SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
DOI : 10.5121/ijdps.2014.5308 77
CRYPTO MULTI TENANT: AN ENVIRONMENT OF
SECURE COMPUTING USING CLOUD SQL
Parul Kashyap and Rahul Singh
Department of Computer Science & Engineering, S.R.M.U., Uttar Pradesh, India
ABSTRACT
Today’s most modern research area of computing is cloud computing due to its ability to diminish the costs
associated with virtualization, high availability, dynamic resource pools and increases the efficiency of
computing. But still it contains some drawbacks such as privacy, security, etc. This paper is thoroughly
focused on the security of data of multi tenant model obtains from the virtualization feature of cloud
computing. We use AES-128 bit algorithm and cloud SQL to protect sensitive data before storing in the
cloud. When the authorized customer arises for usage of data, then data firstly decrypted after that
provides to the customer. Multi tenant infrastructure is supported by Google, which prefers pushing of
contents in short iteration cycle. As the customer is distributed and their demands can arise anywhere,
anytime so data can’t store at particular site it must be available different sites also. For this faster
accessing by different users from different places Google is the best one. To get high reliability and
availability data is stored in encrypted before storing in database and updated every time after usage. It is
very easy to use without requiring any software. This authenticate user can recover their encrypted and
decrypted data, afford efficient and data storage security in the cloud.
KEYWORDS
Cloud computing, Multi tenant, AES, Cloud SQL, Google App Engine.
1. INTRODUCTION
In this modern period internet is working as a conventional hosting system which is accessible
through different services with limited usage and storage. But the current drift in business
requires vitality in computing and storage, it causes the development of cloud computing. For the
issues of computing, storage, and software, cloud computing proposes new models. This model
provides expansion in the environment, allocation and reallocation of assets when desired, storage
and networking ability virtually. It satisfies on demand need of the customers. Cloud computing
work as a combination of computational paradigm and distribution architecture. The major aim is
to provide services like net computing services, flexible data storage containing required
resources visualized as a service and delivered over the internet [1] [2]. Cloud computing
enhances many features like scalability, availability, adapt progress of demand, teamwork, pick
up the pace of development, provide potential for outlay fall through efficient and optimized
computing [3][ 4].
One of the important characteristics of cloud computing is multitenancy. This feature is similar in
nature with other multiple families on the same platform. It contained large no. Of resources and
data of different users which get differentiate by their unique identification. In this multitenancy
model certain level of control is provides for customizing and tailoring of hardware and software
for fulfilling customer demands. In multi tenancy model physical server partition occur with
virtualization. This virtualization feature contains good capability of separation. But still some
security issues arise those are data isolation, architecture expansion, configuration self definition
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
78
and performance customization. This feature favours users to copy, create, drift and roll back
virtual machines for running many applications [5] [6]. Like physical machine security, virtual
machine security is also important Virtual machine because error in any virtual machine may
cause in error in other [7]. Virtual machine as two boundaries- physical and virtual as physical
servers [8]. This paper is basically focused on data isolation.
From the aspect of quality of service data security is important (cong et al., 2009). When
the customer arises to satisfy their demand, it firstly assures that their data will be secure. Due to
which we use encryption algorithm to secure data storage and access. For this AES (advanced
encryption standard) 128 bit encryption algorithm is used to encrypt data before storing data in a
database. When the customer came to use resources or data on the physical server if it is
authorized then firstly decrypted and after that it provides to the user. Multi tenant infrastructure
is supported by many Applications, Google is one of them. Google pushes the contents in short
iteration. There are large of functionalities are added weekly basis, due to which required update
also done weekly basis in a Google cloud
