SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3025
Improving Data Storage Security and Performance In Cloud
Environment
Snehal A. Ghogare1, Prof. Varshapriya J. N2
1M.Tech Student, Dept of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
2 Associate Professor, Dept of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
---------------------------------------------------------------------------------***-------------------------------------------------------------------------------
Abstract - A Most of the existing cloud storageplatformsdo
not provide a complete implementation of all security
components as well as the performance of system degrades
under high concurrent pressure and large-scale environment.
Compared to boot from localdisks, bootingfromvolumesoften
lead to failure, those are largely due to the low performanceof
Cinder. Database, threading model, deployment architecture
and other factors will affect the performance ofcinderlargely.
Under certain conditions all of these can become a
performance bottleneck. We will provide a layer of security to
storage systems by extending the OpenStack cloud computing
stack to support heterogeneous architectures and
accelerators, distributing the storage to each cloudinorder to
help everyone to be more convenient to use cinder. Our
middleware split a file according to the computing capability
of node, being uploaded into segments, encrypting them and
then upload each segment to each backend cloud storage.
When user want to download a file, system again recreate the
original uploaded file and allow downloading it.
Key Words: Cloud Storage, Data security, Openstack
Cinder, Compute, Storage, Authentication.
1. INTRODUCTION
Cloud Service Provider(CSP) is responsible for maintaining
and monitoring the out sourced data. Cloud is a public
environment where there are many possibilities to attack
the data. Data outsourcing brings securityissuesinthecloud
while move to storage. Once the data is outsourced to the
cloud, CSP is only responsible for maintaining, monitoring
and controlling the data.Nowa daysmanyorganizations and
enterprises have started to outsource their data to cloud.
Cloud is a public environment where there are lots of
possibilities to attack the user data. Security is the highest
concern in the cloud environment. Outsourced data to the
cloud are kept by third party CSP. In this situation, data may
be attacked from inside as well as outside the cloud. Data
security is ensured by security parameters such as
confidentiality,integrityand availability.Thispaperpresents
a middleware-oriented framework that integrates different
IaaS Storage Clouds. Based on the registered users access
token, the middleware does the authentication withtheIaaS
cloud frameworks. The middleware relies on a service level
manager which decides how to split a file beinguploaded, its
encryption and decryption followed by merger for
download. The evaluation of the framework shows high
improvement in the security as we are distributing the
storage as per the computing capability of node and also
encrypting the data.
In the proposed system, the issue of progressing files to a
different user through storage servers is completely under
the command of the data owner. The data owneruploads the
file which is in turn encrypted and stored in the server. The
distributed storage system consists of distributed storage
servers and key servers. These key servers are extremely
secured by security techniques and performance of system
will be improved as the data is distributed according to the
computing capability of node so that retrieval time will be
minimium.
In the existing cloud storage system, digital data is stored in
logical pools, the physical storage contains multiple servers
or locations, and the hosting company manages physical
environment. Storage capacity is given on lease to people
and organizations for the storage of different type of data.
Cloud storage services are accessible via web services (API)
or by applications that utilize the API. Amazon Web Services
introduced their cloud storage service. AWSS3isa oneof the
first cloud storage supplier.
Other cloud storage services arepopularserviceslikeGoogle
Drive, Google Cloud Platform, Smugmug, Dropbox, Box and
OneDrive. Cloud storage is based on highly virtualized
infrastructure. It is a multitenant system with multiple
storage devices inside. The storage cloud is built from low
cost components for ensuring reliability in thesoftware,and
building advanced functionality on top of this foundation.
2. RELATED WORK
Some open sourceplatformssuchasSwift(OpenStackcloud),
Walrus (Eucalyptus cloud), and Cumulus (Nimbus cloud)are
used to analyze the security blocks for the cloud storage
platforms. Table 1 explains the security components
summary of the instantiations of every platform.
Authentication and authorization components provide a
adequate security level. Users can make use of different
accesscredentialmechanisms(e.g.passwords,certificates)to
access the data. In Amazon S3 platform, it provide an Access
Control List (ACL) mechanism where owners can assign
policies to specific customers, groups and data
containers(data bucket). Note, however, that there is still
room for improvement in these components. OpenStack
provides a manageable interface to cover area of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3026
authentication andauthorization mechanisms with out need
to modify the whole platform. In some caes, ACLs are
deficient to fully catch the enterprise environment’s
complexity. Approaches such as Role-base Access Control
(RBAC) might be integrated.[4][6]
Table -1: Summary of Security components of existing
cloud storage platforms.
Finally, there are various components that are not hold up in
most platforms. For instance, existing device
authentication/authorization and secure communications
components are designed to protect the communications
between cloud entities, but they are not used to protect the
communications inside the storage subsystem. There is no
direct support for storing the credentials in secure and
tamper-resistant containers. As for data protection, no
