Final Synopsis 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

PROJECT SYNOPSIS

“A STUDY OF CRYPTOGRAPHIC
METHOD IN CLOUD
COMPUTING”

A Project proposal submitted to


INDIRA GANDHI NATIONAL OPEN UNIVERSITY, New Delhi
Of
Master of Science (Mathematics with Applications in
Computer Science)
MMTP- 001

BY
SONALI KOTHIYAL
Roll no. – 200398994

Under the guidance of


DR. AWADHESH KUMAR MISHRA
(Assistant Professor, Dayal Singh College, DU, and
Counselor IGNOU Study Centre, Maharaja Agrasen College, DU)
CONTENTS

1. PROJECT PROPOSAL FORM A 3

2. SUPERVISOR RESUME

3. INTRODUCTION

4 TYPES OF CLOUD COMPUTING ON THE BASIS OF


DEPLOYMENT MODEL

5. CRYPTOGRAPHY

6. CLOUD SECURITY CHALLENGES

7. METHODOLOGY USED

8. UTILITY AND SCOPE OF CRYPTOGRAPHY


IN CLOUD COMPUTING AND ITS FUTURE USE.

9. CONCLUSION

10. DECLARATION

11. BIBLIOGRAPHY
SUPERVISOR RESUME
DR. AWADHESH KUMAR MISHRA

PUBLICATIONS:
 Awadhesh Kumar Mishra, R.K.Shrivastava (2014): “Queuing Analysis of a
Machine Repair System with Warm Spares and Multiple N-Policy Vacations for
Repairmen” International Journal of Mathematical Sciences,(IJMS), Vol.13,
no.1-2., pp. 125-137. (ISSN: 0972-754X).
 R.K.Shrivastava, Awadhesh Kumar Mishra (2014): “Analysis of Queuing
 Model for Machine Repairing System with Bernoulli Vacation Schedule”
 International Journal of Mathematics Trends and Technology,(IJMTT),
Vol.10,no.2,pp.85-92.(ISSN):2231-5373.
 R.K.Shrivastava, Awadhesh Kumar Mishra: “Queuing Model for Machine
 Interference Problems” Submitted to, MR International Journal of
Engineering and Technology, (2014)
 R.K.Shrivastava, Awadhesh Kumar Mishra: “E-Governance in Higher
Education and in Cryptography” National Seminar, 22-13 Jan., 2014, Govt.
Science College, Jiwaji University, Gwalior, (M.P), India.
 Dr.R.P.Awasthi, S.L.Chakrawarti, Awadhesh Kumar Mishra (2006): CDS
Manual, H.G. Publications New Delhi. (ISBN: 8189172-28X).
 Rawat B.S., Bhupendra Kumar Singh, Awadhesh Kumar Mishra(2005):
“UGC-CSIR Compulsory Paper-I, (Jupiter Series), H. G .Publications, New
Delhi. (ISBN: 8186351639).
 Dr. Renu Sharma, Awadhesh Kumar Mishra (2004): “Mathematical
 Sciences”(Jupiter Series), H.G. Publications, New Delhi. (ISBN:
8189172093).
CONFERENCES / SEMINARS: (PRESENTED /
PARTICIPATED AND ORGANIZED):
 Participated in National level workshop on CRYPTOGRAPHY: A
RECENT TREND IN MATHEMATICS Organized by Department of
Mathematics held at RAMLAL Anand College (DU), during November 09,
2022.
 Presented title:- Higher Education in NEP-2020, in the National
Conference on the Future of Indian Science and Technology in the Context
of the New Education Policy held on 25th March 2021, organized by Dr.
B.R. Ambedkar Government
Degree College, Mainpuri (U.P)-205001. Dept. of Higher Education, Govt of
UP.
 Presented a paper in the National Conference on Recent Trends in
Mathematical Modeling and Soft Computing Techniques, title of Paper:
“Queuing Model for Machine Interference Problems” held on 29th March, 2014,
organized by Department of Mathematics, Manav Rachna International
University, Faridabad, India.
 Presented a paper in the National Seminar title of paper: “E-governance
in Higher Education and in Cryptography” held on 22-23 Jan 2014,
organized by Govt. Science College, Jiwaji University, Gwalior, (M.P),
India.
 Participated in the National Conference On Mathematical and
Computational
Modelling (MCM-2013) held on 24-26 May, 2013.Organised by Dept. of
Mathematics , Institute of Basic Sciences Khandari, Dr. B.R. Ambedkar
University, Agra 282002, U.P. India
 Attended the National Seminar on Management of Waste from Electronics
and Renewable Energies held on 29-30th January 2010, at Bhaskaracharya
College of Applied Sciences, University of Delhi.
 Participated National Meet on History of Mathematical Sciences
(NMHMS- 2010) during January 7-9, 2010 held at conference centre,
University of Delhi.
 Participated International Conference on “Recent Trends in Mathematics
and its Applications” (ICR TMA-09) March 30-31; 2009 at Department
of Mathematics Jamia Millia Islamia(JMI), New Delhi-25, India.
 Participated Pre-ICM International Convention on Mathematical Sciences
held at Department of Mathematics, University of Delhi, during 18- 20
December, 2008. Organised (as a member) UGC- Sponsored National
Seminar on Recent
 Researches in Physical Educations & Sports held at University of Delhi,
during November 05-06, 2008
 Participated International Conference on Operator Theory and Related
Areas(ICOTRA-2008) held at New Conference Hall, organized by Department
of Mathematics, University of Delhi, during Jan 09-12, 2008.