(http://www.Google.com/Apps/intl/en/business/cloud.html). When the new features are
introduced, they automatically reflected in the browser. As Google sustain by cloud computing, it
gets updated to fulfil millions of customer demands. The customers’ needs are not only
maintained on single site, but other secured centres also, so that when one site fails to fulfil the
customer demand it get fulfil by another site. Google supports parallel and fast access from
various places. For flexibility and reliability data are stored in various data centres. It is easy to
use Google cloud SQL. It does not require any type of software. Google cloud SQL concerns, my
SQL instances, which is similar to my SQL. It contains all features as my SQL and other
contained features are:
Instances limited up to 10GB, synchronous duplication, importation database, export database,
command line tools, highly obtainable, completely managed, SQL prompt.
In this study, we suggest a way of implementing the AES algorithm on the data before storing in
the database by the cloud service provider (CSP). Every cloud service seeker should confirm the
security criteria with cloud security provider before hosting data in the database. As many tenants
cause many changes to their data after every regular interval, so there are many challenges to
overcome.
2. CHALLENGES TO THE DATA SECURITY IN THE MULTI TENANT MODEL
Cloud basically offers classy storage and admittance climate, but this is not hundred percentages
trustworthy; the dispute exists in ensuring the authoritative admittance. As the data in multiple
tenant model shared between large numbers of tenants so its storage is an important issue. Each
tenant ensures firstly before storing data in the cloud that his data is at a secure place or not. In the
current period, few vendor cloud data centres has breached of cloud data security, recent example
of it, is the hacking of the nearly 450,000 passwords from the yahoo service called ‘yahoo voice’.
The exposure surroundings the event states that the primary technique used by the hacker is SQL
injection to get the information out of the database. As we know that network medium is the main
source of communication, so there is the possibility of sharing of network component among
tenants due to resource pooling [9] [10]. Security is the principal unease on multi tenancy model,
while best benefits of cloud delivery model is obtained through multi tenancy, where resources is
shared by many users demanding of efficiency. SAAS users totally depend on provider for proper
security then data security is the major issue [10] [12].
When the big organization comes to store their data, they already get nervous when they hear
their data going to store with their competitive organizations. Cloud provider ease their stress by
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
79
providing multitenant architecture which basically deals with the security issues related to the
tenants data from each other. In SAAS or organizational data is serving in plain text and then
stored in the cloud. So SAAS provider is one dependable for security of data at the time of
serving and storing [13]. There are basically two issues of data security are as follows:
A. Security of data at transmit state.
B. Security of data at rest state.
C. Security of data in transmit state is basically concerned with isolation at network level.
While security of data at rest state is further divided in four parts where data is residing and
security issues can arise.
A. Application level security.
B. User level security, concerned with mobility and replication of data of users.
C. Virtual level security, concerned with unauthorized exposure, unapproved migration, physical
compromise.
D. Tenant level security, concerned with the data between the tenants.
3. PROPOSED WORK
Multi tenancy is the model where the physical server provides with partition by virtualization.
This partitioned server refers as a virtual machine (VM) and the users become tenants. Basically
data of tenants are stored in the database, so design of the database is also plays an important role.
Typically three ways are available to store data:
 Separate database- each tenant refers separate database.
 Separate schema- each tenant provides a separate logical unit called schema.
 Separate rows- each tenant allocates same database and schema, but each tenant
information get separate with their primary key as row wise in the database.
This paper basically focuses on the third concept of separate rows. In the multi tenant model
tenant’s data isolation is a great issue. So from the security point view separate database is
