Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Analysis and design for security inhancement in cloud center project report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Analysis and design for security inhancement in clud data center

[attachment=66581]

INTRODUCTION

Cloud computing functional requirements are the building blocks for the best practices that every cloud provider is striving to meet. Included in the requirements are:


DEVELOPMENT METHOD


Security of data and trust problem has always been a primary and challenging issue in cloud computing. This section describes a proposed data security model in cloud computing. In addition, focuses on enhancing security by using an OTP authentication system, check data integrity by using hashing algorithms, encrypt data automatically with the highest strong/ fast encryption algorithm and finally ensure the fast recovery of data.



CLOUD COMPUTING

This section gives an overview of cloud computing, Cloud Computing Architecture, and data security in cloud computing. There are many definitions that attempt to address cloud from the perspective of academicians, architects, engineers, developers, managers, and consumers [1]-[2]. The simplest definition of cloud computing is "moving computing from single desktop pc/data-centre to the internet


CONCLUSION

From simulation results, we can conclude that no strong indications of statistical weaknesses for eight modern encryption algorithms in both environments, but some differences between algorithms appeared. In Amazon EC2, the evaluation of eight modern encryption techniques show that RC6, AES, DES and Blowfish results were slightly better than other-encryption methods, Which the pervious methods have more than P-value in very safe area. Finally, AES encryption method is suitable algorithm for Amazon EC2 environment, but Blow-Fish and DES is more suitable when we focus on time of encryption method. On the selected encryption algorithms, sequence complexity values will exceed its threshold values for randomness only in Random Excursions Variant test and Random Excursions test. These two tests are not applicable, which there is insufficient number of cycles. In traditional desktop, the evaluation of eight modern encryption techniques show that RC6, AES, Blowfish, DES and RC4 results were slightly better than other-encryption methods which the pervious methods have more than P-value in very safe area. Finally, RC6 encryption method is suitable algorithm for traditional PC environment, but Blow-Fish is more suitable when we focus on time of encryption method.