Areas of Interest / Specialization :


Cryptography, Number Theory, Complex Analysis, Queuing Theory

TEACHING EXPERIENCE:
 Worked as Ad-hoc Lecturer in Mathematics, Maharaja Agrasen
College(M.A.C.), University of Delhi, from Nov. 2006 to April 2009.
 Worked as Lecturer in Mathematics, Satya College of Engineering and 3
Technology (S.C.E.T.), Palwal, Haryana, from 2010 to 2011.
 Worked as Guest Assistant Professor, Dayal Singh College, University of
Delhi from September 2018 to December 2018, Feb. 2021 to Aug. 2021.
 Working as Assistant Professor Dayal Singh College, ( University of
Delhi )from Nov. 2021 to ongoing.
 Counselor IGNOU STUDY CENTER : MAHARAJA AGRASEN
COLLEGE(DU) Vasundhara Enclave, Delhi-96, Since 2008
to ongoing.

MEMBERSHIP OF SCIENTIFIC BODIES: IAENG (International


Association of Engineers).
 IACSIT (International Association of Computer Science and Information
Technology).
 JSDIA (International Journal of Secure Digital Information Age).
Educational Qualifications :
 Ph.D. (Mathematics), (2015), Jiwaji University, Gwalior, India. Thesis
Title: “A Study of Queuing Models for Machine Repairing System”
 M. Phil. (Mathematics), Institute of Basic Science, Khandari, Agra, Dr.
Bhim Rao Ambedkar University, Agra, in the Year 2001. Marks
obtained: 653/1000.
 Dissertation Title: Specialization (Cryptography), "Some Blind Signature
Schemes
 M.Sc. (Mathematics), St. John's College, Agra, Dr. Bhim Rao Ambadkar
University Agra, in the Year 1997
 B.Sc. (Physics, Chemistry, Mathematics), Agra University, Agra,
intheYear1994.
 Intermediate, Board of High School and Intermediate Education, U.P., in
the Year 1991.
 High School, Board of High School and Intermediate Education, U.P.,
intheYear1989.
DECLARATION: I, Awadhesh Kumar Mishra, hereby declare that all
statements made in this C.V., are true, complete and correct to the best of my
knowledge and belief.
Awadhesh Kumar Mishra
1.INTRODUCTION

CLOUD COMPUTING

Cloud computing can be described as accessing information over the internet

without deploying additional infrastructure. It is providing on demand services

over the internet.It started getting prominence in early 2000, but people found it

tough to get their head around what cloud computing really was.

Cloud computing can refer to business intelligence (BI), complex event

processing (CEP), service-oriented architecture (SOA), Software as a Service

(SaaS), Web-oriented architecture (WOA), and even Enterprise 2.0. With

people getting more acquainted to platform like google mail, drop box, google

photo’s etc. [3]. With increasing digitization and increasing needs google,

amazon, etc have started increasing their capacities and building server farm to

store information of the clients. All the big companies have started investing in

billions to increase their server space.

Suppose you are running a company and you cannot store all the data of all the

employees in the company, therefore you can hire someone that can save your

data in the remote system and you can access it only whenever you need it.