platform provides mechanisms that implement data-at-rest
encryption. With the exception case of Nimbus platform and
(partially ) OpenStack platform, it isimpossibletoimplement
specific plugins that provide additional extended services
such as proof of storage services.[4][7]
3. PROPOSED METHOD
In the proposed system,authentication is to bechecked inan
openstack inorder to make only an authenticated user to
access the instances created in the cloud. Following are the
proposed steps for block encryption
1. Nova API call for volume mount
2. Intercept call and mount volume as a block device to
virtualization host.
3. Get Key via a SSL/ TLS connection.
4.Loop and dm-crypt block device
5. Update VM Config for block devices
6. Create VM and start it.
Fig -1: Proposed System architecture
4.EXPERIMENT,EVALUATIONANDDISCUSSION
4.1 Openstack block storage:
IRJET Instances use an empemeral volume by default. This
kind of volume does not save the changes made on it and
reverts to its original state when the current user give away
control. One of the methods for storing data permanently in
openstack cloud is the cinder block storage service.
Openstack block storage service consists of four services-
 Cinder api
 Cinder scheduler
 Cinder volume
 Cinder backup
Cinder api
API service provides anHTTPendpointforAPIrequests.Two
versions of API are supported and required for the cloud. So
Cinder provides six endpoints. The cinder-api verifies the
identity requirements for an incoming requestandafterthat
routes them to the cinder-volume for action through the
message broker.
Cinder scheduler
Scheduler service reads requests from the message queue
and selects the optimal storage provider node to create or
manage the volume.
Cinder volume
The service works with a storage back end through the
drivers. The cinder volume gets requests from the
scheduler and responds to read and write requests sent to
block storage service to maintain state.
Cinder Backup
We can use several back ends at the same time. For each
back end you need one or more dedicated cinder volume
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3027
service cinder backup. The backup service works with the
backup backend through the driver architecture.
4.2 Factors that lead to poor performance:
We analyse the deployment architecture andfindthefactors
that lead to poor performance.
Fig -2: Deployment architecture of cinder block storage
Following are the factors that lead to poor performance-
1. HA Proxy report error
2. The number of cinder api workers
 Cinder api takes longertime toprocesseachrequest
under high concurrency pressure.
 Database connection driver is implemented beyond
eventlet's monkeypatching, blockingdatabasecalls
with block eventlet thread
3. Cinder volume has more serious performance issues
 very heavy workload
 create volume
 initialize connection
 Cannot consume message timly from MQ
 Takes a longer time to process each request
4. Storage driver
If the ICSI target information is not stored in a separate file
on creation, even a node reboot, your existing volumes on
that node will be restored automatically.
5. RBD Rados call may block cinder-volume
 rbd and rados liberty are not patched by eventlet
 long running tasks block eventlet loop
 cinder volume becomes a zombie process
5. CONCLUSION
This paper shows how to implement an encrypted cloud
storage system on the basis of OpenStack Cinder,andhow to
increase the security and performance by analyzing the
deployment architecture of cinder. The compatibilityofthis
system allows it to be deployed in existing storage systems
which uses Cinder as storage technology and provide cinder
APIs and Keystone APIs without modifying those existing
systems.
REFERENCES
[1] R. Nivedhaa and J. Jean Justus, "A Secure Erasure Cloud
Storage system using Advanced Encryption Standard
algorithm and Proxy Re-encryption", IEEE Conference
on Communication and Signal Processing (ICCSP) April,
2018.
[2] B. Fathima Mary, George Amalarethinam,"Data Security
Enhancement in Public Cloud Storage using Data
Obfuscation and Steganography", IEEE transaction on
data storage 2017.
[3] Bin Feng, Cheng Guo, “An Efficient Protocol with
Bidirectional Verification for Storage Security in Cloud
Computing”, IEEE transaction on cloud computing May,
2016.
[4] Roman, R., Felipe, M., Gene, P. and Zhou, “Complying
with Security Requirements in Cloud Storage Systems”,
Journal of Computers, 11(3), pp.201-206, 2016.
[5] N.Saranya, S.Nivedha, “Implementing Authentication in
an Openstack Environment”, International Conference
on Computer Communication and Informatics (ICCCI -
2016), Jan. 07 – 09, 2016.
[6] Pragya Jain, Aparna Datt, S.C. Gupta, “Cloud Service
Orchestration based Architecture of OpenStack Nova
and Swift ”, Intl. Conference on Advances in Computing,
Communications and Informatics (ICACCI), Sept. 21-24,
2016.
[7] Peidong Sha , Zhixiang Zhu," The modification of RSA
algorithm to adapt fully homomorphic encryption
algorithm in cloud computing" ,IEEE 2016.
[8] H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. Shen,
“Enablingfine-grained multi-keywordsearchsupporting
classified sub-dictionaries over encrypted cloud data,”
IEEE Transactions on Dependable and Secure
Computing, vol. 13, no. 3, pp. 312–325, 2016.
[9] Sandeep Nehe, Prof. M.B. Vaidya, “Data Security using
Data slicing over storage clouds”, International
Conference on Information Processing (ICIP)
Vishwakarma Institute of Technology, Dec 16-19, 2015.
[10] L S Girish, Dr. H. S. Guruprasad, “Building Private Cloud
using OpenStack” , International Journal of Emerging
Trends & Technology in Computer Science (IJETTCS),
volume 5, Issue 3, May-June-2014.
[11] Bin S. Suganya, P. Damodharan, “Enhancing Security for
Storage Services in Cloud Computing”, International
Conference on Current Trends in Engineering and
Technology, ICCTET, 2013.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3028
[12] S. Suganya, P. Damodharan, “Enhancing Security for
Storage Services in Cloud Computing”, International
Conference on Current Trends in Engineering and
Technology, ICCTET, 2013.
[13] C. Cachin, I. Keidar, and A. Shraer, "Trusting the cloud,"
ACM STGACT News, vol. 40, no. 2, p. 81, 2009.