provided to each of the tenants, but it is less reliable and also time taking. To overcome this
penalty a single database is used by all the tenants on the same physical machine. But still there
are problems of security of data of tenants from each other which get reduced by providing the
concept of cryptography. Through cryptography concept we use AES (advanced encryption
standard) algorithm to encrypt data of the tenant before storing in the database. Each row of
database separates by their differentiating by their ids.
Each time when the customer comes to store their data, it firstly faces the encryption boundary of
AES algorithm provided by the cloud service provider (CSP). Where it gets encrypted and after
that it store in database.
4. BASE METHODOLOGY
AES algorithm- basically AES is a symmetric block algorithm. This means encryption and
decryption is done by the same key. This algorithm can accept block size of 128 bits and use three
keys of choice, i.e. 128, 192, 256 bits Based upon which type of version is used by the customer;
hence the standard is named as AES-128, AES-192, and AES-256 respectively. The encryption
process of AES consists of 10 rounds of processing for 128 bits. All rounds are identical except
the last one. AES algorithm begins with a stage of adding round key followed by 9 rounds of four
stages and tenth round of three stages. The required stages are as follows:
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
80
1. Sub bytes- In this step of sub bytes a look up table is used in which each byte is replaced with.
2. Shift rows- In this step of shift rows, shifting of rows occurs cyclically with a particular offset,
while leaving the first unchanged.
3. Mix column- In this step of mixing operations occur using an invertible linear conversion in
order to merge the four bytes in each column.
4. Add round key- This step includes derivation of round keys from Rijindael’s key agenda and
this round key gets added to each byte of the state.
In these last steps are performed up to fourth round, fifth round contains above all step except mix
column step as shown in figure 1.
4. EXPERIMENTAL METHODOLOGY
There are following steps which require implementing the AES algorithm in cloud to create
Google Application:
Step 1: firstly enter the URL http://accounts.Google.com/, then Google user name and password.
Step 2: Select Google Application link (my Application).
Step 3: Choose “Create Application” key, grant Application identifier, Application heading and
then get on “Create Application” button. At this instant Application is ready.
Now we implement AES algorithm in the Google cloud:
There are subsequent methods to create database, tables in Google cloud SQL
Step 1: Enter https://code.Google.com/apis/console and go for Google Cloud SQL alternative.
Step 2: Select “New Instance” tab from the right upper corner and popup window displayed.
Step 3: Now enter the instance name and correlated an authorative Application which is formed
earlier and then click on “Create Instance” button.
Step 4: Go for instance name to visualize its associated properties.
Step 5: From loading database automatically we select “SQL Prompt” tab.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
81
Figure 1. Encryption and Decryption of AES
Step 6: For creating a database for the Application we use “Create Database” query, all necessary
tables are created.
Step 7: Add record to the desired table, we use “Insert Into” query.
Step 8: Generate client interface for the Application.
Step 9: Now write Java code of the AES algorithm to implement algorithm in cloud and debug
the Application in Google cloud.
Step 10: Encrypted get sore and decrypted data is displayed while accessing.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
82
5. SAMPLE DATA
Figure 2. Application “Student Entry” Created in Google App Engine.
Figure 3. Hello App Engine.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
83
Figure 4. Student Entry Detail.
A User Interface and Application are Created Using Java and Jsp in Eclipse by Accquiring
Following Steps are:
Step 1: Database is created in Google cloud named as “Studententry”.
Step 2: “Student Entry Detail” table is created in student entry database with its required field like
name, id, contact department etc.
Step 3: An application “Student entry” was created in Google app engine by applying above
specified steps shown in figure2.
Step 4: To operate the Student Entry Details we designed user interface. User interface uses these
details. It firstly choose student link, then Student Entry Detail is displayed as shown in Figure 3
and Figure 4.
Step 5: Now by clicking on “Submit” button the details is received by student class and keys are
generated using AES algorithm.