Such services are provided by cloud providers ex-amazon AWS, azure, etc
1.a Types of cloud computing on the basis of deployment model

are:

1.b SERVICE MODEL OF CLOUD COMPUTING

IAAS (INFRASTRUCTURE AS A SERVICE)- Here the cloud provider will

provide you the infrastructure and you can use it to your advantage and can

design and use it as per your requirement. Example- AWS (Amazon web

services)

PaaS (PLATFORM AS A SERVICE)- Here hardware and the software is

provided by the third party. It provides runtime environment for application and

its development. Ex- azure,the app engine of google, force.com, etc. [6]

SaaS (SOFTWARE AS A SERVICE)- It is hosted on a central basis. It is the

way of delivering services and application over the internet. Hardware and

software maintenance managed by the vendor so we do not need to worry about

it.
2.Cryptography

It is a method to keep your information safe and secure by communication

codes so that for only whom the information is intended can understand it. The

prefix “crypt” means hidden and the suffix “graphy” means writing. These

methods are used to protect information that are obtained from mathematical

concepts and a set of rule based calculations which are known as algorithm. [2]

The art of protecting information by transforming information into an

unreadable format so that for only whom the information is intended to receive

can decipher it. The earliest known example of cryptography dates back to 1900

BC when the Egyptian king Ramses II hid a message within the fold of the

pharaoh’s robe.

Modern cryptography, however can largely be traced back to communications

during world war II . The need for secure communication arose when the allied

forces discovered that the axis power had broken their codes.
3.CLOUD SECURITY CHALLENGES

From a system where everything was centralized and connected, we are now

moving to a system that is decentralized exactly how cloud computing works.

We save our information in a faraway database and access it only when we need

it. But the problem is that user is in no control of data [5]. The only mode of

communication between the cloud providers and the user is internet. The

following are the major challenges in cloud computing-:

1. Confidentiality of the Data

2. Non-repudiation of the Data

3. Privacy

4. Secure Communication

5. Hijacking of Accounts

6. Unsecure Third Party Resources

7. Trust Management

8. Heterogeneity

9. Accounting

10. Service Legal Agreement


4. METHODOLOGY USED-

 SYMMETRIC ALGORITHM

 DES[DATA ENCRYPTION STANDARD]

 KEY MANAGEMENT

 ADVANCED ENCRYPTION SYSTEM

 BLOWFISH

 ASSYMETRIC ALGORITHM

 RIVEST SHAMIR ADLEMAN ALGORITHM[RSA]

 ELLIPTIC CURVE CRYPTOGRAPHY

 ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM[ECDSA]

 EDWARDS CURVE DIGITAL SIGNATURE ALGORITHM[EdDSA]

 HASH FUNCTION

 DIFFIE HELLMAN KEY EXCHANGE


5. UTILITY AND FUTURE SCOPE OF CLOUD COMPUTING

The future scope of cloud computing security using cryptography is vast and

promising. Cryptography is a powerful tool for securing cloud computing

environments, and it is likely to play an increasingly important role in cloud

security in the future. Some ways in which cryptography is expected to shape

the future of cloud computing security are:

 Quantum-resistant cryptography

 Homomorphic encryption

 Secure multi-party computation

 Blockchain-based security

 Security for IoT and edge computing

 Security for 5G networks


6.CONCLUSION

In conclusion, cryptography is a crucial tool for securing cloud computing


environment. With the increasing adoption of the cloud services, there is a
growing need to ensure that sensitive data is protected from unauthorized
access,theft and other security threats. . By using cryptography, cloud
computing users can ensure that their data is protected from unauthorized access,
even if it is stored and processed on shared infrastructure. Moreover,
cryptography can be used to enable secure data sharing and collaboration ,
enabling multiple parties to access and work with sensitive data without
compromising its security.

Through this project I will learn the various cryptographic methods that are
used in cloud computing to secure data transmission as well as storing data
safely and efficiently using mathematics to encrypt and decrypt data.I will also
learn that what are the ongoing studies and experiments underway and what are
the future technological developments and how different method like digital
signature, elliptic curve cryptography are being used to secure data.

DECLARATION

I hereby declare that this synopsis/project entitled “A STUDY OF


CRYPTOGRAPHIC METHOD IN CLOUD COMPUTING” has been
prepared by me under the guidance of Dr.Awadhesh Kumar Mishra, Assistant
Professor, Dayal Singh College, DU, and
Counselor IGNOU Study Centre, Maharaja Agrasen College, DU.

