[9]http://en.wikipedia.org/wiki/Advanced_Encryption_Standard.
[10]https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol

Más contenido relacionado

La actualidad más candente

IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingIJERA Editor
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
E041212224
E041212224E041212224
E041212224IOSR-JEN
 

La actualidad más candente (19)

IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
R180203114117
R180203114117R180203114117
R180203114117
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
E041212224
E041212224E041212224
E041212224
 

Destacado

GEOESTADISTICA APLICADA .POR PONCE
GEOESTADISTICA APLICADA .POR PONCEGEOESTADISTICA APLICADA .POR PONCE
GEOESTADISTICA APLICADA .POR PONCEEduardo Mera
 
El marketing turistico1
El marketing turistico1El marketing turistico1
El marketing turistico1AJuniss Six
 
La organización para slidhare
La organización para slidhareLa organización para slidhare
La organización para slidhareitafurm
 
Mi vida en diapositivas
Mi vida en diapositivasMi vida en diapositivas
Mi vida en diapositivasCarlos Chavez
 
Estrategias Pedagógicas y Gestión en el aula_Tema 2
Estrategias Pedagógicas y Gestión en el aula_Tema 2Estrategias Pedagógicas y Gestión en el aula_Tema 2
Estrategias Pedagógicas y Gestión en el aula_Tema 2Joaquin Lara Sierra
 
Proyecto educativo nacional objetivo 3[1]
Proyecto educativo nacional  objetivo 3[1]Proyecto educativo nacional  objetivo 3[1]
Proyecto educativo nacional objetivo 3[1]Andree Villegas Farfan
 
Actividades de contextualizacion preguntas 5
Actividades de contextualizacion preguntas 5Actividades de contextualizacion preguntas 5
Actividades de contextualizacion preguntas 5Efrain Betancourt
 
Integracion didactica de las nuevas tecnologias
Integracion didactica de las nuevas tecnologiasIntegracion didactica de las nuevas tecnologias
Integracion didactica de las nuevas tecnologiasBeto Vera
 
Sistemas y metodos de valuacion de inventarios
Sistemas y metodos de valuacion de inventariosSistemas y metodos de valuacion de inventarios
Sistemas y metodos de valuacion de inventariospatricia zambrano
 
APLICACIONES GEOESTADISTICA II - VICTORIA HERRERA
APLICACIONES GEOESTADISTICA II -  VICTORIA HERRERAAPLICACIONES GEOESTADISTICA II -  VICTORIA HERRERA
APLICACIONES GEOESTADISTICA II - VICTORIA HERRERAEduardo Mera
 
Decreto 2200 de 2005 cp1
Decreto  2200 de 2005 cp1Decreto  2200 de 2005 cp1
Decreto 2200 de 2005 cp1David Diosa
 
tipos de_capacitacion
 tipos de_capacitacion tipos de_capacitacion
tipos de_capacitacionpedagogiaus7
 
Transmision Mediante Correas[1]
Transmision Mediante Correas[1]Transmision Mediante Correas[1]
Transmision Mediante Correas[1]pedro arias
 

Destacado (20)

GEOESTADISTICA APLICADA .POR PONCE
GEOESTADISTICA APLICADA .POR PONCEGEOESTADISTICA APLICADA .POR PONCE
GEOESTADISTICA APLICADA .POR PONCE
 
El marketing turistico1
El marketing turistico1El marketing turistico1
El marketing turistico1
 
La organización para slidhare
La organización para slidhareLa organización para slidhare
La organización para slidhare
 
Mi vida en diapositivas
Mi vida en diapositivasMi vida en diapositivas
Mi vida en diapositivas
 
Estrategias Pedagógicas y Gestión en el aula_Tema 2
Estrategias Pedagógicas y Gestión en el aula_Tema 2Estrategias Pedagógicas y Gestión en el aula_Tema 2
Estrategias Pedagógicas y Gestión en el aula_Tema 2
 
Proyecto educativo nacional objetivo 3[1]
Proyecto educativo nacional  objetivo 3[1]Proyecto educativo nacional  objetivo 3[1]
Proyecto educativo nacional objetivo 3[1]
 
Actividades de contextualizacion preguntas 5
Actividades de contextualizacion preguntas 5Actividades de contextualizacion preguntas 5
Actividades de contextualizacion preguntas 5
 