Step 6: Using these generated keys data is encrypted using AES algorithm and then stored in
database.
Step 7: At the stage of data retrieval it is decrypted using generated keys.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
84
Figure 5. Execution Flow of Entire Process
6. CONCLUSIONS
In our proposed work we mainly focus on data security of tenants so that only the authorized user
can access the data. To provide this feature we use encryption and decryption process of data so
that the only legal tenant can access their particular data. Hence, for security related to data of
tenants we implement AES (advanced encryption standard) using cloud SQL. The result obtained
from experimental methodology proved that AES gives protection for the data stored in the cloud.
We make use of AES algorithm and Google App Engine to supply secured data storage,
efficiency, assure availability in the condition of cloud denial-of-service attacks and data security
in the cloud. This Approach is basically implemented by tenants who are going to store their data
in the cloud. This approach is implemented by tenant itself at the cloud security provider (CSP)
who stores data in the database.
ACKNOWLEDGEMENTS
This research paper is made possible through the help and support from everyone, including:
parents, teachers, family, friends, and in essence, all sentient beings.
REFERENCES
[1] S. Zhang, S. Zhang, X. Chen, and X. Huo, "Cloud Computing Research and Development Trend," In:
Second International Conference on Future Networks (ICFN’ 10), Sanya, Hainan, China IEEE
Computer Society ,Washington, DC, USA, pp. 93- 97, 2010.
[2] G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. Ye, and N. Tang, "Cloud Computing: A Statistics
Aspect of Users," In: First International Conference on Cloud Computing (CloudCom), Beijing,
China. Springer Berlin, Heidelberg, pp. 347 - 358, 2009.
[3] Marinos. A and G. Briscoe, "Community Cloud Computing," In: 1st International Conference on
Cloud Computing (CloudCom, Beijing, China. Springer-Verlag Berlin, Heidelberg, 2009.
[4] A. Khalid, "Cloud Computing: applying issues in Small Business," In: International Conference on
Signal Acquisition and Processing (ICSAP’ 10), pp. 278 - 281, 2010.
[5] A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," In: IEEE International
Carnahan Conference on Security Technology (ICCST ) , KS, USA. IEEE Computer Society,
Washington, DC, USA, pp. 35- 41, 2010.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
85
[6] T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual
machine based computing environments," In: Proceedings of the 10th conference on Hot Topics in
Operating Systems, Santa Fe, NM. volume 10. USENIX Association Berkeley, CA, USA, pp. 227-
229, 2005.
[7] L. Ertaul, S. Singhal, and S. Gökay, "Security challenges in Cloud Computing," In: Proceedings of the
2010 International conference on Security and Management SAM’ 10. CSREA Press, Las Vegas, US,
pp. 36- 42, 2010.
[8] M. Morsy, J. Grundy, and I. ller, "An analysis of the Cloud Computing Security problem," In:
Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia, 2010.
[9] B. Grobauer, Walloschek. T, and E. Stocker, "Understanding Cloud Computing vulnerabilities," IEEE
Security Privacy 9(2), pp. 50-57, 2011.
[10] J. Rittinghouse and J. Ransome, "Security in the Cloud," In: Cloud Computing. Implementation,
Management, and Security, CRC Press, 2009.
[11] S. Subashini and V. Kavitha, "A survey on Security issues in service delivery models of Cloud
Computing," Journal of Network Computer Application pp. 1-11, 2011.
[12] J. Viega, "Cloud Computing and the common Man," IEEE Computer Society , 42(8), pp. 106 - 108,
2009.
[13] J. Ju, Y. Wang, J. Fu, J. Wu, and Z. Lin, "Research on Key Technology in SaaS," In: International
Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China, IEEE
Computer Society, Washington, DC, USA, pp. 384- 387, 2010.
Authors
Parul Kashyap is student of M.Tech., Dept. of Computer Science and Engg.,
S.R.M.U., Lucknow, Uttar Pradesh, India and she has completed B.Tech.(Computer
Science & Engineering) from RIET Kanpur, India in 2012. Currently, She is working
research on Data Security. She has contributed in various research papers in various
National and International journals.
Rahul Singh, Asst. Professor, Dept. of Computer Science and Engineering, SRMU,
Lucknow, Uttar Pradesh, India. He has completed M.Tech (Computer Science &
Engineering) from Motilal Nehru National Institute of Technology, Allahabad, India
and B.Tech (Computer Science & Engineering) from Ajay Kumar Garg Engineering
College, Ghaziabad, India 2013 and 2010 respectively. His research interests include
Cloud computing, Distributed Computing and Mobile computing.

Más contenido relacionado

La actualidad más candente

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...IJERA Editor
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 

La actualidad más candente (20)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 

Destacado

Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
 
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...ijdpsjournal
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...ijdpsjournal
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...ijdpsjournal
 
GPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite ImagesGPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite Imagesijdpsjournal
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
Spectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesSpectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesijdpsjournal
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...ijdpsjournal
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYBREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYijdpsjournal
 
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSSTUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSijdpsjournal
 
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...ijdpsjournal
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 

Destacado (19)

Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
 
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
 
GPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite ImagesGPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite Images
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Spectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesSpectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countries
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYBREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
 
4213ijdps03
4213ijdps034213ijdps03
4213ijdps03
 
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSSTUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
 
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 

Similar a Crypto multi tenant an environment of secure computing using cloud sql

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmIJERA Editor
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar a Crypto multi tenant an environment of secure computing using cloud sql (20)

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
F017414853
F017414853F017414853
F017414853
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Crypto multi tenant an environment of secure computing using cloud sql

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 DOI : 10.5121/ijdps.2014.5308 77 CRYPTO MULTI TENANT: AN ENVIRONMENT OF SECURE COMPUTING USING CLOUD SQL Parul Kashyap and Rahul Singh Department of Computer Science & Engineering, S.R.M.U., Uttar Pradesh, India ABSTRACT Today’s most modern research area of computing is cloud computing due to its ability to diminish the costs associated with virtualization, high availability, dynamic resource pools and increases the efficiency of computing. But still it contains some drawbacks such as privacy, security, etc. This paper is thoroughly focused on the security of data of multi tenant model obtains from the virtualization feature of cloud computing. We use AES-128 bit algorithm and cloud SQL to protect sensitive data before storing in the cloud. When the authorized customer arises for usage of data, then data firstly decrypted after that provides to the customer. Multi tenant infrastructure is supported by Google, which prefers pushing of contents in short iteration cycle. As the customer is distributed and their demands can arise anywhere, anytime so data can’t store at particular site it must be available different sites also. For this faster accessing by different users from different places Google is the best one. To get high reliability and availability data is stored in encrypted before storing in database and updated every time after usage. It is very easy to use without requiring any software. This authenticate user can recover their encrypted and decrypted data, afford efficient and data storage security in the cloud. KEYWORDS Cloud computing, Multi tenant, AES, Cloud SQL, Google App Engine. 1. INTRODUCTION In this modern period internet is working as a conventional hosting system which is accessible through different services with limited usage and storage. But the current drift in business requires vitality in computing and storage, it causes the development of cloud computing. For the issues of computing, storage, and software, cloud computing proposes new models. This model provides expansion in the environment, allocation and reallocation of assets when desired, storage and networking ability virtually. It satisfies on demand need of the customers. Cloud computing work as a combination of computational paradigm and distribution architecture. The major aim is to provide services like net computing services, flexible data storage containing required resources visualized as a service and delivered over the internet [1] [2]. Cloud computing enhances many features like scalability, availability, adapt progress of demand, teamwork, pick up the pace of development, provide potential for outlay fall through efficient and optimized computing [3][ 4]. One of the important characteristics of cloud computing is multitenancy. This feature is similar in nature with other multiple families on the same platform. It contained large no. Of resources and data of different users which get differentiate by their unique identification. In this multitenancy model certain level of control is provides for customizing and tailoring of hardware and software for fulfilling customer demands. In multi tenancy model physical server partition occur with virtualization. This virtualization feature contains good capability of separation. But still some security issues arise those are data isolation, architecture expansion, configuration self definition