More Related Content

What's hot (18)

Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
M0937681
M0937681M0937681
M0937681
IOSR Journals
 
Security Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A ReviewSecurity Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A Review
AM Publications,India
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0
Jason Reed
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Adnene Guabtni
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Rashmi Agale
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
Cisco Russia
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
Security Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A ReviewSecurity Features of different Cloud Service Models: A Review
Security Features of different Cloud Service Models: A Review
AM Publications,India
 
Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0Cloud Computing Use Cases Whitepaper 3 0
Cloud Computing Use Cases Whitepaper 3 0
Jason Reed
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Adnene Guabtni
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
Cisco Russia
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 

Similar to IRJET- Improving Data Storage Security and Performance in Cloud Environment (20)

Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Paper1
Paper1Paper1
Paper1
Vikas Khairnar
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

How to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdfHow to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdf
jamedlimmk
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
Redirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to RickrollsRedirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to Rickrolls
Kritika Garg
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
How to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdfHow to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdf
jamedlimmk
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
Redirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to RickrollsRedirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to Rickrolls
Kritika Garg
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 

IRJET- Improving Data Storage Security and Performance in Cloud Environment

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3025 Improving Data Storage Security and Performance In Cloud Environment Snehal A. Ghogare1, Prof. Varshapriya J. N2 1M.Tech Student, Dept of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India 2 Associate Professor, Dept of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India ---------------------------------------------------------------------------------***------------------------------------------------------------------------------- Abstract - A Most of the existing cloud storageplatformsdo not provide a complete implementation of all security components as well as the performance of system degrades under high concurrent pressure and large-scale environment. Compared to boot from localdisks, bootingfromvolumesoften lead to failure, those are largely due to the low performanceof Cinder. Database, threading model, deployment architecture and other factors will affect the performance ofcinderlargely. Under certain conditions all of these can become a performance bottleneck. We will provide a layer of security to storage systems by extending the OpenStack cloud computing stack to support heterogeneous architectures and accelerators, distributing the storage to each cloudinorder to help everyone to be more convenient to use cinder. Our middleware split a file according to the computing capability of node, being uploaded into segments, encrypting them and then upload each segment to each backend cloud storage. When user want to download a file, system again recreate the original uploaded file and allow downloading it. Key Words: Cloud Storage, Data security, Openstack Cinder, Compute, Storage, Authentication. 1. INTRODUCTION Cloud Service Provider(CSP) is responsible for maintaining and monitoring the out sourced data. Cloud is a public environment where there are many possibilities to attack the data. Data outsourcing brings securityissuesinthecloud while move to storage. Once the data is outsourced to the cloud, CSP is only responsible for maintaining, monitoring and controlling the data.Nowa daysmanyorganizations and enterprises have started to outsource their data to cloud. Cloud is a public environment where there are lots of possibilities to attack the user data. Security is the highest concern in the cloud environment. Outsourced data to the cloud are kept by third party CSP. In this situation, data may be attacked from inside as well as outside the cloud. Data security is ensured by security parameters such as