15.pdf
15.pdf15.pdf
15.pdf
 
Curso de vhdl
Curso de vhdl Curso de vhdl
Curso de vhdl
 
Integracion didactica de las nuevas tecnologias
Integracion didactica de las nuevas tecnologiasIntegracion didactica de las nuevas tecnologias
Integracion didactica de las nuevas tecnologias
 
Sistemas y metodos de valuacion de inventarios
Sistemas y metodos de valuacion de inventariosSistemas y metodos de valuacion de inventarios
Sistemas y metodos de valuacion de inventarios
 
308
308308
308
 
Las ntics
Las nticsLas ntics
Las ntics
 
Enzymes
EnzymesEnzymes
Enzymes
 
APLICACIONES GEOESTADISTICA II - VICTORIA HERRERA
APLICACIONES GEOESTADISTICA II -  VICTORIA HERRERAAPLICACIONES GEOESTADISTICA II -  VICTORIA HERRERA
APLICACIONES GEOESTADISTICA II - VICTORIA HERRERA
 
Decreto 2200 de 2005 cp1
Decreto  2200 de 2005 cp1Decreto  2200 de 2005 cp1
Decreto 2200 de 2005 cp1
 
tipos de_capacitacion
 tipos de_capacitacion tipos de_capacitacion
tipos de_capacitacion
 
Servicio Farmaceutico Decreto 2200
Servicio Farmaceutico   Decreto 2200Servicio Farmaceutico   Decreto 2200
Servicio Farmaceutico Decreto 2200
 
Transmision Mediante Correas[1]
Transmision Mediante Correas[1]Transmision Mediante Correas[1]
Transmision Mediante Correas[1]
 
1.3 educ emocional competenc_bas
1.3 educ emocional competenc_bas1.3 educ emocional competenc_bas
1.3 educ emocional competenc_bas
 

Similar a Ijarcet vol-2-issue-7-2232-2235

SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
A New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesA New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesMahmuda Rahman
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 

Similar a Ijarcet vol-2-issue-7-2232-2235 (20)

SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
G017214849
G017214849G017214849
G017214849
 
21 muhammad ahmadjan_8
21 muhammad ahmadjan_821 muhammad ahmadjan_8
21 muhammad ahmadjan_8
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
A New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesA New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing Services
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 

Más de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Más de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Ijarcet vol-2-issue-7-2232-2235

