Você está na página 1de 3

A Framework for Improving Security in Cloud

Computing

Abstract:
The Cloud computing technique, which enables the resource using latest trend in today IT

industry. Data security system is the issue in cloud computing available on the cloud server.

The physical control is arising under the privacy and security concerns. The cloud data

storage are encrypt on the cloud storage. Here we are using Hybrid ABE and Homomorphic

Encryption. The ABE (Attribute based encryption is used to encrypt the data and stored the

server. The secure the data using the collusion the encrypt system describes under the polices

on the users key. The attribute encrypt the data using the traditional access control. the

perform the frame work using the Homomorphic encryption.

Principles:

1. Accountability: Manage accountabilities by clearly defining internal and provider

responsibilities.

2. Cost/benefit: Evaluate the benefits of cloud acquisition based on a full understanding

of the costs of cloud compared with the costs of other technology platform business

solutions.

3. Enterprise risk: Take an enterprise risk management perspective to manage the

adoption and use of cloud.

4. Capability: Integrate the full extent of capabilities that cloud providers offer with

internal resources to provide a comprehensive technical support and delivery solution.


DISADVANTAGES

1. In Homomorphic Encryption, task encryption cost might be very high.


2. The performance of Homomorphic Encryption drops in overloaded condition.
3. Homomorphic Encryption requires more derivatives, thus increasing the
computational cost.
4. Performs the resource selection and task submission sequentially thus increasing the
processing time.

Advantages:
1. ABE and Homomorphic Encryption increase throughput .
2. In ABE and Homomorphic Encryption, task encryption cost might be very low.
3. Performs the resource selection and task submission sequentially thus reduce the
processing time

Block diagram

Server side
Signature (HASH
HASH value value Encrypted Attached data
Data (Encrypted by by private key
ABE) using
Homomorphic
algorithm)

Client side
HASH value
(Decrypted by
ABE)
Verified both
HASH value is
same or not HASH value
(Decrypted by
Homomorphic)
Conclusion
There are two process are happen in this paper are in server and client side. First the data is

encrypted by using ABE and produces HASH value, again this HASH value is encrypted by

Homomorphic algorithm and produces signature in server side. In the verification process, the

given data is encrypted by ABE and the signature is decrypted by Homomorphic algorithm

and verified whether both HASH values are equivalent or not. Through this encryption and

decryption methods, it increases the security level of both the client and the data owner.

Approximate Price : 3000 - 5000

Você também pode gostar