confidentiality,integrityand availability.Thispaperpresents a middleware-oriented framework that integrates different IaaS Storage Clouds. Based on the registered users access token, the middleware does the authentication withtheIaaS cloud frameworks. The middleware relies on a service level manager which decides how to split a file beinguploaded, its encryption and decryption followed by merger for download. The evaluation of the framework shows high improvement in the security as we are distributing the storage as per the computing capability of node and also encrypting the data. In the proposed system, the issue of progressing files to a different user through storage servers is completely under the command of the data owner. The data owneruploads the file which is in turn encrypted and stored in the server. The distributed storage system consists of distributed storage servers and key servers. These key servers are extremely secured by security techniques and performance of system will be improved as the data is distributed according to the computing capability of node so that retrieval time will be minimium. In the existing cloud storage system, digital data is stored in logical pools, the physical storage contains multiple servers or locations, and the hosting company manages physical environment. Storage capacity is given on lease to people and organizations for the storage of different type of data. Cloud storage services are accessible via web services (API) or by applications that utilize the API. Amazon Web Services introduced their cloud storage service. AWSS3isa oneof the first cloud storage supplier. Other cloud storage services arepopularserviceslikeGoogle Drive, Google Cloud Platform, Smugmug, Dropbox, Box and OneDrive. Cloud storage is based on highly virtualized infrastructure. It is a multitenant system with multiple storage devices inside. The storage cloud is built from low cost components for ensuring reliability in thesoftware,and building advanced functionality on top of this foundation. 2. RELATED WORK Some open sourceplatformssuchasSwift(OpenStackcloud), Walrus (Eucalyptus cloud), and Cumulus (Nimbus cloud)are used to analyze the security blocks for the cloud storage platforms. Table 1 explains the security components summary of the instantiations of every platform. Authentication and authorization components provide a adequate security level. Users can make use of different accesscredentialmechanisms(e.g.passwords,certificates)to access the data. In Amazon S3 platform, it provide an Access Control List (ACL) mechanism where owners can assign policies to specific customers, groups and data containers(data bucket). Note, however, that there is still room for improvement in these components. OpenStack provides a manageable interface to cover area of the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3026 authentication andauthorization mechanisms with out need to modify the whole platform. In some caes, ACLs are deficient to fully catch the enterprise environment’s complexity. Approaches such as Role-base Access Control (RBAC) might be integrated.[4][6] Table -1: Summary of Security components of existing cloud storage platforms. Finally, there are various components that are not hold up in most platforms. For instance, existing device authentication/authorization and secure communications components are designed to protect the communications between cloud entities, but they are not used to protect the communications inside the storage subsystem. There is no direct support for storing the credentials in secure and tamper-resistant containers. As for data protection, no platform provides mechanisms that implement data-at-rest encryption. With the exception case of Nimbus platform and (partially ) OpenStack platform, it isimpossibletoimplement specific plugins that provide additional extended services such as proof of storage services.[4][7] 3. PROPOSED METHOD In the proposed system,authentication is to bechecked inan openstack inorder to make only an authenticated user to access the instances created in the cloud. Following are the proposed steps for block encryption 1. Nova API call for volume mount 2. Intercept call and mount volume as a block device to virtualization host. 3. Get Key via a SSL/ TLS connection. 