scholarly journals Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption

2020 ◽  
Vol 9 (1) ◽  
pp. 13-17
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.

2017 ◽  
Vol 7 (1.1) ◽  
pp. 173
Author(s):  
R. Vijaya Arjunan ◽  
K. Vinayaka Kamath

Cloud computing provides services that allocate infrastructure resources using the Internet as a medium and data storage on an external server. Small and medium corporations are the foundation of any flourishing economy for a growing nation which seeks new and innovative methods to reduce the way they manage their resources. Over a couple of decades, Information technology (IT) has created a significant impact in improving the lives of people and alsoon the global economy due to tremendous digital transformation. With the growth of the Small and medium corporations, IT is creating some real impact in enabling these industries to undergo adigital transformation of their business processes while they continue to grow. Small and medium enterprises (SME’s) are usually identified as the dominant force for the growth of any country's economy. In the cloud computing environment, the SME's need not have the in-house infrastructure so they can give up on any initial expenditure for setting up and instead they can utilize the resources available on the cloud and pay as per their requirement and usage.This paper presents the results of a comprehensive interpretation to research some of the most commonly used SaaS (Software-as-a-Service) implementations in the domain of Cloud Computing firstly to identify the weaknesses of the traditional computing approach for SME’s, and secondly to identify the aspects of these weaknesses that can be overcome by implementing cloud computing.In this paper, we provided the overview of various cloud computing models and literature survey of these models. This study extends to create an own cloud computing system for small and medium corporations. We will be using Software-as-a-Service (SaaS) approach and see how small and medium corporations can leverage on this for their business operations.


2019 ◽  
Vol 8 (S1) ◽  
pp. 54-57
Author(s):  
V. Sulochana

This article proposed a graphical password authentication which uses chunks of images to overcome the loopholes present in the traditional authentication methods. The graphical password contains a selection of chunks of images which creates password for authenticating cloud users for accessing cloud services. The article includes the details of chunks of images authentication, algorithm and implementation of chunk of images.


2018 ◽  
Vol 7 (S1) ◽  
pp. 16-19
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for large amount of data and processes that work on various applications and services by means of on-demand service. The storage services offered by clouds have become a new profit growth by providing a comparable cheaper, scalable, location-independent platform for managing users’ data. The client uses the cloud storage and enjoys the high end applications and services from a shared group of configurable computing resources using cloud services. It reduces the difficulty of local data storage and maintenance. But it gives severe security issues toward users’ outsourced data. Data Redundancy promotes the data reliability in Cloud Storage. At the same time, it increases storage space, Bandwidth and Security threats due to some server vulnerability. Data Deduplication helps to improve storage utilization. Backup is also less which means less Hardware and Backup media. But it has lots of security issues. Data reliability is a very risky issue in a Deduplication storage system because there is single copy for each file stored in the server which is shared by all the data owners. If such a shared file/chunk was missing, large amount of data becomes unreachable. The main aim of this work is to implement Deduplication System without sacrificing Security in cloud storage. It combines both Deduplication and convergent key cryptography with reduced overhead.


Author(s):  
Shamsutdin Kadievich Sheikhgasanov ◽  
Yury Vasil'evich Kolotilov

The article considers the problem of cloud computing - the environment of data storage and processing that provides access to resources shared among multiple users. Cloud computing is a model for organizing remote access on request for a shared set of configurable computing resources that can be quickly allocated and freed with minimal management or interaction costs with the service provider. Using clouds significantly reduces the costs of large industrial companies and enterprises. Cloud technology helps scale your business quickly and with minimal cost, they can improve productivity together with simplifying many business processes. Cloud computing is vastly expanding opportunities, so that all large companies today are actively switching to cloud services. But this causes significant problems with energy consumption. The energy consumption by cloud computing remains a serious problem, as data processing centers grow in size. There has been proposed the approach to choosing an energy-efficient cloud architecture that aims to reduce the energy consumption of cloud applications in all deployment models, the architectures of cloud infrastructures being given. The architecture supports energy efficiency in building, deploying and operating services.


2020 ◽  
Vol 6 (3) ◽  
pp. 100-106
Author(s):  
K. Kucherova

The paper describes the universal approach for monitoring the data storage of a globally distributed cloud computing system, which allows you to automate creation of new metrics in the system and predict their behavior for the end users. Since the existing monitoring software products provide built-in scheme only for system metrics like RAM, CPU, disk drives, network traffic, but don’t offer solutions for business functions, IT companies have to design specialized database structure (DB). The data structure proposed in this paper for storing the monitoring statistics is universal and allows you to save resources when orginizing database monitoring on the scale of the GDCCS. The goal of the research is to develop a universal model for monitoring and forecasting of data storage in a globally distributed cloud computing system and its adequacy to real operating conditions.


10.29007/q3wd ◽  
2019 ◽  
Author(s):  
Kawthar Karkouda ◽  
Ahlem Nabli ◽  
Faiez Gargouri

Nowadays cloud computing become the most popular technology in the area of IT industry. It provides computing power, storage, network and software as a service. While building, a data warehouse typically necessitates an important initial investment. With the cloud pay-as-you-go model, BI system can benefit from this new technology. But, as every new technology, cloud computing brings its own risks in term of security. Because some security issues are inherited from classical architectures, some traditional security solutions are used to protect outsourced data. Unfortunately, those solutions are not enough and cannot guarantee the privacy of sensitive data hosted in the Cloud. In particular, in the case of data warehouse, using traditional encryption solutions cannot be practical because those solutions induce a heavy overhead in terms of data storage and query performance. So, a suitable schema must be proposed in order to balance the security and the performance of data warehouse hosted in the cloud. In this paper, we propose (TrustedDW) a homomorphic encryption schema for securing and querying a data warehouse hosted in the cloud.


Author(s):  
Vaishali Ravindra Thakare ◽  
K. John Singh

Cloud computing is a new environment in computer-oriented services. The high costs of network platforms, development in client requirements, data volumes and weight on response time pushed companies to migrate to cloud computing, providing on-demand web facilitated IT services. Cloud storage empowers users to remotely store their information and delight in the on-demand high quality cloud applications without the affliction of local hardware management and programming administration. In order to solve the problem of data security in cloud computing system, by introducing fully homomorphism encryption algorithm in the cloud computing data security, another sort of information security solution to the insecurity of the cloud computing is proposed, and the scenarios of this application is hereafter constructed. This new security arrangement is completely fit for the processing and retrieval of the encrypted data, successfully prompting the wide relevant prospect, the security of data transmission, and the stockpiling of the cloud computing.


Sign in / Sign up

Export Citation Format

Share Document