Encryption And Authenticity Issues In Cloud Computing: Rising Concern Of Cloud

Read Complete Research Material



Encryption and Authenticity Issues in Cloud Computing: Rising Concern of Cloud

By

ACKNOWLEDGEMENTS

I'd like to start out by saying a big thank you to my supervisor. His guidance and support have been invaluable. Thanks to my committee members for their advice from beginning to end. Last but not least, thank you to my close friends and family. Specially, my parents who have always shown an interest and made this part of conversation. Likewise, my good friends who have always been there to bounce ideas off and has always been available with a generous offer to help in any way possible. want to thank both of her donor families. Without your gift of life she would not be here with me today as my inspiration, my confidant and my best friend.

ABSTRACT

In past few years the technology of cloud computing have become increasing popular due to the various benefits that are being offered by this technology. Since, we all know that cloud computing is as technology that offers the users the illusion of possessing an infinite number of computing resources. These resources can be used by the users as much as possible without having any sort of worries about the manner in which the resources are being provided to them. Along, with that the technology of cloud computing also provides the users with scalability, availability, and reliability than users could achieve with their own resources. However, a major drawback of this technology is that businesses that are seeking to implement this technology have to cede complete control of their data and its operation to cloud providers, and a malicious provider could compromise the data's confidentiality and integrity. Along, with that there is a long history of breaches and leaks, and misuse of customer's data and the providers have failed to identify a secure mechanism to safeguard the data of the users. Now, the users have to choose between the trusting providers and forgoing cloud computing's benefits entirely. The purpose of this research study is to overcome the encryption and authentication issues present in the current cloud platform. The research in this study have provided an encryption mechanism known as the CFD which would enable the users to benefit from the deployment of cloud without ceding complete control to the cloud service providers. Their security is rooted not in the provider's good behavior, but in the users' cryptographic keys. The system does not only observe encrypted data but at the same time it does not deviate from the task and performs correct executions of the data.

ACKNOWLEDGEMENTSii

ABSTRACTiii

CHAPTER 1: INTORDUCTION1

Introduction1

Aims of the Study6

Purpose of the Study6

Roadmap of the Study8

CHAPTER 2: LITERATURE REVIEW10

Detection of Cloud Service Providers Equivocation10

Assumptions for Cloud Deployment14

Users and Clients15

Challenges18

CHAPTER 3: CFD ENCRYPTION20

Introduction20

Proposed CFD-based Secure System21

System Framework22

Secure Data Exchanging and Processing Mechanisms23

Key Generation and Distribution23

Uplink Communication24

Downlink Communication26

Key Revocation26

Practical System with Extended CFD Encryption26

Privacy-preserving Data Aggregation27

Privacy-preserving Statistical Analysis28

Security31

Efficiency31

CHAPTER 4: CONCLUSION AND FUTURE RESEARCH33

Conclusion33

Future Work35

CHAPTER 1: INTORDUCTION

Introduction

In past few years cloud computing has emerged as a technology which has enabled the businesses and individuals ...