4.Loop and dm-crypt block device 5. Update VM Config for block devices 6. Create VM and start it. Fig -1: Proposed System architecture 4.EXPERIMENT,EVALUATIONANDDISCUSSION 4.1 Openstack block storage: IRJET Instances use an empemeral volume by default. This kind of volume does not save the changes made on it and reverts to its original state when the current user give away control. One of the methods for storing data permanently in openstack cloud is the cinder block storage service. Openstack block storage service consists of four services-  Cinder api  Cinder scheduler  Cinder volume  Cinder backup Cinder api API service provides anHTTPendpointforAPIrequests.Two versions of API are supported and required for the cloud. So Cinder provides six endpoints. The cinder-api verifies the identity requirements for an incoming requestandafterthat routes them to the cinder-volume for action through the message broker. Cinder scheduler Scheduler service reads requests from the message queue and selects the optimal storage provider node to create or manage the volume. Cinder volume The service works with a storage back end through the drivers. The cinder volume gets requests from the scheduler and responds to read and write requests sent to block storage service to maintain state. Cinder Backup We can use several back ends at the same time. For each back end you need one or more dedicated cinder volume
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3027 service cinder backup. The backup service works with the backup backend through the driver architecture. 4.2 Factors that lead to poor performance: We analyse the deployment architecture andfindthefactors that lead to poor performance. Fig -2: Deployment architecture of cinder block storage Following are the factors that lead to poor performance- 1. HA Proxy report error 2. The number of cinder api workers  Cinder api takes longertime toprocesseachrequest under high concurrency pressure.  Database connection driver is implemented beyond eventlet's monkeypatching, blockingdatabasecalls with block eventlet thread 3. Cinder volume has more serious performance issues  very heavy workload  create volume  initialize connection  Cannot consume message timly from MQ  Takes a longer time to process each request 4. Storage driver If the ICSI target information is not stored in a separate file on creation, even a node reboot, your existing volumes on that node will be restored automatically. 5. RBD Rados call may block cinder-volume  rbd and rados liberty are not patched by eventlet  long running tasks block eventlet loop  cinder volume becomes a zombie process 5. CONCLUSION This paper shows how to implement an encrypted cloud storage system on the basis of OpenStack Cinder,andhow to increase the security and performance by analyzing the deployment architecture of cinder. The compatibilityofthis system allows it to be deployed in existing storage systems which uses Cinder as storage technology and provide cinder APIs and Keystone APIs without modifying those existing systems. REFERENCES [1] R. Nivedhaa and J. Jean Justus, "A Secure Erasure Cloud Storage system using Advanced Encryption Standard algorithm and Proxy Re-encryption", IEEE Conference on Communication and Signal Processing (ICCSP) April, 2018. [2] B. Fathima Mary, George Amalarethinam,"Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography", IEEE transaction on data storage 2017. [3] Bin Feng, Cheng Guo, “An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing”, IEEE transaction on cloud computing May, 2016. [4] Roman, R., Felipe, M., Gene, P. and Zhou, “Complying with Security Requirements in Cloud Storage Systems”, Journal of Computers, 11(3), pp.201-206, 2016. [5] N.Saranya, S.Nivedha, “Implementing Authentication in an Openstack Environment”, International Conference on Computer Communication and Informatics (ICCCI - 2016), Jan. 07 – 09, 2016. [6] Pragya Jain, Aparna Datt, S.C. Gupta, “Cloud Service Orchestration based Architecture of OpenStack Nova and Swift ”, Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016. [7] Peidong Sha , Zhixiang Zhu," The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing" ,IEEE 2016. [8] H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. Shen, “Enablingfine-grained multi-keywordsearchsupporting classified sub-dictionaries over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312–325, 2016. [9] Sandeep Nehe, Prof. M.B. Vaidya, “Data Security using Data slicing over storage clouds”, International Conference on Information Processing (ICIP) Vishwakarma Institute of Technology, Dec 16-19, 2015. [10] L S Girish, Dr. H. S. Guruprasad, “Building Private Cloud using OpenStack” , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), volume 5, Issue 3, May-June-2014. [11] Bin S. Suganya, P. Damodharan, “Enhancing Security for Storage Services in Cloud Computing”, International Conference on Current Trends in Engineering and Technology, ICCTET, 2013.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3028 [12] S. Suganya, P. Damodharan, “Enhancing Security for Storage Services in Cloud Computing”, International Conference on Current Trends in Engineering and Technology, ICCTET, 2013. [13] C. Cachin, I. Keidar, and A. Shraer, "Trusting the cloud," ACM STGACT News, vol. 40, no. 2, p. 81, 2009.
  翻译: