Implementation of Data Security in Cloud Computing

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2011 by IJPTT Journal
Volume-1 Issue-1                           
Year of Publication : 2011
Authors : G. Jai Arul Jose, C. Sajeev

MLA

G. Jai Arul Jose, C. Sajeev."Implementation of Data Security in Cloud Computing". International Journal of P2P Network Trends and Technology (IJPTT), V1(1): 6-11, July to Aug 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So the client has no control over it. The cloud computing uses the internet as the communication media. The vendor has to provide some assurance for security of data in the cloud computing. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. Data Protection Application Security Privacy is important security issues that have to be included in cloud computing. We propose a model system in which cloud computing system is combined with Cluster Load balancing, ssl over aes and secure session In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.

References

[1] S. Singh, ”Different Cloud Computing Standards a Huge Challenge”, The Economic times, 4 June 2009.
[2] J. Urquhart, “The Biggest Cloud computing Issue of 2009is Trust”, C-Net News, 7 Jan 2009.
[3] Wangetai, “Scientific Cloud Computing: Early Definition and Experience”, Proc. 10th International Conference High-Performance Computing and Communications (HPCC 03)
[4] William Stallings, “Cryptography and Network Security Principles and Practices”, Prentice Hall, New Delhi.
[5] National Institute of Standards and Technology. "Request for Candidate Algorithm Nominations for the Advanced Encryption Standard." Federal Register, September 12, 1997.
[6] Nechvatal, J., et al. Report on the Development of the Advanced Encryption Standard. National Institute of Standards and Technology. October 2, 2000.
[7] Needham, R., and Schroeder, M. "Using Encryption for Authentication in Large Networks of Computers." Communications of the ACM, December 1978.
[8] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.
[9] Daemen, J., and Rijmen, V. The Design of Rijndael: The Wide Trail Strategy Explained. New York, Springer-Verlag, 2002.

Keywords

Cryptography, Cloud Computing, Public Key, AES