SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1464
Model-Driven Platform for Service Security and Framework for Data
Security and Privacy Using Key Management in Cloud Computing
Y. Kiran Kumar1, Dr. R. Mahammad Shafi2
1Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA
2Research Supervisor, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud computing is a technology to share the data
and resources used among various organizations, but the
security and privacy are most important aspects of cloud
computing. The main responsibilityofcloudserviceprovideris
the quality of service. Many of the cloud computing security
frameworks have faced many challenges in security that has
not yet been addressed well. The data accessed and shared
through many devices from the cloud environment are not
secure because they are likely to have various attacks like
Identity Access Management (IAM), hijacking an account or a
service either by internal/external intruders. In this paper, we
proposed a model-driven approach enables the definition of
security requirements at the modeling layer and facilitates a
transformation based on security configuration patterns. We
have also proposed a new system which can prevent the
exposure of the key as well as a framework for sharing a file
that will ensure security using key managementsystemwithin
the cloud environment and also suggests to the approach of
Multi-layer Encryption techniques in cloud computing thus
enhancing the security parameters concerning sensitive data.
Thus with layer ways Encryption technique the data in cloud
server can be made more secured with better privacy.
Resultant both cloud side and owner of the data gain
enhanced security. According to this encryption technique if
data-owner’s authorization is not granted then the users are
restricted from the data access.
Key Words: Service Oriented Architecture, Cloud
Computing, Encryption, Access Control, Multi-layer
encryption, Privacy, Security.
1. INTRODUCTION
Cloud computing is a relatively new business model for
outsourced services. However, the technology behind cloud
computing is not entirely new. Virtualization, data
outsourcing, and remote computation have been developed
over the last 20 years, and cloud computing provides a
streamlined wayofprovisioninganddeliveringsuchservices
to customers. In this regard, cloud computing hasoften been
criticized as representing just a new trend, rather than an
innovative computing technology. As such, it is often best
described as a business paradigm or computing model
rather than any specific technology. A cloud consumer
adopting a cloud-based solution needs to follow these steps:
1. Describe the service or application for which a cloud-
based solution may be leveraged
2. Identify all functional capabilities that must be
implemented for this service
3. Identify the security and privacy requirements and the
security controls needed to securetheserviceorapplication.
The trust relation between cloud customers (CCs) and
cloud service providers (CSPs) has to be established before
CCs move their information systems to the cloud. This
requires an in-depth understanding of associated risks.
Moreover, regulations related to data protection, financial
reporting, etc. involve certain requirements that should be
complied with when outsourcingbusinessprocessestothird
parties, like CSPs. User authentication and authorization
among cloud actors is a critical element of cloud
architecture. Without knowing whoisloggingintothecloud-
based information system, and who is accessing what data,
cloud actors are not able to protect the data housed by a
cloud ecosystem. Understanding who the users are, what
data they are trying to access, where the data arestored,and
how are users trying to get to these data—these are critical
pieces of information that help cloud consumers determine
an appropriate cloud architecture and deployment model.
1.1 Preliminary
We assume that the cryptographic algorithms to encrypt
data are secure. Meanwhile, we assume that the random
string will not be repeatedly generated by the clients. We
assume that the client of each collaborator runs in a secure
environment which guarantees that:
• The generation and distribution of shared secret and
privilege management on the client of the initiator are
appropriately maintained.
• The secret passcode and keys that appear in the clients
would not be stolen by any attackers.
• The communication channel between the client and the
cloud is enough to transmit all necessary data in real time
and protected by existing techniques such as SSL/TLS.
1.2 Access Control
Traditional access control architectures are based on the
assumption that data storage management is located within
a trusted domain and the owner has adequate knowledge
about the system. However, this assumption is no longer
valid in the cloud computing paradigm. Multiple
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1465
stakeholders are engaged as users within the cloudplatform
and have different levels of data access permission. As a
result, a greater granularity of access control is required to
ensure that each stakeholder has access to exactlywhatthey
are authorized and to ensure the privacy and confidentiality
of the cloud-based services. Researchers and experts are
mostly concerned about outside attackerswhenconsidering
the security issues in distributed systems. Therefore,
significant efforts have been made to keep the malicious
attacker outside of the perimeter.Unfortunately,suchefforts
cannot always be effective in the cloud computingparadigm.
The incident where Google fired engineers for breaking
internal privacy policies confirms that attackers may reside
within the service framework [1]. Carnegie Mellon
University’s Computer Emergency Response Team (CERT)
defines a malicious insider as“Acurrentofformer employee,
contractor, or business partner who has or had authorized
access to a network and intentionally used that access in a
way that negatively affect the confidentially, integrity, or
availability of any information or information systems” [2].
Due to insider threats, cloud-based services are in serious
risk of intellectual property theft, IT damage, and
information leakage. Hence, security vulnerabilities
emerging from insider threats should be addressed by
policies, technical solutions, and proper detection methods.
2. SECURING SERVICES IN THE CLOUD
Service-Oriented Architecture (SOA) is an architectural
pattern, while cloud computing is a set of enabling
technologies as a potential target platform or technological
approach for that architecture. By combining SOA and cloud
computing, it becomes possible to reduce the time taken to
implement technology, enhance business performance and
expose the existing legacy application over the Internet. The
role of SOA in cloud computing is important because a
successful cloud solution requires an in-depth
understanding of the architecture, the services offered and
how to leverage them. Cloud computing becomes part of the
architectural arsenal to create a successful SOA.
Cloud services benefit the business by taking the best
practices and business process focus of SOA. These benefits
apply to both cloud service providers and cloud service
users. Cloud service providers need to architect solutions by
using a service-oriented approach to deliver services with
the expected levels of elasticity and scalability. Companies
that architect and govern business processes with reusable
service-oriented components can moreeasilyidentifywhich
components can be successfully moved to public andprivate
clouds. A Service-Oriented Architecture (SOA) is a software
architecture for building business applications that
implement business processes or services through a set of
loosely coupled, black-box components orchestrated to
deliver a well-defined level of service.