I also declare that this project is the outcome of my own effort and that it has
not been submitted to any other university for the award of any degree.
Bibliography

[1] A RELATIVELY EASY TO UNDERSTAND PRIMER ON ELLIPTIC CURVE


CRYPTOGRAPHY.
[2] A.ATAYERO and O.Feyisetan(2011), "Security issues in cloud
computing:the potentials of homomorphic encryption," Emerging trend
in communication and information science, pp. 546-552,.
[3] A. Kutt and K.Papamilitiadis(2012), "COMMUNICATION SYSTEM AND
METHOD,".
[4] A. Jangra and R. bala(2013), "PASA:PRIVACY-Aware security algorithm
for cloud computing," springer, pp. 487-497.
[5] A. A. Nyre, S. Alapnes,G. Zhao. M. G. Jaatun, "A Farewell to trust: An
approach to confidentiality control in the clouds," pp. 1-5.
[6] A. Dhami, P. Bansal, T.Singh, T. K. Chakraborty, "Enhanced public
auditability and secure data storage in cloud computing".
[7] B. Goswami, and D. S. Singh(2012), "Enhancing Security in cloud
computing using public key cryptography with matrices," International
Journal of Engineering Research and Applications, vol. 2, no. 4, pp. 339-
344, 2012.
[8] C.Rong, J.Li, F.Zhang and G. Zhao, "Trusted data sharing over untrusted
cloud storage providers," pp. 97-103.
[9] D. Nunez, G. Giammatteo,I. Agudo(2011), "Cryptography goes to the
Cloud," Secure and trust computing,data management and
app[lications," springer, pp. 190-197.
[10] D. Eyers and G. Russello, "Towards unified and flexible security policies
enforceable with cloud," pp. 181-186.
[11] E. Gourova, A. ANTONOVA and N. Roumen, "EXTENDED ARCHITECTURE
OF KNOWLEDGE MANAGEMENT SYSTEM WITH WEB 2.0
TECHNOLOGIES.".
[12] F. Kerschbaum(2013), "Searching over encrypted data in cloud
systems," in Access Control models and technologies, amsterdam.
[13] F. Rocha and M. Correia, "Lucy in the sky without diamonds:stealing
confidential data in the cloud".
[14] G. Ercolani(2013), "Cloud Computing Services Potential Analysis:An
integrated model for evaluating software as a service," pp. 77-80.
[15] G. Su,W. Xiaoyun and Z. Yuan, "Contrast study on two kinds of SIP
Trunking Route Scheme based IMS Network," pp. 1213-1218.
[16] K. Rauber(2013), "CLOUD CRYPTOGRAPHY," International Journal of
pure and applied mathematics, vol. 85, pp. 1-11, 2013.
[17] L. Rodero-Merino, L. M. Vaquero(2008) and J. Caceres, and M.Linder,
"A break in the cloud : towards a cloud definition," ACM SIGCOMM
Computer Communication review, vol. 39, pp. 50-55.
[18] M. Sudha(2012), "Enhanced Security framework to ensure data security
in cloud computing using cryptography," Advances in computer science
and its application, vol. 1, pp. 32-37, 2012.
[19] M. Van Dijk, and A. Juels(2010), "On the impossibility of cryptography
Alone for privacy-preserving cloud computing," IACR CRYPTOLOGY
ePRINT Archives, p. 305.
[20] P. S. Sanyal(2013), "Cloud computing-An Approach with Modern
Cryptography," in arXIV:1303.1048, 2013.
[21] R. Paul(2012), "checkpoint-based Intelligent Fault tolerance for Cloud
Service Providers," International Journal of computers and distributed
systems, vol. 2, pp. 59-64, .
[22] S. Hiller and T. Pattison(2013), "microsoft share point," microsoft
press.
[23] S. Bugiel, H. Ideler, S. Nurnberger,S. Bleikertz and A. R. Sadeghi,
"CLIENT CONTYROLLED CRYPTOGRAPHY AS A SERVICE IN THE CLOUD".
[24] S. Inuganti, S. Muppidi and V. Gampala(2012), "Data Security in cloud
computing with elliptic curve cryptography," INTERNATIONAL JPURNAL
OF SOFT COMPUTING AND ENGINEERING(IJSCE),ISSN, pp. 2231-2307.
[25] T. Shekhar Kar,K. Wazed Nafi, S.Ainsul Hoque and M.Hashem (2013), "A
Newer User Authentication, File encryption and Disturbed server based
cloud computing security architecture," .
[26] V.Ustimenko, and A. Wroblewska(2013), "On some alebraic aspects of
data security in cloud computing," in Proceedings of applications of
computer algebra ACA , Malaga.
[27] W.Luo, S. Xu, and M.Yung and Y. Dodis, "Key insulated symmetric key
cryptography and mitigating attacks against cryptographic cloud
software," pp. 57-58.
[28] W. Mao, "The role and effectiveness of cryptography in network
virtualization," a position paper, p. 1790182.
[29] Y. Zheng, Public Key Cryptography for Mobile Cloud, spring berlin
heidelberg, 2013, pp. 435-435.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy