Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud
By
ACKNOWLEDGEMENTS
I'd like to start out by saying a big thank you to my supervisor. His guidance and support have been invaluable. Thanks to my committee members for their advice from beginning to end. Last but not least, thank you to my close friends and family. Specially, my parents who have always shown an interest and made this part of conversation. Likewise, my good friends who have always been there to bounce ideas off and has always been available with a generous offer to help in any way possible. want to thank both of her donor families. Without your gift of life she would not be here with me today as my inspiration, my confidant and my best friend.
ABSTRACT
In past few years the technology of cloud computing have become increasing popular due to the various benefits that are being offered by this technology. Since, we all know that cloud computing is as technology that offers the users the illusion of possessing an infinite number of computing resources. These resources can be used by the users as much as possible without having any sort of worries about the manner in which the resources are being provided to them. Along, with that the technology of cloud computing also provides the users with scalability, availability, and reliability than users could achieve with their own resources. However, a major drawback of this technology is that businesses that are seeking to implement this technology have to cede complete control of their data and its operation to cloud providers, and a malicious provider could compromise the data's confidentiality and integrity. Along, with that there is a long history of breaches and leaks, and misuse of customer's data and the providers have failed to identify a secure mechanism to safeguard the data of the users. Now, the users have to choose between the trusting providers and forgoing cloud computing's benefits entirely. The purpose of this research study is to overcome the encryption and authentication issues present in the current cloud platform. The research in this study have provided an encryption mechanism known as the CFD which would enable the users to benefit from the deployment of cloud without ceding complete control to the cloud service providers. Their security is rooted not in the provider's good behavior, but in the users' cryptographic keys. The system does not only observe encrypted data but at the same time it does not deviate from the task and performs correct executions of the data.
ACKNOWLEDGEMENTSii
ABSTRACTiii
CHAPTER 1: INTORDUCTION1
Introduction1
Aims of the Study6
Purpose of the Study6
Roadmap of the Study8
CHAPTER 2: LITERATURE REVIEW10
Detection of Cloud Service Providers Equivocation10
Assumptions for Cloud Deployment14
Users and Clients15
Challenges18
CHAPTER 3: CFD ENCRYPTION20
Introduction20
Proposed CFD-based Secure System21
System Framework22
Secure Data Exchanging and Processing Mechanisms23
Key Generation and Distribution23
Uplink Communication24
Downlink Communication26
Key Revocation26
Practical System with Extended CFD Encryption26
Privacy-preserving Data Aggregation27
Privacy-preserving Statistical Analysis28
Security31
Efficiency31
CHAPTER 4: CONCLUSION AND FUTURE RESEARCH33
Conclusion33
Future Work35
CHAPTER 1: INTORDUCTION
Introduction
In past few years cloud computing has emerged as a technology which has enabled the businesses and individuals ...