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 78 and performance customization. This feature favours users to copy, create, drift and roll back virtual machines for running many applications [5] [6]. Like physical machine security, virtual machine security is also important Virtual machine because error in any virtual machine may cause in error in other [7]. Virtual machine as two boundaries- physical and virtual as physical servers [8]. This paper is basically focused on data isolation. From the aspect of quality of service data security is important (cong et al., 2009). When the customer arises to satisfy their demand, it firstly assures that their data will be secure. Due to which we use encryption algorithm to secure data storage and access. For this AES (advanced encryption standard) 128 bit encryption algorithm is used to encrypt data before storing data in a database. When the customer came to use resources or data on the physical server if it is authorized then firstly decrypted and after that it provides to the user. Multi tenant infrastructure is supported by many Applications, Google is one of them. Google pushes the contents in short iteration. There are large of functionalities are added weekly basis, due to which required update also done weekly basis in a Google cloud (http://www.Google.com/Apps/intl/en/business/cloud.html). When the new features are introduced, they automatically reflected in the browser. As Google sustain by cloud computing, it gets updated to fulfil millions of customer demands. The customers’ needs are not only maintained on single site, but other secured centres also, so that when one site fails to fulfil the customer demand it get fulfil by another site. Google supports parallel and fast access from various places. For flexibility and reliability data are stored in various data centres. It is easy to use Google cloud SQL. It does not require any type of software. Google cloud SQL concerns, my SQL instances, which is similar to my SQL. It contains all features as my SQL and other contained features are: Instances limited up to 10GB, synchronous duplication, importation database, export database, command line tools, highly obtainable, completely managed, SQL prompt. In this study, we suggest a way of implementing the AES algorithm on the data before storing in the database by the cloud service provider (CSP). Every cloud service seeker should confirm the security criteria with cloud security provider before hosting data in the database. As many tenants cause many changes to their data after every regular interval, so there are many challenges to overcome. 2. CHALLENGES TO THE DATA SECURITY IN THE MULTI TENANT MODEL Cloud basically offers classy storage and admittance climate, but this is not hundred percentages trustworthy; the dispute exists in ensuring the authoritative admittance. As the data in multiple tenant model shared between large numbers of tenants so its storage is an important issue. Each tenant ensures firstly before storing data in the cloud that his data is at a secure place or not. In the current period, few vendor cloud data centres has breached of cloud data security, recent example of it, is the hacking of the nearly 450,000 passwords from the yahoo service called ‘yahoo voice’. The exposure surroundings the event states that the primary technique used by the hacker is SQL injection to get the information out of the database. As we know that network medium is the main source of communication, so there is the possibility of sharing of network component among tenants due to resource pooling [9] [10]. Security is the principal unease on multi tenancy model, while best benefits of cloud delivery model is obtained through multi tenancy, where resources is shared by many users demanding of efficiency. SAAS users totally depend on provider for proper security then data security is the major issue [10] [12]. When the big organization comes to store their data, they already get nervous when they hear their data going to store with their competitive organizations. Cloud provider ease their stress by
