You are on page 1of 11

Enhanced Data Security Model for Cloud Computing

Presented By

ABSTRACT

In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. This paper investigates the basic problem of cloud computing data security. We present the data security model of cloud computing based on the study of the cloud architecture. We improve data security model for cloud computing. In this paper we are presenting Three-layered security mechanism.

EXISTING SYSTEMS

In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms

DISADVANTAGES OF EXISTING SYSTEM:

The management of the data and services may not be fully trustworthy

PROPOSED SYSTEM

This paper enhances data security model for cloud computing. We propose a new data .security model based on studying of cloud computing architecture. We Implement software to select the suitable and the highest security encryption algorithm.
ADVANTAGES OF PROPOSED SYSTEM:

Highly Secure

MODULES
1. Three-layer system Construction module 2. Storage data Module 3. Transmission data Module 4. Processing data Module

1. Three-layer system Construction module:


The model used three-layer system structure, in which each floor performs its own duty to ensure that the data security of cloud layers. The first layer: responsible for user authentication, almost this is two factor authentication, but free cloud providers use one factor as examples eyeos, cloudo, and freezoha. The second layer: responsible for user's data encryption, and protect the privacy of users through a certain way by using one symmetric encryption algorithms. Also allow protection from user. The third layer: The user data for fast recovery this depends on the speed of decryption. .

2.Storage data Module


We make improvement to data security model in cloud computing. We implement software to the cloud provider. This software is implemented with two factor authentication. This software compares between eight modem encryption algorithms. This comparison based on Statistical Tests to get the most security algorithms. This software gets the faster and the highest security algorithm based on cloud infrastructure. So we proposed to cloud provider the suitable, more security encryption algorithm to its platform.

3. Transmission data Module


In this module, Auditor views the all user data and verifying data and also changed data. Auditor directly views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the cloud. 4. User Module User store large amount of data to clouds and access data using secure key. Secure key provided admin after encrypting data. Encrypt the data using TPM. User store data after auditor, view and verifying data and also changed data. User again views data at that time admin provided the message to user only changes data.

HARDWARE REQUIREMENTS
PROCESSOR RAM : : PENTIUM IV 2.6 GHz 512 MB DD RAM

HARD DISK

20 GB

SOFTWARE REQUIREMENTS
Technology Tools Used : Jsp,servlets : IDE(Eclipse)

Operating System : WindowsXP

REFERENCE
1.C. Dwork, The Differential Privacy Frontier Extended Abstract, Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444, Springer, 2009, pp. 496-502. 2. C. Gentry, Fully Homomorphic Encryption Using Ideal Lattices, Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
3. E. Naone, The Slow-Motion Internet, Technology Rev., Mar./Apr. 2011; www.technologyreview.com/files/54902/ GoogleSpeed_charts.pdf

You might also like