Enhanced Data Security
Model for Cloud Computing
ABSTRACT:
Cloud Computing becomes the next generation architecture
of IT Enterprise. In contrast to traditional solutions, Cloud computing moves
the application software and databases to the large data centers, where the
management of the data and services may not be fully trustworthy. This unique
feature, however, raises many new security challenges which have not been well
understood. In cloud computing, both data and software are fully not contained
on the user's computer; Data Security concerns arising because both user data
and program are residing in Provider Premises. Clouds typically have a single security
architecture but have many customers with different demands. Every cloud
provider solves this problem by encrypting the data by using encryption
algorithms. This paper investigates the basic problem of cloud computing data
security. We present the data security model of cloud computing based on the
study of the cloud architecture. We improve data security model for cloud computing.
We implement software to enhance work in a data security model for cloud
computing. Finally apply this software in the Amazon EC2 Micro instance.
EXISTING
SYSTEM:
In cloud computing, both data and software
are fully not contained on the user's computer; Data Security concerns arising
because both user data and program are residing in Provider Premises.
Clouds typically have single security
architecture but have many customers with different demands. Every cloud provider
solves this problem by encrypting the data by using encryption algorithms.
DISADVANTAGES
OF EXISTING SYSTEM:
· The
management of the data and services may not be fully trustworthy.
PROPOSED
SYSTEM:
This paper enhances data security model for cloud computing. We propose a new data
.security model based on studying of cloud computing
architecture. We Implement software
to select the suitable and the highest security encryption
algorithm.
ADVANTAGES
OF PROPOSED SYSTEM:
·
Highly Secure
MODULES:
ü Three-layer
system Construction module
ü Storage
data Module
ü Transmission
data Module
ü Processing
data Module
MODULES
DESCRIPTION:
Three-layer
system Construction module
The model used three-layer system structure, in
which each floor performs its own duty to ensure that the data security of cloud
layers. The first layer: responsible for user authentication, almost this is
two factor authentication, but free cloud providers use one factor as examples
eyeos, cloudo, and freezoha. The second layer: responsible for user's data
encryption, and protect the privacy of users through a certain way by using one
symmetric encryption algorithms. Also allow protection from user. The third
layer: The user data for fast recovery this depends on the speed of decryption.
Storage
data Module
We make improvement to data security model in cloud computing.
We implement software to the cloud provider. This software is implemented with
two factor authentication. This software compares between eight modem
encryption algorithms. This comparison based on Statistical Tests to get the
most security algorithms. This software gets the faster and the highest
security algorithm based on cloud infrastructure. So we proposed to cloud
provider the suitable, more security encryption algorithm to its platform.
Transmission
data Module
Clouds are massively complex systems can be reduced
to simple primitives that are replicated thousands of times and common
functional units, These complexities create many issues related to security as
well as all aspects of Cloud computing. So users always worry about its data,
so users can transmit the data’s to others to make a copy of data so as not to
lose it.
Processing
data Module
A proposed software solves some problems. This
software implements strong API access control, by using two way
authentications. This software encrypts and protects data, by using the highest
security algorithm. This software analysis data protection at lAAS, we use Amazon EC2 as a
case study to run this software.
This software ensures that protection algorithm is highest security algorithm
to satisfy the user, by using NIST statistical tests. This software Ensure
faster retrieval, when using faster encryption/decryption algorithm
SYSTEM
REQUIREMENTS:
HARDWARE
REQUIREMENTS:
•
System : Pentium IV 2.4 GHz.
•
Hard
Disk : 40 GB.
•
Floppy
Drive : 1.44 Mb.
•
Monitor : 15 VGA Colour.
•
Mouse : Logitech.
•
Ram : 512 Mb.
SOFTWARE
REQUIREMENTS:
•
Operating system : - Windows XP.
•
Coding Language : ASP.NET, C#.Net.
•
Data Base : SQL Server 2005
REFERENCE:
Eman M.Mohamed, Hatem S. Abdelkader,” Enhanced Data
Security Model for Cloud Computing”, IEEE
CONFERENCE (INFOS2012), 2012.