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 www.ijarcet.org 2232  Abstract— Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can't access your file or data in cloud. We have designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving. In this research paper, we have used the Rijndael Encryption Algorithm along with EAP-CHAP. Index Terms— Authentication, Cloud, EAP-CHAP, Encryption, Rijndael Algorithm I. INTRODUCTION Cloud computing is the next stage in the Internet's evolution, providing the means through which everything- from computing power to computing infrastructure, applications, business processes to personal collaboration -can be delivered to you as a service wherever and whenever you need[1]. A.Cloud Computing Deployment Models The various cloud deployment models are shown in figure 1 given below: 1. Public Clouds: In public cloud vendors dynamically allocate resources on a per-user basis through web applications. For example: Drop Box ,SkyDrive and Google drive. Manuscript received June, 2013. Sanjoli Singla, M.Tech(CSE) Student, RIMT-IET(Punjab Technical University), Mandi Gobindgarh, India, +91-9815923890 Jasmeet Singh, Assistant Professor in CSE Department, RIMT-IET(Punjab Technical University), Mandi Gobindgarh, India, +91-9888265592. Figure 1. Cloud Computing Deployment Models 2. Private Clouds: Due to security and availability issues more and more companies are choosing Private Clouds. It provides more secure platform to the employees and customers of an organization. For example Banks, In banks all the employees and customers can access the bank data which is assigned to them particularly. 3. Hybrid Cloud: Hybrid cloud is the combination of the of the Public cloud and private cloud. In this type of cloud services the internal resources, stays under the control of the customer, and external resources delivered by a cloud service provider. 4. Community Cloud: The community cloud shares the infrastructure around several organizations which can be managed and hosted internally or by third party providers.[7] B.Cloud Models or Layers The various layers of cloud are shown in figure 2 given below: 1) SAAS( Software as a service) – In this companies host applications in the cloud that many users access through internet connections. E.g. Gmail, facebook. 2) PAAS (Platform as a service) – Developers can design, build and test applications that run on the cloud provider’s infrastructure. E.g. Google app Engine.[2] 3) IAAS (infrastructure as a service) – This part is basically belong to the admin part or we can say the service provider. In this part the service provider provides the user with the basic infrastructure. Like platform and the end Cloud Data Security using Authentication and Encryption Technique Sanjoli Singla, Jasmeet Singh
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2233 www.ijarcet.org applications which become the interface between users and the cloud.[7] Figure 2. Cloud Models or Layers C.Data security issues in the cloud Securing data is always of vital importance as shown in figure 3 and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Therefore, data privacy and security are issues that need to be resolved as they are acting as a major obstacle in the adoption of cloud computing services. Figure 3. Cloud Computing Concerns The major security issues with cloud are:- 1. Privacy and Confidentiality Once the clients outsource data to the cloud there must be some assurance that data is accessible to only authorized users. The cloud user should be assured that data stored on the cloud will be confidential. 2. Security and Data integrity Data security can be provided using various encryption and decryption techniques. With providing the security of the data, cloud service provider should also implement mechanism to monitor integrity of the data at the cloud.[3] II. PROBLEM FORMULATION Users who put their large data files in the cloud storage servers can relieve the burden of storage and computation. At the same time, it is critically important for users to ensure that their data are being stored correctly and safely. So, users should be equipped with certain security means so that they can make sure that their data is safe. The major concern is the security of data at rest and while moving. So to handle this problem it is required that data at both user and server end must be in encrypted form. III. PROPOSED WORK PLAN The two different approaches used for ensuring security in cloud are as follows:- 1. Extensible Authentication Protocol-CHAP: EAP(Extensible Authentication Protocol) will implement on Cloud environment for authentication purpose. It is used for the transport and usage of keying material and parameters generated by EAP methods. In our purposed model we use Challenge-Handshake Authentication Protocol (CHAP) for authentication. [10] 2. Rijndael encryption Algorithm-Rijndael as the standard symmetric key encryption algorithm to be used to encrypt sensitive information. Rijndael is an iterated block cipher, the encryption or decryption of a block of data is accomplished by the iteration (a round) of a specific transformation (a round function). As input, Rijndael accepts one-dimensional 8-bit byte arrays that create data blocks. The plaintext is input and then mapped onto state bytes. The cipher keyis also a one-dimensional 8-bit byte array. With an iterated block cipher, the different transformations operate in sequence on intermediate cipher results (states). [6] Figure 4. Methodology
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 www.ijarcet.org 2234 The steps of the methodology shown in figure 4 are given below:- 1. User sends the authentication request to the Cloud Service Provider (CSP). 2. CSP checks the authorization using EAP-CHAP and sends the acknowledgement back to the user. 3. User first encrypts his data and then outsources it to the server. 4. When the user downloads his data from CSP, it is received in the encrypted form. 5. To use the data user can decrypt it using same key used for encryption. A. Authentication Protocol EAP will implement on Cloud environment for authentication purpose. However different categories EAP are classified by authentication method. In our purposed model we use Challenge-Handshake Authentication Protocol (CHAP) for authentication. When client demands data or any service of cloud computing. Service Provider Authenticator (SPA) first requests for client identity. The whole process between client and Cloud provide explain in a figure 5 given below. Figure 5. Implementation of CHAP in Cloud Computing Authentication of CHAP performs in three steps :- 1. When client demands a service, Service Provider Authentication sends a “challenge” message to client. 2. Client responds with a value that is calculated by using one way hash function on the challenge. 3. Authenticator verifies the response value against its own calculated hash value. If the values match, the Cloud provider will give service, otherwise it should terminate the connection. Implementation of EAP-CHAP in Cloud Computing will solve the authentication and authorization problems.[5] B.Rijndael Encryption Algorithm Implementation Encryption: The code for encryption process is given in table 1. Table 1. Rijndael Encryption Code The User data is encrypted by using Rijndeal Encryption. Symmetric key is used for encryption. The Rijndeal can be implemented easily and it is one of the most secure algorithms in the world. Rijndeal implementation has 128,192or 256 bit key lengths. Size of data blocks to be encrypted with Rijndeal is always 128 bits. Initial round of Rijndeal is AddRoundKey, this is followed by four iterative round including subBytes, shiftRows, mixColumns and add round key. Rijndeal with 128 bit key length has 10 rounds,192-bit has 12 rounds and 256 bit has 14 rounds. Each round consists of the following steps. 1. Initial AddRoundKey 2. SubBytes () Transformation 3. Substitutional Box Created For Subbytes 4. MixColumns () Transformation 5. AddRoundKey () transformation The inverse process of encryption gives decryption text.[4] A. Rijndael Algorithm: Encryption/Decryption Process for Rijndael Algorithm is shown in Figure 6. Figure 6. Rijndael Algorithm Rijndael(State, CipherKey) { KeyExpansion(CipherKey,ExpandedKey); AddRoundKey(State,ExpandedKey); For( i=1; iFinalRound(State,ExpandedKey + Nb*Nr); } And the round function is defined as: Round(State, RoundKey) { ByteSub(State); ShiftRow(State); MixColumn(State); AddRoundKey(State,RoundKey); }
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2235 www.ijarcet.org 1) The SubBytes step The SubByte step is a non-linear byte substitution that operates on each of the 'state' bytes independently, where a state is an intermediate cipher result. Here each byte in the state matrix is replaced with a SubByte using an 8-bit substitution box, the Rijndael S-box. 2) The ShiftRows step The ShiftRows step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain offset. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. For blocks of sizes 128 bits and 192 bits, the shifting pattern is the same. Row n is shifted left circular by n-1 bytes 3) The MixColumns step During this operation, each column is multiplied by the known matrix that for the 128-bit key is: The multiplication operation is defined as: multiplication by 1 means no change, multiplication by 2 means shifting to the left, and multiplication by 3 means shifting to the left and then performing xor with the initial unshifted value. After shifting, a conditional xor with 0x11B should be performed if the shifted value is larger than 0xFF. In more general sense, each column is treated as a polynomial over GF(28 ) and is then multiplied modulo x4 +1 with a fixed polynomial c(x) = 0x03 · x3 + x2 + x + 0x02 4) The AddRoundKey step In the AddRoundKey step, the subkey is combined with the state. For each round, a subkey is derived from the main key using Rijndael’s key schedule; each subkey is the same size as the state. The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise XOR.[3] IV. CONCLUSION Data security has become the vital issue of cloud computing security. From the consumers’ perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. So in this we focused on client side securityIn our proposed system, onlythe authorized user can access the data. Even if some intruder (Unauthorized user) gets access of the data accidentally or intentionally, he will not be able to decrypt it. Also it is proposed that encryption must be done by the user to provide better security. Henceforth, security is provided using Rijndael Algorithm. REFERENCES [1] Tejas.P.Bhatt, Ashish Maheta, “Security in Cloud Computing using File Encryption”, International Journal of Engineering Research and Technology (IJERT), Vol. 1, Issue 9, November 2012. [2] Pratiyush Guleria, Vikas Sharma, “Development and Usage of Software as a Service for a Cloud and Non-Cloud based Enviroment-An Empirical Study”, International Journal of Cloud Computing and Services Sciences(IJ-CLOSER), Vol. 2, No. 1, February 2013. [3]Sanjoli Singla, Jasmeet Singh, “Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm”, Global Journal of Computer Science and Technology (GJCST), Vol. 13, Issue 5, 2013. [4] G.Jai Arul Jose, C.Sajeev, “Implementation of Data Security in Cloud Computing”, International Journals of P2P Network Trends and Technology, Vol. 1, Issue 1, 2011. [5] Sadia Marium, Qamar Nazir, Aftab Ahmed, Saira Ahthasham, Mirza Aamir Mehmood,” Implementation of EAP with RSA for enhancing the security of cloud computing”, International Journal of Basics and Applied Sciences, 1 (3) 2012 177-183. [6] Prashant Rewagad, Yogita Pawar, “Use of Digital Signature and Rijndael encryption Algorithm to Enhanced Security of data in Cloud computing Services”, Proceeding published in International Journal of Computer Applications (IJCA), 2012. [7]http://thegadgetsquare.com/1552/what-is-cloud-computing/ [8] http://en.wikipedia.org/wiki/Cloud_computing [9]http://en.wikipedia.org/wiki/Advanced_Encryption_Standard. [10]https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol