• Princeton University Doctoral Dissertations, 2011-2024
  • Electrical Engineering

Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.

phd thesis on cloud computing security pdf

  •   Home
  • University of Bedfordshire e-theses
  • PhD e-theses

A novel approach to providing secure data storage using multi cloud computing

Thumbnail

Description

Collections.

The following license files are associated with this item:

  • Creative Commons

entitlement

Attribution-NonCommercial-NoDerivatives 4.0 International

Related items

Showing items related by title, author, creator and subject.

Thumbnail

Multiple-clouds computing security approaches: a comparative study

A multi-cloud approach for secure data storage on smart device, personally identifiable information security in cloud computing, export search results.

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

thesis Cloud Computing & Security final.doc

Profile image of Md. Shihabul  Gani

A cloud is the powerful combination of cloud computing, storage, management solution. More and more turning to data storage, management in the cloud computing & Security. It is often provided "as a service “over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. In this thesis paper we analysis about AWSEC2 and GCE and compare both which is better. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Google Compute Engine lets you create and run virtual machines on Google infrastructure. Compute Engine offers scale, performance, and value that allow you to easily launch large compute clusters on Google's infrastructure. There are no upfront investments and you can run thousands of virtual CPUs on a system that has been designed to be fast, and to offer strong consistency of performance. Arguably, Infrastructure as a Service (IaaS) is the most important cloud computing vertical. Within that, in terms of services and features, AWS enjoys the top position, while Google Cloud Platform is slowly catching up. In this post, we’ll discuss major differences between Amazon’s EC2 and Google Compute Engine (GCE). This paper we proposed a method by implementing RSA algorithm will explore data security of cloud in cloud computing by implementing digital signature and encryption with elliptic curve cryptography.

Related Papers

IJFRCSCE Journal

phd thesis on cloud computing security pdf

Journal of Computer Science IJCSIS

In today's modern IT everything is possible on the web by cloud computing, it allows us to create, configure, use and customize the applications, services, and storage online. The Cloud Computing is a kind of Internet-based computing, where shared data, information and resources are provided with computers and other devices on-demand. The Cloud Computing offers several advantages to the organizations such as scalability, low cost, and flexibility. In spite of these advantages, there is a major problem of cloud computing, which is the security of cloud storage. There are a lot of mechanisms that is used to realize the security of data in the cloud storage. Cryptography is the most used mechanism. The science of designing ciphers, block ciphers, stream ciphers and hash functions is called cryptography. Cryptographic techniques in the cloud must enable security services such as authorization, availability, confidentiality, integrity, and non-repudiation. To ensure these services of security, we propose an effective mechanism with a significant feature of the data. This paper is to show how to improve the security of the Cloud storage using the implementation of a hybrid encryption algorithm and hash functions. It proposes the implementation of two algorithms, Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) with a secure hashing algorithm (SHA256) by using Netbeans IDE 8.0.2, JDK 1.7 tool and EyeOS2.5 as a cloud platform on ubuntu14.04.

Dr Manikandasaran S S , Arockiam Lawrence

Abstract— Current security scheme in cloud computing applied single encryption algorithm. However, usage of a single algorithm is not effective for high-level security requirement towards data processing in cloud computing. Therefore, this study proposes combination of AES, ECC and RSA encryption method to strengthen the security in cloud in terms of authentication and encryption. The method for this study is the text data has been encrypted using AES then, AES key have been encrypted by ECC only after that RSA will encrypt both the ciphertext and the encoding key again. Java NetBean is used to program the evaluation tool to calculate the performance of the encryption method. First, the tool has applied the three algorithms AES, ECC and RSA using a dataset consisting of multiple text file with different sizes. Evaluation has been performed using encryption time, decryption time and secrecy measure. Results showed that the proposed method has the ability to fulfil both efficiency and security factors with highest secrecy value. The impact of combination layer of encryption algorithms provides a higher secrecy value compared to single layer encryption. Keywords- cloud computing; AES; RSA; ECC; secrecy

International Journal of Advance Research in Computer Science and Management Studies [IJARCSMS] ijarcsms.com

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

At present, cloud computing is the fastest growing technology in today's world. Cloud computing is a model that provides the services based on as-needed and when-needed basis. Cloud computing provides online information storage, infrastructure and application. Many organizations shift towards cloud computing due to its benefits of less hardware maintenance and reduced expenditure start-up cost and at the same time, cloud computing offers many hazards. Network and Internet applications are growing very fast, since the need to secure these applications are very fast. For this purpose cryptography algorithms (symmetric & Asymmetric) are proposed. The use of relevant algorithm deals with the level of data safety in cloud because data security in cloud computing is a serious issue as the data centers are located worldwide. Authentication is the most essential procedure to ensure the cloud data in a secured manner. However, strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is a more important issue of cloud computing. Thus, the need to ensure the safety of information. Here in this survey paper, I have presented encryption based security algorithms for cloud computing.

IJCSMC Journal

IJIRST - International Journal for Innovative Research in Science and Technology

In Cloud computing, Data sharing is the important functionality. Secure distributed data storage was developed to reduce the burden of data owner from managing numerous files, by transferring the files from data owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver withoutthe necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Therefore, there is no guarantee that the outsourced files are not accessed by the unauthorized users and not modified by proxy servers is an important problem that has been considered. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, there are two Identity-Based Secure Distributed Data Storage (IBSDDS) schemes. The properties of IBSDDS schemes are as follows: The file owner can decide the access permission independently without the help of the private key generator; for one query, a receiver can only access one file, instead of all files of the owner. These schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy server, but cannot obtain the owner’s secret key. Though the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the firstscheme where access permission is made by the owner for an exact file and collusion attacks can be protected.

TJPRC Publication

Cloud Computing is an emerging technology widely used in the IT sector due its wide range of characteristics. These characteristics serve a medium for the intruders to attack the cloud and its users. The security of cloud can be compromised by employing different strategies and techniques. Many systems and techniques have been proposed for solving the security issues and implementing a high level of security on both the sides. Encryption is one of the best method suggested for making the cloud more secure and increasing its areas of application. This paper contains an overall study and comparison of various cryptographic algorithms implemented for cloud security. We also study some hybrid systems designed using combination of various crypto terminologies for enhancing data security in cloud. The hybrid systems implement multiple cryptographic algorithms like RSA and Digital signature, Diffie Hellman and AES in combination with Digital signature. Some of the comparison parameters included are technique proposed, type of algorithm, algorithm, scalability.

RELATED PAPERS

Profra Lilian

SPIE Newsroom

ZHONGHAI WANG

Journal of Architecture and Built Environment

Kristen D Van Haeren

Anais do(a) I Seminário de Educação da Regional Metropolitana Sul: Desafios do Ensino em Escolas Públicas (I SEMETRO)

Geziel Campos

sosyalbil.selcuk.edu.tr

Vasfiye Çelik

Archives in Neurology & Neuroscience

Gustavo Piccolo

Margarida Rodrigues

Journal of Humanities and Social Sciences

Labhasarin Chatrawangkhiri

International Journal of Contemporary Medical Research [IJCMR]

Krishna Tiwari

Infection and Immunity

claustre bajona

Gadjah Mada Journal of Psychology (GamaJoP)

Marty Mawarpury

In medias res

Dario Terzic

Anais do XX Congresso Brasileiro de Engenharia Química

Kamila Pacheco

INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT (ISSN 2231 – 5756)

Revista Linguagem em Foco

Teresa Carthery

Academy of Criminal Justice Sciences

Gordon A Crews, Ph.D.

Joaquin Lago Ballesteros

Lecture Notes in Computer Science

hjjgfh rgrgfgfd

Cameron Browne

Health Monitor Journal of the Iranian Institute for Health Sciences Research

mehrdad goudarzvand chegini

Tellus B: Chemical and Physical Meteorology

David Cappelletti

Applied Surface Science

amira lebib

GSTF Journal of Nursing and Health Care

michelle lalonde

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    phd thesis on cloud computing security pdf

  2. Cloud Computing Security

    phd thesis on cloud computing security pdf

  3. Cloud Computing Security Thesis Topics

    phd thesis on cloud computing security pdf

  4. [PDF] On-Demand Security Architecture for Cloud Computing

    phd thesis on cloud computing security pdf

  5. Research PhD Thesis on Cloud Computing (PhD Guidance)

    phd thesis on cloud computing security pdf

  6. List of thesis topics in cloud computing for computer science

    phd thesis on cloud computing security pdf

VIDEO

  1. Junior Software Developer Course 2024

  2. Cloud Threat Hunting

  3. SENS Research Thesis Programs

  4. 2024-03-21 Web Semantik & Ontologi (TI146)

  5. 2024-03-07 E-Business Application Development (SI146)

  6. 2024-03-20 Pendidikan Anti Korupsi (SI152, TI152, IF148)

COMMENTS

  1. PDF THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT

    THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT. This thesis focuses on studying and analyzing the Cloud Computing technology in concept and its security, which is still a developing technology with great convenience and portability for exchanging information over the Internet via different platforms.

  2. PDF Ph.D. Thesis Security Policies for Cloud Computing

    Cloud Security Policy, in respect to data security. Specifically focused on the model of Software-as-a-Service (SaaS), this thesis is intended to serve as a Framework for organizations, users, Cloud Providers and provide a baseline for the Security Policy of Cloud Computing. We address the security requirements that are specific to Cloud ...

  3. PDF Towards Enhancing Security in Cloud Storage Environments

    cability in cloud computing. Current research in cloud data protection primarily falls into three main categories: 1) Authentication & Access Control, 2) Encryption, and 3) Intrusion Detection. This thesis examines the various mechanisms that currently exist to protect data being stored in a public cloud computing environment. It also looks at ...

  4. Security and Privacy in Cloud Computing

    As technological advances continue, the reach and influence of cloud computing continue to rise. Even so, when organizations outsource data and business applications to CC providers (who are. third parties for them), security and privacy issues emerge as crucial concerns. Virtualization in Cloud Computing.

  5. PDF Hybrid Cloud Infrastructure Security

    the security architecture, which can be operated across two or more clouds with different security approaches. This thesis researched security approaches to architecting hybrid cloud security, by evaluating security implementations and coming up with recommendations on se-curity posturing.

  6. PDF ABSTRACT Security Analysis and Framework of Cloud Computing with By Ali

    Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System By Ali Asghary Karahroudy July, 2011 Director of Thesis or Dissertation: Dr. M.H.N. Tabrizi Major Department: Department of Computer Science Abstract - Cloud computing offers massive scalability, immediate availability, and low cost

  7. Enhancing Cloud Computing Security and Privacy

    Cloud computing paradigms are gaining widespread acceptance due to the various benefits they offer. These include cost-effectiveness, time savings and efficient

  8. PDF SECURITY TECHNIQUES FOR PROTECTING DATA IN CLOUD COMPUTING

    mitigate them in Cloud Computing. The main objectives of this research are: To understand the security issues and the techniques used in the current world of Cloud Computing. To identify the security challenges, those are expected in the future of Cloud Computing. To suggest counter measures for the future challenges to be faced in

  9. DataSpace: Detection and Mitigation of Security Threats in Cloud Computing

    This dissertation proposes a new architectural framework, CloudMonatt, to detect and mitigate potential security threats targeting customers' VMs in cloud computing. CloudMonatt monitors the security health of VMs and attests to customers if they are getting their desired security. It takes actions to mitigate the potential threats that can ...

  10. (PDF) Securing Cloud Computing

    This thesis looks at how a cloud service user can constantly place a check on the cloud service provider with respect to data security and in cases where there has been a breach of security ...

  11. (PDF) Cloud Security

    cloud models. Index Terms —Cloud Computing, Security. 1 INTRODUCTION. Cloud computing is a model for fast, on demand network. access to a shared networ k. Configurable computing resource. pool ...

  12. PDF A Study on Cloud Computing Security Challenges

    Among these include security aspects. Objectives: This thesis aims to identify security challenges for adapt- ... For this the objective is to identify exist-ing cloud computing security challenges and their solutions. Identify the challenges that have no mitigation strategies and gather solution-s/guidelines/practices from practitioners, for a ...

  13. PDF Data Protection in the Cloud

    Data Security and the Cloud. The initial stage sought to provide a clear de nition for Cloud Computing and the security issues therein, looking to identify precisely where and when threats can occur to data and how these threats ought to be mitigated. Predicate Based Encryption. The next stage focused solely upon PBE schemes discussing

  14. Phd Thesis on Cloud Computing Security PDF

    Phd Thesis on Cloud Computing Security PDF - Free download as PDF File (.pdf), Text File (.txt) or read online for free.

  15. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    1.5 Thesis Organization Chapter 1: Introduction; contains introduction about cloud computing and problems need to be addresses. The chapter also discusses the objective and structure of the thesis. Chapter 2: Cloud Computing and Security; Contains detail discussion about cloud computing, cloud security, and security policy.

  16. PDF EXCLAIM framework: a monitoring and analysis framework to ...

    self-governance in Cloud Application Platforms A thesis submitted to The University of Sheffield for the degree of Doctor of ... during my PhD studies. ... reement N°264840. ii Abstract The Platform-as-a-Service segment of Cloud Computing has been steadily grow-ing over the past several years, with more and more software developers opting for

  17. A novel approach to providing secure data storage using multi cloud

    This study aims to improve the security of the delivered cloud storage service via multiple-cloud computing and to develop an approach for providing a secure data storage system that could be installed, configured, and easily consumed through the appropriate multiple-cloud model. The developed approached is supposed to maintain the ...

  18. PDF BLOCKCHAIN TECHNOLOGY FOR CLOUD STORAGE

    cloud computing. Nowadays, blockchain is one of the advanced technologies to ensure sensitive or confidential data security. Thus, blockchain technology tremendously benefits the cloud storage system due to its several features, namely decentralization, confidentiality, security, privacy, etc.

  19. Cloud Computing Security PHD Thesis

    Cloud Computing Security Phd Thesis - Free download as PDF File (.pdf), Text File (.txt) or read online for free. cloud computing security phd thesis

  20. PDF Cloud Computing & tization: A Case Study and Future Trends THESIS

    Cloud computing (CC) is likely to prove commercial sustainability for many firms due to its flexibility and pay-as-you-go cost structure, particularly in the current situation of economic difficulties. This master thesis analyses the nature of CC and depicts how this technology

  21. PDF Implementing Cloud Computing. A Study of the Impact on the IT ...

    Several studies have been conducted to analyze the market of CC. Based on the 2018 IDG Cloud Computing Study, which consisted of over 550 SMEs and large enterprises, showed that over 77% had at least one application or parts of their enterprise computing infrastructure deployed in the Cloud.

  22. thesis Cloud Computing & Security final.doc

    Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. In this thesis paper we analysis about AWSEC2 and GCE and compare both which is better.