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 79 providing multitenant architecture which basically deals with the security issues related to the tenants data from each other. In SAAS or organizational data is serving in plain text and then stored in the cloud. So SAAS provider is one dependable for security of data at the time of serving and storing [13]. There are basically two issues of data security are as follows: A. Security of data at transmit state. B. Security of data at rest state. C. Security of data in transmit state is basically concerned with isolation at network level. While security of data at rest state is further divided in four parts where data is residing and security issues can arise. A. Application level security. B. User level security, concerned with mobility and replication of data of users. C. Virtual level security, concerned with unauthorized exposure, unapproved migration, physical compromise. D. Tenant level security, concerned with the data between the tenants. 3. PROPOSED WORK Multi tenancy is the model where the physical server provides with partition by virtualization. This partitioned server refers as a virtual machine (VM) and the users become tenants. Basically data of tenants are stored in the database, so design of the database is also plays an important role. Typically three ways are available to store data:  Separate database- each tenant refers separate database.  Separate schema- each tenant provides a separate logical unit called schema.  Separate rows- each tenant allocates same database and schema, but each tenant information get separate with their primary key as row wise in the database. This paper basically focuses on the third concept of separate rows. In the multi tenant model tenant’s data isolation is a great issue. So from the security point view separate database is provided to each of the tenants, but it is less reliable and also time taking. To overcome this penalty a single database is used by all the tenants on the same physical machine. But still there are problems of security of data of tenants from each other which get reduced by providing the concept of cryptography. Through cryptography concept we use AES (advanced encryption standard) algorithm to encrypt data of the tenant before storing in the database. Each row of database separates by their differentiating by their ids. Each time when the customer comes to store their data, it firstly faces the encryption boundary of AES algorithm provided by the cloud service provider (CSP). Where it gets encrypted and after that it store in database. 4. BASE METHODOLOGY AES algorithm- basically AES is a symmetric block algorithm. This means encryption and decryption is done by the same key. This algorithm can accept block size of 128 bits and use three keys of choice, i.e. 128, 192, 256 bits Based upon which type of version is used by the customer; hence the standard is named as AES-128, AES-192, and AES-256 respectively. The encryption process of AES consists of 10 rounds of processing for 128 bits. All rounds are identical except the last one. AES algorithm begins with a stage of adding round key followed by 9 rounds of four stages and tenth round of three stages. The required stages are as follows:
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 80 1. Sub bytes- In this step of sub bytes a look up table is used in which each byte is replaced with. 2. Shift rows- In this step of shift rows, shifting of rows occurs cyclically with a particular offset, while leaving the first unchanged. 3. Mix column- In this step of mixing operations occur using an invertible linear conversion in order to merge the four bytes in each column. 4. Add round key- This step includes derivation of round keys from Rijindael’s key agenda and this round key gets added to each byte of the state. In these last steps are performed up to fourth round, fifth round contains above all step except mix column step as shown in figure 1. 4. EXPERIMENTAL METHODOLOGY There are following steps which require implementing the AES algorithm in cloud to create Google Application: Step 1: firstly enter the URL http://accounts.Google.com/, then Google user name and password. Step 2: Select Google Application link (my Application). Step 3: Choose “Create Application” key, grant Application identifier, Application heading and then get on “Create Application” button. At this instant Application is ready. Now we implement AES algorithm in the Google cloud: There are subsequent methods to create database, tables in Google cloud SQL Step 1: Enter https://code.Google.com/apis/console and go for Google Cloud SQL alternative. Step 2: Select “New Instance” tab from the right upper corner and popup window displayed. Step 3: Now enter the instance name and correlated an authorative Application which is formed earlier and then click on “Create Instance” button. Step 4: Go for instance name to visualize its associated properties. Step 5: From loading database automatically we select “SQL Prompt” tab.
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 81 Figure 1. Encryption and Decryption of AES Step 6: For creating a database for the Application we use “Create Database” query, all necessary tables are created. Step 7: Add record to the desired table, we use “Insert Into” query. Step 8: Generate client interface for the Application. Step 9: Now write Java code of the AES algorithm to implement algorithm in cloud and debug the Application in Google cloud. Step 10: Encrypted get sore and decrypted data is displayed while accessing.
  • 6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 82 5. SAMPLE DATA Figure 2. Application “Student Entry” Created in Google App Engine. Figure 3. Hello App Engine.
  • 7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 83 Figure 4. Student Entry Detail. A User Interface and Application are Created Using Java and Jsp in Eclipse by Accquiring Following Steps are: Step 1: Database is created in Google cloud named as “Studententry”. Step 2: “Student Entry Detail” table is created in student entry database with its required field like name, id, contact department etc. Step 3: An application “Student entry” was created in Google app engine by applying above specified steps shown in figure2. Step 4: To operate the Student Entry Details we designed user interface. User interface uses these details. It firstly choose student link, then Student Entry Detail is displayed as shown in Figure 3 and Figure 4. Step 5: Now by clicking on “Submit” button the details is received by student class and keys are generated using AES algorithm. Step 6: Using these generated keys data is encrypted using AES algorithm and then stored in database. Step 7: At the stage of data retrieval it is decrypted using generated keys.
  • 8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 84 Figure 5. Execution Flow of Entire Process 6. CONCLUSIONS In our proposed work we mainly focus on data security of tenants so that only the authorized user can access the data. To provide this feature we use encryption and decryption process of data so that the only legal tenant can access their particular data. Hence, for security related to data of tenants we implement AES (advanced encryption standard) using cloud SQL. The result obtained from experimental methodology proved that AES gives protection for the data stored in the cloud. We make use of AES algorithm and Google App Engine to supply secured data storage, efficiency, assure availability in the condition of cloud denial-of-service attacks and data security in the cloud. This Approach is basically implemented by tenants who are going to store their data in the cloud. This approach is implemented by tenant itself at the cloud security provider (CSP) who stores data in the database. ACKNOWLEDGEMENTS This research paper is made possible through the help and support from everyone, including: parents, teachers, family, friends, and in essence, all sentient beings. REFERENCES [1] S. Zhang, S. Zhang, X. Chen, and X. Huo, "Cloud Computing Research and Development Trend," In: Second International Conference on Future Networks (ICFN’ 10), Sanya, Hainan, China IEEE Computer Society ,Washington, DC, USA, pp. 93- 97, 2010. [2] G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. Ye, and N. Tang, "Cloud Computing: A Statistics Aspect of Users," In: First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp. 347 - 358, 2009. [3] Marinos. A and G. Briscoe, "Community Cloud Computing," In: 1st International Conference on Cloud Computing (CloudCom, Beijing, China. Springer-Verlag Berlin, Heidelberg, 2009. [4] A. Khalid, "Cloud Computing: applying issues in Small Business," In: International Conference on Signal Acquisition and Processing (ICSAP’ 10), pp. 278 - 281, 2010. [5] A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," In: IEEE International Carnahan Conference on Security Technology (ICCST ) , KS, USA. IEEE Computer Society, Washington, DC, USA, pp. 35- 41, 2010.
  • 9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 85 [6] T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments," In: Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM. volume 10. USENIX Association Berkeley, CA, USA, pp. 227- 229, 2005. [7] L. Ertaul, S. Singhal, and S. Gökay, "Security challenges in Cloud Computing," In: Proceedings of the 2010 International conference on Security and Management SAM’ 10. CSREA Press, Las Vegas, US, pp. 36- 42, 2010. [8] M. Morsy, J. Grundy, and I. ller, "An analysis of the Cloud Computing Security problem," In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia, 2010. [9] B. Grobauer, Walloschek. T, and E. Stocker, "Understanding Cloud Computing vulnerabilities," IEEE Security Privacy 9(2), pp. 50-57, 2011. [10] J. Rittinghouse and J. Ransome, "Security in the Cloud," In: Cloud Computing. Implementation, Management, and Security, CRC Press, 2009. [11] S. Subashini and V. Kavitha, "A survey on Security issues in service delivery models of Cloud Computing," Journal of Network Computer Application pp. 1-11, 2011. [12] J. Viega, "Cloud Computing and the common Man," IEEE Computer Society , 42(8), pp. 106 - 108, 2009. [13] J. Ju, Y. Wang, J. Fu, J. Wu, and Z. Lin, "Research on Key Technology in SaaS," In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China, IEEE Computer Society, Washington, DC, USA, pp. 384- 387, 2010. Authors Parul Kashyap is student of M.Tech., Dept. of Computer Science and Engg., S.R.M.U., Lucknow, Uttar Pradesh, India and she has completed B.Tech.(Computer Science & Engineering) from RIET Kanpur, India in 2012. Currently, She is working research on Data Security. She has contributed in various research papers in various National and International journals. Rahul Singh, Asst. Professor, Dept. of Computer Science and Engineering, SRMU, Lucknow, Uttar Pradesh, India. He has completed M.Tech (Computer Science & Engineering) from Motilal Nehru National Institute of Technology, Allahabad, India and B.Tech (Computer Science & Engineering) from Ajay Kumar Garg Engineering College, Ghaziabad, India 2013 and 2010 respectively. His research interests include Cloud computing, Distributed Computing and Mobile computing.