Service-oriented architectures are based on the idea of
exposing software functionality as services to be used by
independent parties. Their inherent independence of a
specific platform and operating system make themperfectly
suitable to connect service consumers and serviceproviders
over the Internet and provide a technical foundation for
cloud computing [3]. The combination of SOA and cloud
computing facilitatingtheprovisionofcomposedapplication
and services that integrate and orchestrate services from
different sources pose new challenges to security. Since
services and applications are exposedtotheInternetand are
used in a global context, the management of user identities
across organisational borders is a key element to perform
access control and to prevent unauthorised access in a
decentralised environment.
Open Identity Management Models support the sharing of
identity information across several trust domains in a
controlled manner. Clients can request identity information
from the identity management systems and convey this
information in an interoperableformattoa requesting party.
Besides identity provisioning,confidentialityandintegrityof
exchanged, stored, and processed information must be
ensured. Several specifications emerged to protect
information at different layers. For instance, a secure
channel can be used to protect exchangedinformation, while
signature and encryption mechanisms applied to a message
can also protect stored and processed information. These
security requirements are stated in security policies that
configure the secure interaction of participants in a service-
based system. Policies facilitate the negotiation of security
requirements between services and service clientsto enable
interoperability at runtime. This enablesa seamlessusageof
services in the cloud to build composed applications.
However, due to the complexity of the involved
specifications, the variety of security mechanisms and the
flexibility of service-based systems, such policiesarehard to
understand and even harder to codify. To overcome these
limitations, we foster a model-driven approach that
generates security configurations based on system design
models annotatedwithsecurityrequirements.Toimplement
the functional and security requirements specified at the
modelling layer, our cloud platform has to ensure two
aspects: The system with all involved services and web
application components must be instantiated in a virtual
machine according to the functional requirements and the
services must beconfiguredincompliance withthemodelled
security requirements. As illustrated in Figure 1, our
approach consists of three layers. Functional and security
requirements, expressed at the modelling layer, are
translated to a platform independent model. This model
constitutes the foundation to setup the virtual machine,
application server, services and composed applications that
are provided to the user [4].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1466
Fig -1: Model-driven Security in SOA
A Model-driven approach transforms security intentions to
enforceable security policies. This transformation is based
on a set of security configuration patterns that provide
security expert knowledge to configure the system. Our
model-driven approachrequiresanautomatedgenerationof
enforceable security configurations based on the modelled
security requirements [5].
3. DATA SECURITY AND PRIVACY IN CLOUD
Security and privacy concerns faced by the cloudconsumers
require them to evaluate the risk and its management in the
cloud environment, then mitigating those risks. Of course,
the most critical benefit offered by cloud computing is the
reduction of business costs. Most businesses have well-
established security objectives, strategies, and policies
consistent with compliance requirements to protect their
intellectual property, and their clients’ data. Many security
components come into play, but the most four critical
components are shown in Figure 2. Data andtransmissionof
data must take place through secured channels. Application
and storage security both must be maintained by the cloud
service provider.
Fig -2: Security Components.
The storage data itself can be encrypted by many cloud
service providers using server side encryption (SSE). This
will encrypt the data on the cloud storage devices with
strong cryptographic algorithms but the encryption keys
stay with the cloud provider and are not underthecontrol of
the cloud customer. If nothing else is offered, the cloud
server administrator should activate SSE per default for the
cloud storage used. This encryption gives some basic
protection against unauthorized access tothecustomerdata
but also means that the security of this solution depends on
the cloud provider’s ability to restrict access to the storage
encryption keys even to other employees.
The cloud service provider should enforce the same or even
higher levels of security controls as expected by the cloud
customer or as best practice in the industry. There are
logical risks of information disclosure or data integrity by
having unsecure applications or permission handling
functionalities. The application or underlying infrastructure
could be open to exploits by hackers. The user permission
and role model could be exploited as well by external
hackers or internal employees that have too many access
rights. In general, the same security measures need to be
applied like in any IT system. The complexity arisesfromthe
cloud technology model that is based on virtualization and
distributed responsibilities between the infrastructure
layers. The cloud service provider must take careofphysical
and logical security that is in his sole responsibility. For
example, the cloud service provider may offer encryption,
but it is up to the customer to activate and use it. Clear
responsibilities for network, operating system, and
application security measures are key priorities to achieve
such a secure cloud solution.
Cloud computing is yet to standardize the process of service
metering. Therefore, service metering is notyettrustworthy
to the cloud consumers. The process requires a systematic,
verifiable, and reliable framework for cloudcomputingto be
sustainable. Subsequently, the trust relationship of cloud
service providers with customers and enterprises will be
enhanced, resulting in a wider adoption of cloud-based
solutions. Maintaining the privacy of users isofhighconcern
for most organizations. Whether employees, customers, or
patients, personally identifiable informationisa high-valued
target. Many cloud subscribers do not realizethatwhenthey
contract a provider to perform a service, they are also
agreeing to allow that providertogatherand sharemetadata
and usage information about their environment. In some
cases, providers even sell or share these data legally based
on their privacy statements
The evolving nature of cloud computing technologies has
resulted in nonstandard security implementations and
practices. Moreover, the lack of governance for audits
creates a challenging environment to verify if the cloud
service providers have complied with the standards. As a
result, cloud computing security may not yet be ready for
audits [6]. Users depend on the service level agreement
(SLA) and have to rely on the cloud service provider to keep
up their end of the bargain. However, cloud servicesarebest
effort services and a service provider may not guarantee the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1467
security standards. Therefore, as SLAs play a vital role in
ensuring the security of the cloud-based services, governing
bodies and security experts should be part of the SLAs and
legal aspects, which is not yet seen to be in practice for
cloud-based service models [7].
