0% found this document useful (0 votes)
49 views

A Computational and Analytical Approcach For Cloud

The document discusses a computational and analytical approach for cloud computing security with user data management. The objective is to provide data security, data management, and efficient resource sharing while preventing internal and external threats. It proposes using holomorphic encryption to securely share data. The existing methods lack data sensitivity calculations, hierarchical security levels, and timely leak detection/prevention. The proposed method uses a short signature algorithm to verify data integrity, improving security and reducing computational overhead for cloud environments.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

A Computational and Analytical Approcach For Cloud

The document discusses a computational and analytical approach for cloud computing security with user data management. The objective is to provide data security, data management, and efficient resource sharing while preventing internal and external threats. It proposes using holomorphic encryption to securely share data. The existing methods lack data sensitivity calculations, hierarchical security levels, and timely leak detection/prevention. The proposed method uses a short signature algorithm to verify data integrity, improving security and reducing computational overhead for cloud environments.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Domain: Cloud Computing

Technology: Java

A Computational and Analytical Approach for Cloud Computing


Security with User Data Management

Objective

The main aim of our project is covered data security, data management and efficient resource
sharing mechanism. Here we are providing Prevention Mechanism to handle internal and
external threats. It is also suggested that it should covered data loss handling and data retention
mechanism to avoid data violation and loss in any way, and here we are using Holomorphic
encryption to provide the security.
ABSTRACT:

Cloud computing is emerging trend in today’s research world. The main benefits of cloud
computing are the adaptability, domain compatibility and better service use. So, the applicability
of cloud computing in different domain is the main strength with the ease of resource sharing. As
the increasing demand of cloud computing make a broader span in the direction of user-data
security. In this paper empirical meta-analysis has been provided in the direction of cloud
computing security. It also includes complete discussion based on the results achieved in the
same. This paper provides the analytical and empirical view of cloud computing security. The
major aspect covered in this paper is data security, data management and efficient resource
sharing mechanism. It also covers the computational aspect their applicability and the analytical
view for the study and analysis. It explores the wider view and the area of applicability in
different domain with the ease of data management and secure data sharing mechanism.
Domain: Cloud Computing
Technology: Java

EXISTING METHOD

The problems identified based on the recent survey and analyses are as follows: There is the need
of data sensitivity calculation to apply security in terms of data sensitivity and the size of the
data. There is the need of specific hierarchical or level-based orientation. There is the need of
data prevention mechanism in terms of security leak or identification of such leak in the timely
manner. There is the need of holomorphic encryption as the chances and the substitution are
completely different so that the security may enhance. There is the need of deterrent controls so
that the warning system can be maintained.

PROPOSED METHOD

They have suggested the maximum approaches uses for the data integrity are RSA based which
has higher computational overhead. So, they have proposed a data integrity approach. This
approach is based on the short signature algorithm. It has been used for the verification purpose.
It supports security. It reduces the computational overhead. It has been found to be efficient and
safe. It shows the current requirement of the todays cloud computing environment. It shows the
need of data handling mechanism and resource sharing with the protective view from internal
and external threats. It also shows that it may be helpful in the data retention and maintain the
required integrity for the security.

ADVANTAGES

 Data Security and Privacy Protection.


 Improving Data Privacy.
 Providing more Security to the Data.
 High efficiency.
 Anonymity of data sharing.
 Confidentiality of outsourced data.

APPLICATIONS

1. Software Industries.
2. Startup Companies.
3. Banking Sectors.
Domain: Cloud Computing
Technology: Java

HARDWARE & SOFTWARE REQUIREMENTS

SYSTEM REQUIREMENTS
H/W System Configuration:-

 Processor - I3/Intel Processor


 RAM - 4GB (min)
 Hard Disk - 160GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
S/W System Configuration:-
 Operating System : Windows 7/8/10
 Application Server : Tomcat 7.0
 Front End : HTML, JSP
 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : My SQL 6.0

 Database Connectivity : JDBC

You might also like