4. PROPOSED WORK
4.1 Operational Transformation
The edit conflict due to concurrent operations is one of the
main challenges in collaborativeeditingsystems. Without an
efficient solution to edit conflicts, it may result in
inconsistent text to different clients when collaborators
concurrently edit the same document. In 2009, OT was
adopted as a core technique behind the collaboration
features in Apache Wave and Google Docs. In a collaborative
editing cloud service, the cloud servers can be responsible
for receiving and caching editing operations in its queue,
imposing order on each editing operation, executing OT on
concurrent operations based on the order iteratively,
broadcasting these editing operations to other clients, and
applying them in its local copy to maintaina latest version of
the document. When receiving an operation opr(c) from the
client, the cloud server executes operational transformation.
4.2. System Design and Security Analysis
Fig -3: LightCore system model.
LightCore involves a group of collaborativeusersanda cloud
server. Each client communicates with the server over the
Internet, to send its operations and receive modifications
from others in real time. For each document, the server
maintains a history of versions. That is, it keeps receiving
operations from users, and these modifications make the
document shift from one version to another. When applying
modifications on a version, the server may need OT to
transform some operations. The server also keeps sending
the current freshest version to users, that is, all transformed
operations since the last version is sent. Because a user is
still editing on the old version when the freshestoneisbeing
sent, the OT processing may also be required to update its
view at the client side.
Figure 3 represents the LightCore system model,Thismodel
describes the cloud server is responsible for storing and
maintaining the latestcontent,executingoperations(update,
delete, insert, etc.) against the content,resolvingoperational
conflicts, and broadcasting the updates among multiple
clients. The cloud server is considered to be honest but
curious. In case of risking its reputation, the honest cloud
server will timely and correctly disseminate modifications
committed by all the authorized clients without maliciously
attempting to add, drop, alter, or delay operation requests.
However, motivated by economic benefits or curiosity, the
cloud provider or its internal employees may spy or probe
into the shared content, determine the document type by
observing the format and layout, and discover the pivot part
of the documents by analyzing the frequency andquantityof
access. Additionally, we assume that the cloud servers will
protect the content from unauthorized user’s access and
other traditional network attacks such as DoS attacks, and
keep the availability of shared documents, for example, by
redundancy.
LightCore system model is collaborative editing cloud
solution for sensitive data against honest-but-curious
servers. We adopt stream cipher or the CTR mode of block
cipher to encrypt and decrypt the contents of the document
within clients, while only the authorized users share the
keys. In LightCore, all user data including all operations and
every version of the documents are processed in the cloud.
Attackers from inside or outside might attempt to alter or
delete the user data, or disrupt the cloud services. However,
for the reputation and benefits of the cloud serviceprovider,
the honest-but-curious cloud servers are supposed to
preserve integrity, availability, and consistency for the data
of users. The cloud service provider will deploy adequate
protections to prevent such external attacks, including
access control mechanisms to prevent malicious operations
on a document by other unauthorized users. Preserving the
confidentiality of users’ documents is the main target of
LightCore.
First, in our system, only the authorized users with the
shared master key can read the texts of the documents.
LightCore adopts stream cipher and the CTR mode of block
cipher to encrypt data at the client side. In the editing phase,
the input texts of each operation are encrypted before being
sent to the cloud. Therefore, the input texts are transmitted
in ciphertext and documents in the cloud are also stored in
ciphertext. Second, the algorithms are assumed to be secure
and the keys only appear on the clients. So, these keys could
only be leaked by the collaborative users or the clients, who
are also assumed to be trusted. Finally, data keys are
generated in a random way by each user, and LightCoreuses
each byte of the keystreams generated by data keys only
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1468
once. Any text is encrypted by the keystreams generated
specially for it. So, the curious servers cannot infer the
contents by analyzing the difference in two decrypted texts.
In order to maintain the functionalities of the cloud servers,
we only encrypt the input texts of each operation butnotthe
position of the operation. The position of eachoperation and
the length of the operated text are disclosed to the cloud
servers, which may leak a certain of indirect sensitive
information including the numberoflines,thedistributionof
paragraphs, and other structure information. We assume
these data can only be access by the authorized clients and
the cloud servers, and they are not disclosed to external
attackers by adopting the SSL protocol. In this case, the
related data are limited to the cloud and the clients.
Additionally, the attributes attached to the text segments,
including font, color, author identity, keystream_info, might
also be used to infer the underlying information of the
documents. For example, a text segment with the bold
attribute may disclose its importance; a text segment with
list attribute may also leak some related information.
However, some of the attributes can be easily protected by
encrypting them at the client in LightCore, becausethecloud
servers are not required to process all of them (e.g., font,
size, and color). Therefore, encrypting these attributes will
not impede the basic functionalities of the cloud servers.
Anyway, attributes author and keystream_info cannot be
encrypted, because these attributes related to the basic
functionalities of the cloud servers. Another threat from the
cloud is to infer sensitive data by collecting and analyzing
data access patterns from careful observationsontheinputs
of clients. Even if all data are transmitted and stored in an
encrypted format, traffic analysis techniques can reveal
sensitive information about the documents.
Table -1: Performance of Concurrent Modifications from
20 Clients
In order to evaluate the time of these main procedures, we
create an experiment where 20 collaborators from different
clients quickly input texts in the same document
concurrently. The time of transforming an operation called
the queuing time, the time of applying an operation in its
local copy called the applying time, and the transmission
time of each operation are given in Table 1. In fact, the main
difference lies in the added encryption/ decryption process;
the other processes are not affected. The decryption time of
less than 500 milliseconds has no influence on real time. We
can see that the total time 1239 milliseconds of LightCore is
only 29 milliseconds longer than that of the original system,
which makes no difference to human perception.
Fig -4: Multi-Layer Encryption Architecture
Multi layer Encryption Approach in Information Technology
offers advanced and useful technique of cloud computing
that is being intensivelyspreadingamonginternetusers. The
present approach lacks safeguardingofuploadeddata on the
server also lacks proper tracking of abolished users thereby
the user authentication process is hampered. A resolution
can be that the user authentication process is performed
twice. Firstly, authenticating the user by making use of
password, thereafter using the interfacing technology in
sending secret code to authenticusers email.Thedata owner
encrypts the data twice before uploading it cloud server.
Later the cloud server and then the cloud manager again re-
encrypt the data and finally stored in the cloud. The data to
be uploaded on the cloud is grantedadditional securityusing
Multi- layer encryption technique.
The paper projectsperformanceofmulti-layer encryption on
the data to be uploaded on cloud server as data being more
confidential and secure. The major concern of thepaperisto
perform the user authentication twice. Figure 4 suggests
three-layers of encryption are to offer enhanced and higher
safety of data and perform two types of login for user
authentication. First, using the original user login name and
password the validation is performed and secondly, to test
whether user is authorized or not, a secret code is mailed to
authentic users E-mail ID. On entering the correct secret
code only the user is granted data access on cloud server.
The purpose of authenticating the user twice is that only the
authentic users can fetch thedata fromcloudserver. Thetwo
Queu
ing
Time
(ms)
Applyi
ng
Time
(ms)
Trans
missio
n Time
(ms)
Decryp
tion
Time
(RC4)
(ms)
Total
Time
(ms)
Original
System
0.06 5.93 23 - 1210
LightCore
System
0.06 5.93 23 0.40 1239
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1469
algorithms being used for achieving security are AES and
RSA encryption techniques.
Table -2: Comparative of Accuracy
S.No. Encryption
Techniques
Security
(%)
Time
(ms)
1. CP-ABE 88.2 3.58
2. K-NN 92.1 2.71
3.
MultilayerEncryption
Approach
96.6 0.96
Table 2 mentioned above demonstrates evaluation of Multi-
layer encryption approach compared with K-NN, and
CP- ABE. The suggested Multi-layer encryption technique
proves to be effective providing enhanced performance in
comparison with rest of the existing techniques.
Chart -1: Comparison of Accuracy Analysis
Chart -2: Comparison of time evolutions
Chart 1 and 2 mentioned above compares security based
encryption models performing with Multi-layer encryption
approach with K-NN, andCP-ABE.ThesuggestedMulti-layer
encryption technique is efficient offering greater
performance compared with rest of the current techniques.
5. CONCLUSION
The proposed model-driven approach that transforms
security intentions to enforceable security policies. This
transformation is based on a set of security configuration
patterns that providesecurityexpertknowledgetoconfigure
the system. Our platform allows users to specify these
security intentions in system models to enable a simple and
easily comprehensible specification of security
requirements. Experiments on the prototype system show
that LightCore provides efficient onlinecollaborativeediting
services for resource-limited clients.Weadoptstreamcipher
or the CTR mode of block cipherto encrypt(anddecrypt) the
contents of the document within clients, while only
the authorized users sharethekeys.Thispaperalsopresents
a new strategy of Multi layer encryption oriented on the
algorithm of AES and RSA which claims to offer security and
privacy of entire public cloud content. Such data
communication among the systems will lead to improvised
security concerning the data that is shared over the cloud.
This solution is helpful if the cloud customer wants full
control not only over the encryption keys but also the key
management and the encryption algorithms used.
REFERENCES
[1] Kincaid, J. (2010). Google confirms that it fired engineer
for breaking internal privacy policies, available at
http://techcrunch.com/2010/09/14/google-
engineerspying-fired/.
[2] Silowash, G., Cappelli, D., Moore, A., Trzeciak, R.,
Shimeall, T. J., and Flynn, L.(2012).Commonsenseguide
to mitigating insider threats, 4th edition, Tech. rep.,
DTIC Document.
[3] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On
technical security issues in cloud computing,” Cloud
Computing, IEEE International Conference on,vol.0,pp.
109–116, 2009.
[4] Thalmann, S., Bachlechner, D., Demetz, L., and Maier, R.
(2012). “Challenges in cross-organizational security
management”, in SystemScience(HICSS),in45thHawaii
International Conference on (IEEE), pp. 5480–5489.
[5] M. Menzel, R. Warschofsky, and C. Meinel, “A
Patterndriven Generation of Security Policies for
Serviceoriented Architectures,” in IEEE International
Conference on Web Services (ICWS 2010), 2010.
[6] M. Menzel and C. Meinel, “SecureSOA - Modelling
Security Requirements for Service-oriented
Architectures,” in IEEE International Conference on
Services Computing (SCC 2010), 2010.
[7] Morin, J.-H., Aubert, J., and Gateau, B. (2012). “Towards
cloud computing SLA risk management: Issues and
challenges”, in System Science (HICSS), 2012 45th
Hawaii International Conference on (IEEE), pp. 5509–
5514.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1470
BIOGRAPHIES
Mr. Y Kiran Kumar, M.C.A. He
received his Master of Computer
Applications from Sri Venkatesra
University, Tirupati.HeisPursuing
Ph.D from Bharathiar University,
Coimbatore. He is having more
than 11 years of teaching
experience,currentlyheisworking
as a Assistant Professor in the
department of M.C.A in Sree
Vidyanikethan Engineering
College, Affiliated by JNTUA,
Ananthapuramu, India. His areas
of research interests include Web
Technologies, Information
Security, Service Oriented
ArchitectureandCloudComputing.
Dr. R. Mahammad Shafi, M.C.A,
M.Tech, Ph.D. He received his Ph.D
from University of Allahabad,
Allahabad. He is having more than
20 years of teaching experience.
His areas of research interests
include Software Engineering,
Software Testing and Quality
Assurance. He has published
papers in refereed journals and
conference proceedings in these
areas. He has been involved in
conferences and workshops as a
Committee member,organizerand
Session Chair. His areas of
research interests include
Software Engineering, Software
Testing and Quality Assurance.
Ad

More Related Content

What's hot (18)

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
Seema Kumari
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journals
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
IJECEIAES
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
Seema Kumari
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journals
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
IJECEIAES
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 

Similar to IRJET- Model-Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing (20)

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
eSAT Publishing House
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 

IRJET- Model-Driven Platform for Service Security and Framework for Data Security and Privacy using Key Management in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1464 Model-Driven Platform for Service Security and Framework for Data Security and Privacy Using Key Management in Cloud Computing Y. Kiran Kumar1, Dr. R. Mahammad Shafi2 1Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA 2Research Supervisor, Department of Computer Science, Bharathiar University, Coimbatore, T.N., INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computing is a technology to share the data and resources used among various organizations, but the security and privacy are most important aspects of cloud computing. The main responsibilityofcloudserviceprovideris the quality of service. Many of the cloud computing security frameworks have faced many challenges in security that has not yet been addressed well. The data accessed and shared through many devices from the cloud environment are not secure because they are likely to have various attacks like Identity Access Management (IAM), hijacking an account or a service either by internal/external intruders. In this paper, we proposed a model-driven approach enables the definition of security requirements at the modeling layer and facilitates a transformation based on security configuration patterns. We have also proposed a new system which can prevent the exposure of the key as well as a framework for sharing a file that will ensure security using key managementsystemwithin the cloud environment and also suggests to the approach of Multi-layer Encryption techniques in cloud computing thus enhancing the security parameters concerning sensitive data. Thus with layer ways Encryption technique the data in cloud server can be made more secured with better privacy. Resultant both cloud side and owner of the data gain enhanced security. According to this encryption technique if data-owner’s authorization is not granted then the users are restricted from the data access. Key Words: Service Oriented Architecture, Cloud Computing, Encryption, Access Control, Multi-layer encryption, Privacy, Security. 1. INTRODUCTION Cloud computing is a relatively new business model for outsourced services. However, the technology behind cloud computing is not entirely new. Virtualization, data outsourcing, and remote computation have been developed over the last 20 years, and cloud computing provides a streamlined wayofprovisioninganddeliveringsuchservices to customers. In this regard, cloud computing hasoften been criticized as representing just a new trend, rather than an innovative computing technology. As such, it is often best described as a business paradigm or computing model rather than any specific technology. A cloud consumer adopting a cloud-based solution needs to follow these steps: 1. Describe the service or application for which a cloud- based solution may be leveraged 2. Identify all functional capabilities that must be implemented for this service 3. Identify the security and privacy requirements and the security controls needed to securetheserviceorapplication. The trust relation between cloud customers (CCs) and cloud service providers (CSPs) has to be established before CCs move their information systems to the cloud. This requires an in-depth understanding of associated risks. Moreover, regulations related to data protection, financial reporting, etc. involve certain requirements that should be complied with when outsourcingbusinessprocessestothird parties, like CSPs. User authentication and authorization among cloud actors is a critical element of cloud architecture. Without knowing whoisloggingintothecloud- based information system, and who is accessing what data, cloud actors are not able to protect the data housed by a cloud ecosystem. Understanding who the users are, what data they are trying to access, where the data arestored,and how are users trying to get to these data—these are critical pieces of information that help cloud consumers determine an appropriate cloud architecture and deployment model. 1.1 Preliminary We assume that the cryptographic algorithms to encrypt data are secure. Meanwhile, we assume that the random string will not be repeatedly generated by the clients. We assume that the client of each collaborator runs in a secure environment which guarantees that: • The generation and distribution of shared secret and privilege management on the client of the initiator are appropriately maintained. • The secret passcode and keys that appear in the clients would not be stolen by any attackers. • The communication channel between the client and the cloud is enough to transmit all necessary data in real time and protected by existing techniques such as SSL/TLS. 1.2 Access Control Traditional access control architectures are based on the assumption that data storage management is located within a trusted domain and the owner has adequate knowledge about the system. However, this assumption is no longer valid in the cloud computing paradigm. Multiple
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1465 stakeholders are engaged as users within the cloudplatform and have different levels of data access permission. As a result, a greater granularity of access control is required to ensure that each stakeholder has access to exactlywhatthey are authorized and to ensure the privacy and confidentiality of the cloud-based services. Researchers and experts are mostly concerned about outside attackerswhenconsidering the security issues in distributed systems. Therefore, significant efforts have been made to keep the malicious attacker outside of the perimeter.Unfortunately,suchefforts cannot always be effective in the cloud computingparadigm. The incident where Google fired engineers for breaking internal privacy policies confirms that attackers may reside within the service framework [1]. Carnegie Mellon University’s Computer Emergency Response Team (CERT) defines a malicious insider as“Acurrentofformer employee, contractor, or business partner who has or had authorized access to a network and intentionally used that access in a way that negatively affect the confidentially, integrity, or availability of any information or information systems” [2]. Due to insider threats, cloud-based services are in serious risk of intellectual property theft, IT damage, and information leakage. Hence, security vulnerabilities emerging from insider threats should be addressed by policies, technical solutions, and proper detection methods. 2. SECURING SERVICES IN THE CLOUD Service-Oriented Architecture (SOA) is an architectural pattern, while cloud computing is a set of enabling technologies as a potential target platform or technological approach for that architecture. By combining SOA and cloud computing, it becomes possible to reduce the time taken to implement technology, enhance business performance and expose the existing legacy application over the Internet. The role of SOA in cloud computing is important because a successful cloud solution requires an in-depth understanding of the architecture, the services offered and how to leverage them. Cloud computing becomes part of the architectural arsenal to create a successful SOA. Cloud services benefit the business by taking the best practices and business process focus of SOA. These benefits apply to both cloud service providers and cloud service users. Cloud service providers need to architect solutions by using a service-oriented approach to deliver services with the expected levels of elasticity and scalability. Companies that architect and govern business processes with reusable service-oriented components can moreeasilyidentifywhich components can be successfully moved to public andprivate clouds. A Service-Oriented Architecture (SOA) is a software architecture for building business applications that implement business processes or services through a set of loosely coupled, black-box components orchestrated to deliver a well-defined level of service. Service-oriented architectures are based on the idea of exposing software functionality as services to be used by independent parties. Their inherent independence of a specific platform and operating system make themperfectly suitable to connect service consumers and serviceproviders over the Internet and provide a technical foundation for cloud computing [3]. The combination of SOA and cloud computing facilitatingtheprovisionofcomposedapplication and services that integrate and orchestrate services from different sources pose new challenges to security. Since services and applications are exposedtotheInternetand are used in a global context, the management of user identities across organisational borders is a key element to perform access control and to prevent unauthorised access in a decentralised environment. Open Identity Management Models support the sharing of identity information across several trust domains in a controlled manner. Clients can request identity information from the identity management systems and convey this information in an interoperableformattoa requesting party. Besides identity provisioning,confidentialityandintegrityof exchanged, stored, and processed information must be ensured. Several specifications emerged to protect information at different layers. For instance, a secure channel can be used to protect exchangedinformation, while signature and encryption mechanisms applied to a message can also protect stored and processed information. These security requirements are stated in security policies that configure the secure interaction of participants in a service- based system. Policies facilitate the negotiation of security requirements between services and service clientsto enable interoperability at runtime. This enablesa seamlessusageof services in the cloud to build composed applications. However, due to the complexity of the involved specifications, the variety of security mechanisms and the flexibility of service-based systems, such policiesarehard to understand and even harder to codify. To overcome these limitations, we foster a model-driven approach that generates security configurations based on system design models annotatedwithsecurityrequirements.Toimplement the functional and security requirements specified at the modelling layer, our cloud platform has to ensure two aspects: The system with all involved services and web application components must be instantiated in a virtual machine according to the functional requirements and the services must beconfiguredincompliance withthemodelled security requirements. As illustrated in Figure 1, our approach consists of three layers. Functional and security requirements, expressed at the modelling layer, are translated to a platform independent model. This model constitutes the foundation to setup the virtual machine, application server, services and composed applications that are provided to the user [4].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1466 Fig -1: Model-driven Security in SOA A Model-driven approach transforms security intentions to enforceable security policies. This transformation is based on a set of security configuration patterns that provide security expert knowledge to configure the system. Our model-driven approachrequiresanautomatedgenerationof enforceable security configurations based on the modelled security requirements [5]. 3. DATA SECURITY AND PRIVACY IN CLOUD Security and privacy concerns faced by the cloudconsumers require them to evaluate the risk and its management in the cloud environment, then mitigating those risks. Of course, the most critical benefit offered by cloud computing is the reduction of business costs. Most businesses have well- established security objectives, strategies, and policies consistent with compliance requirements to protect their intellectual property, and their clients’ data. Many security components come into play, but the most four critical components are shown in Figure 2. Data andtransmissionof data must take place through secured channels. Application and storage security both must be maintained by the cloud service provider. Fig -2: Security Components. The storage data itself can be encrypted by many cloud service providers using server side encryption (SSE). This will encrypt the data on the cloud storage devices with strong cryptographic algorithms but the encryption keys stay with the cloud provider and are not underthecontrol of the cloud customer. If nothing else is offered, the cloud server administrator should activate SSE per default for the cloud storage used. This encryption gives some basic protection against unauthorized access tothecustomerdata but also means that the security of this solution depends on the cloud provider’s ability to restrict access to the storage encryption keys even to other employees. The cloud service provider should enforce the same or even higher levels of security controls as expected by the cloud customer or as best practice in the industry. There are logical risks of information disclosure or data integrity by having unsecure applications or permission handling functionalities. The application or underlying infrastructure could be open to exploits by hackers. The user permission and role model could be exploited as well by external hackers or internal employees that have too many access rights. In general, the same security measures need to be applied like in any IT system. The complexity arisesfromthe cloud technology model that is based on virtualization and distributed responsibilities between the infrastructure layers. The cloud service provider must take careofphysical and logical security that is in his sole responsibility. For example, the cloud service provider may offer encryption, but it is up to the customer to activate and use it. Clear responsibilities for network, operating system, and application security measures are key priorities to achieve such a secure cloud solution. Cloud computing is yet to standardize the process of service metering. Therefore, service metering is notyettrustworthy to the cloud consumers. The process requires a systematic, verifiable, and reliable framework for cloudcomputingto be sustainable. Subsequently, the trust relationship of cloud service providers with customers and enterprises will be enhanced, resulting in a wider adoption of cloud-based solutions. Maintaining the privacy of users isofhighconcern for most organizations. Whether employees, customers, or patients, personally identifiable informationisa high-valued target. Many cloud subscribers do not realizethatwhenthey contract a provider to perform a service, they are also agreeing to allow that providertogatherand sharemetadata and usage information about their environment. In some cases, providers even sell or share these data legally based on their privacy statements The evolving nature of cloud computing technologies has resulted in nonstandard security implementations and practices. Moreover, the lack of governance for audits creates a challenging environment to verify if the cloud service providers have complied with the standards. As a result, cloud computing security may not yet be ready for audits [6]. Users depend on the service level agreement (SLA) and have to rely on the cloud service provider to keep up their end of the bargain. However, cloud servicesarebest effort services and a service provider may not guarantee the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1467 security standards. Therefore, as SLAs play a vital role in ensuring the security of the cloud-based services, governing bodies and security experts should be part of the SLAs and legal aspects, which is not yet seen to be in practice for cloud-based service models [7]. 4. PROPOSED WORK 4.1 Operational Transformation The edit conflict due to concurrent operations is one of the main challenges in collaborativeeditingsystems. Without an efficient solution to edit conflicts, it may result in inconsistent text to different clients when collaborators concurrently edit the same document. In 2009, OT was adopted as a core technique behind the collaboration features in Apache Wave and Google Docs. In a collaborative editing cloud service, the cloud servers can be responsible for receiving and caching editing operations in its queue, imposing order on each editing operation, executing OT on concurrent operations based on the order iteratively, broadcasting these editing operations to other clients, and applying them in its local copy to maintaina latest version of the document. When receiving an operation opr(c) from the client, the cloud server executes operational transformation. 4.2. System Design and Security Analysis Fig -3: LightCore system model. LightCore involves a group of collaborativeusersanda cloud server. Each client communicates with the server over the Internet, to send its operations and receive modifications from others in real time. For each document, the server maintains a history of versions. That is, it keeps receiving operations from users, and these modifications make the document shift from one version to another. When applying modifications on a version, the server may need OT to transform some operations. The server also keeps sending the current freshest version to users, that is, all transformed operations since the last version is sent. Because a user is still editing on the old version when the freshestoneisbeing sent, the OT processing may also be required to update its view at the client side. Figure 3 represents the LightCore system model,Thismodel describes the cloud server is responsible for storing and maintaining the latestcontent,executingoperations(update, delete, insert, etc.) against the content,resolvingoperational conflicts, and broadcasting the updates among multiple clients. The cloud server is considered to be honest but curious. In case of risking its reputation, the honest cloud server will timely and correctly disseminate modifications committed by all the authorized clients without maliciously attempting to add, drop, alter, or delay operation requests. However, motivated by economic benefits or curiosity, the cloud provider or its internal employees may spy or probe into the shared content, determine the document type by observing the format and layout, and discover the pivot part of the documents by analyzing the frequency andquantityof access. Additionally, we assume that the cloud servers will protect the content from unauthorized user’s access and other traditional network attacks such as DoS attacks, and keep the availability of shared documents, for example, by redundancy. LightCore system model is collaborative editing cloud solution for sensitive data against honest-but-curious servers. We adopt stream cipher or the CTR mode of block cipher to encrypt and decrypt the contents of the document within clients, while only the authorized users share the keys. In LightCore, all user data including all operations and every version of the documents are processed in the cloud. Attackers from inside or outside might attempt to alter or delete the user data, or disrupt the cloud services. However, for the reputation and benefits of the cloud serviceprovider, the honest-but-curious cloud servers are supposed to preserve integrity, availability, and consistency for the data of users. The cloud service provider will deploy adequate protections to prevent such external attacks, including access control mechanisms to prevent malicious operations on a document by other unauthorized users. Preserving the confidentiality of users’ documents is the main target of LightCore. First, in our system, only the authorized users with the shared master key can read the texts of the documents. LightCore adopts stream cipher and the CTR mode of block cipher to encrypt data at the client side. In the editing phase, the input texts of each operation are encrypted before being sent to the cloud. Therefore, the input texts are transmitted in ciphertext and documents in the cloud are also stored in ciphertext. Second, the algorithms are assumed to be secure and the keys only appear on the clients. So, these keys could only be leaked by the collaborative users or the clients, who are also assumed to be trusted. Finally, data keys are generated in a random way by each user, and LightCoreuses each byte of the keystreams generated by data keys only
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1468 once. Any text is encrypted by the keystreams generated specially for it. So, the curious servers cannot infer the contents by analyzing the difference in two decrypted texts. In order to maintain the functionalities of the cloud servers, we only encrypt the input texts of each operation butnotthe position of the operation. The position of eachoperation and the length of the operated text are disclosed to the cloud servers, which may leak a certain of indirect sensitive information including the numberoflines,thedistributionof paragraphs, and other structure information. We assume these data can only be access by the authorized clients and the cloud servers, and they are not disclosed to external attackers by adopting the SSL protocol. In this case, the related data are limited to the cloud and the clients. Additionally, the attributes attached to the text segments, including font, color, author identity, keystream_info, might also be used to infer the underlying information of the documents. For example, a text segment with the bold attribute may disclose its importance; a text segment with list attribute may also leak some related information. However, some of the attributes can be easily protected by encrypting them at the client in LightCore, becausethecloud servers are not required to process all of them (e.g., font, size, and color). Therefore, encrypting these attributes will not impede the basic functionalities of the cloud servers. Anyway, attributes author and keystream_info cannot be encrypted, because these attributes related to the basic functionalities of the cloud servers. Another threat from the cloud is to infer sensitive data by collecting and analyzing data access patterns from careful observationsontheinputs of clients. Even if all data are transmitted and stored in an encrypted format, traffic analysis techniques can reveal sensitive information about the documents. Table -1: Performance of Concurrent Modifications from 20 Clients In order to evaluate the time of these main procedures, we create an experiment where 20 collaborators from different clients quickly input texts in the same document concurrently. The time of transforming an operation called the queuing time, the time of applying an operation in its local copy called the applying time, and the transmission time of each operation are given in Table 1. In fact, the main difference lies in the added encryption/ decryption process; the other processes are not affected. The decryption time of less than 500 milliseconds has no influence on real time. We can see that the total time 1239 milliseconds of LightCore is only 29 milliseconds longer than that of the original system, which makes no difference to human perception. Fig -4: Multi-Layer Encryption Architecture Multi layer Encryption Approach in Information Technology offers advanced and useful technique of cloud computing that is being intensivelyspreadingamonginternetusers. The present approach lacks safeguardingofuploadeddata on the server also lacks proper tracking of abolished users thereby the user authentication process is hampered. A resolution can be that the user authentication process is performed twice. Firstly, authenticating the user by making use of password, thereafter using the interfacing technology in sending secret code to authenticusers email.Thedata owner encrypts the data twice before uploading it cloud server. Later the cloud server and then the cloud manager again re- encrypt the data and finally stored in the cloud. The data to be uploaded on the cloud is grantedadditional securityusing Multi- layer encryption technique. The paper projectsperformanceofmulti-layer encryption on the data to be uploaded on cloud server as data being more confidential and secure. The major concern of thepaperisto perform the user authentication twice. Figure 4 suggests three-layers of encryption are to offer enhanced and higher safety of data and perform two types of login for user authentication. First, using the original user login name and password the validation is performed and secondly, to test whether user is authorized or not, a secret code is mailed to authentic users E-mail ID. On entering the correct secret code only the user is granted data access on cloud server. The purpose of authenticating the user twice is that only the authentic users can fetch thedata fromcloudserver. Thetwo Queu ing Time (ms) Applyi ng Time (ms) Trans missio n Time (ms) Decryp tion Time (RC4) (ms) Total Time (ms) Original System 0.06 5.93 23 - 1210 LightCore System 0.06 5.93 23 0.40 1239
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1469 algorithms being used for achieving security are AES and RSA encryption techniques. Table -2: Comparative of Accuracy S.No. Encryption Techniques Security (%) Time (ms) 1. CP-ABE 88.2 3.58 2. K-NN 92.1 2.71 3. MultilayerEncryption Approach 96.6 0.96 Table 2 mentioned above demonstrates evaluation of Multi- layer encryption approach compared with K-NN, and CP- ABE. The suggested Multi-layer encryption technique proves to be effective providing enhanced performance in comparison with rest of the existing techniques. Chart -1: Comparison of Accuracy Analysis Chart -2: Comparison of time evolutions Chart 1 and 2 mentioned above compares security based encryption models performing with Multi-layer encryption approach with K-NN, andCP-ABE.ThesuggestedMulti-layer encryption technique is efficient offering greater performance compared with rest of the current techniques. 5. CONCLUSION The proposed model-driven approach that transforms security intentions to enforceable security policies. This transformation is based on a set of security configuration patterns that providesecurityexpertknowledgetoconfigure the system. Our platform allows users to specify these security intentions in system models to enable a simple and easily comprehensible specification of security requirements. Experiments on the prototype system show that LightCore provides efficient onlinecollaborativeediting services for resource-limited clients.Weadoptstreamcipher or the CTR mode of block cipherto encrypt(anddecrypt) the contents of the document within clients, while only the authorized users sharethekeys.Thispaperalsopresents a new strategy of Multi layer encryption oriented on the algorithm of AES and RSA which claims to offer security and privacy of entire public cloud content. Such data communication among the systems will lead to improvised security concerning the data that is shared over the cloud. This solution is helpful if the cloud customer wants full control not only over the encryption keys but also the key management and the encryption algorithms used. REFERENCES [1] Kincaid, J. (2010). Google confirms that it fired engineer for breaking internal privacy policies, available at http://techcrunch.com/2010/09/14/google- engineerspying-fired/. [2] Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. J., and Flynn, L.(2012).Commonsenseguide to mitigating insider threats, 4th edition, Tech. rep., DTIC Document. [3] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On technical security issues in cloud computing,” Cloud Computing, IEEE International Conference on,vol.0,pp. 109–116, 2009. [4] Thalmann, S., Bachlechner, D., Demetz, L., and Maier, R. (2012). “Challenges in cross-organizational security management”, in SystemScience(HICSS),in45thHawaii International Conference on (IEEE), pp. 5480–5489. [5] M. Menzel, R. Warschofsky, and C. Meinel, “A Patterndriven Generation of Security Policies for Serviceoriented Architectures,” in IEEE International Conference on Web Services (ICWS 2010), 2010. [6] M. Menzel and C. Meinel, “SecureSOA - Modelling Security Requirements for Service-oriented Architectures,” in IEEE International Conference on Services Computing (SCC 2010), 2010. [7] Morin, J.-H., Aubert, J., and Gateau, B. (2012). “Towards cloud computing SLA risk management: Issues and challenges”, in System Science (HICSS), 2012 45th Hawaii International Conference on (IEEE), pp. 5509– 5514.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1470 BIOGRAPHIES Mr. Y Kiran Kumar, M.C.A. He received his Master of Computer Applications from Sri Venkatesra University, Tirupati.HeisPursuing Ph.D from Bharathiar University, Coimbatore. He is having more than 11 years of teaching experience,currentlyheisworking as a Assistant Professor in the department of M.C.A in Sree Vidyanikethan Engineering College, Affiliated by JNTUA, Ananthapuramu, India. His areas of research interests include Web Technologies, Information Security, Service Oriented ArchitectureandCloudComputing. Dr. R. Mahammad Shafi, M.C.A, M.Tech, Ph.D. He received his Ph.D from University of Allahabad, Allahabad. He is having more than 20 years of teaching experience. His areas of research interests include Software Engineering, Software Testing and Quality Assurance. He has published papers in refereed journals and conference proceedings in these areas. He has been involved in conferences and workshops as a Committee member,organizerand Session Chair. His areas of research interests include Software Engineering, Software Testing and Quality Assurance.