Final Synopsis 1
Final Synopsis 1
Final Synopsis 1
“A STUDY OF CRYPTOGRAPHIC
METHOD IN CLOUD
COMPUTING”
BY
SONALI KOTHIYAL
Roll no. – 200398994
2. SUPERVISOR RESUME
3. INTRODUCTION
5. CRYPTOGRAPHY
7. METHODOLOGY USED
9. CONCLUSION
10. DECLARATION
11. BIBLIOGRAPHY
SUPERVISOR RESUME
DR. AWADHESH KUMAR MISHRA
PUBLICATIONS:
Awadhesh Kumar Mishra, R.K.Shrivastava (2014): “Queuing Analysis of a
Machine Repair System with Warm Spares and Multiple N-Policy Vacations for
Repairmen” International Journal of Mathematical Sciences,(IJMS), Vol.13,
no.1-2., pp. 125-137. (ISSN: 0972-754X).
R.K.Shrivastava, Awadhesh Kumar Mishra (2014): “Analysis of Queuing
Model for Machine Repairing System with Bernoulli Vacation Schedule”
International Journal of Mathematics Trends and Technology,(IJMTT),
Vol.10,no.2,pp.85-92.(ISSN):2231-5373.
R.K.Shrivastava, Awadhesh Kumar Mishra: “Queuing Model for Machine
Interference Problems” Submitted to, MR International Journal of
Engineering and Technology, (2014)
R.K.Shrivastava, Awadhesh Kumar Mishra: “E-Governance in Higher
Education and in Cryptography” National Seminar, 22-13 Jan., 2014, Govt.
Science College, Jiwaji University, Gwalior, (M.P), India.
Dr.R.P.Awasthi, S.L.Chakrawarti, Awadhesh Kumar Mishra (2006): CDS
Manual, H.G. Publications New Delhi. (ISBN: 8189172-28X).
Rawat B.S., Bhupendra Kumar Singh, Awadhesh Kumar Mishra(2005):
“UGC-CSIR Compulsory Paper-I, (Jupiter Series), H. G .Publications, New
Delhi. (ISBN: 8186351639).
Dr. Renu Sharma, Awadhesh Kumar Mishra (2004): “Mathematical
Sciences”(Jupiter Series), H.G. Publications, New Delhi. (ISBN:
8189172093).
CONFERENCES / SEMINARS: (PRESENTED /
PARTICIPATED AND ORGANIZED):
Participated in National level workshop on CRYPTOGRAPHY: A
RECENT TREND IN MATHEMATICS Organized by Department of
Mathematics held at RAMLAL Anand College (DU), during November 09,
2022.
Presented title:- Higher Education in NEP-2020, in the National
Conference on the Future of Indian Science and Technology in the Context
of the New Education Policy held on 25th March 2021, organized by Dr.
B.R. Ambedkar Government
Degree College, Mainpuri (U.P)-205001. Dept. of Higher Education, Govt of
UP.
Presented a paper in the National Conference on Recent Trends in
Mathematical Modeling and Soft Computing Techniques, title of Paper:
“Queuing Model for Machine Interference Problems” held on 29th March, 2014,
organized by Department of Mathematics, Manav Rachna International
University, Faridabad, India.
Presented a paper in the National Seminar title of paper: “E-governance
in Higher Education and in Cryptography” held on 22-23 Jan 2014,
organized by Govt. Science College, Jiwaji University, Gwalior, (M.P),
India.
Participated in the National Conference On Mathematical and
Computational
Modelling (MCM-2013) held on 24-26 May, 2013.Organised by Dept. of
Mathematics , Institute of Basic Sciences Khandari, Dr. B.R. Ambedkar
University, Agra 282002, U.P. India
Attended the National Seminar on Management of Waste from Electronics
and Renewable Energies held on 29-30th January 2010, at Bhaskaracharya
College of Applied Sciences, University of Delhi.
Participated National Meet on History of Mathematical Sciences
(NMHMS- 2010) during January 7-9, 2010 held at conference centre,
University of Delhi.
Participated International Conference on “Recent Trends in Mathematics
and its Applications” (ICR TMA-09) March 30-31; 2009 at Department
of Mathematics Jamia Millia Islamia(JMI), New Delhi-25, India.
Participated Pre-ICM International Convention on Mathematical Sciences
held at Department of Mathematics, University of Delhi, during 18- 20
December, 2008. Organised (as a member) UGC- Sponsored National
Seminar on Recent
Researches in Physical Educations & Sports held at University of Delhi,
during November 05-06, 2008
Participated International Conference on Operator Theory and Related
Areas(ICOTRA-2008) held at New Conference Hall, organized by Department
of Mathematics, University of Delhi, during Jan 09-12, 2008.
TEACHING EXPERIENCE:
Worked as Ad-hoc Lecturer in Mathematics, Maharaja Agrasen
College(M.A.C.), University of Delhi, from Nov. 2006 to April 2009.
Worked as Lecturer in Mathematics, Satya College of Engineering and 3
Technology (S.C.E.T.), Palwal, Haryana, from 2010 to 2011.
Worked as Guest Assistant Professor, Dayal Singh College, University of
Delhi from September 2018 to December 2018, Feb. 2021 to Aug. 2021.
Working as Assistant Professor Dayal Singh College, ( University of
Delhi )from Nov. 2021 to ongoing.
Counselor IGNOU STUDY CENTER : MAHARAJA AGRASEN
COLLEGE(DU) Vasundhara Enclave, Delhi-96, Since 2008
to ongoing.
CLOUD COMPUTING
over the internet.It started getting prominence in early 2000, but people found it
tough to get their head around what cloud computing really was.
people getting more acquainted to platform like google mail, drop box, google
photo’s etc. [3]. With increasing digitization and increasing needs google,
amazon, etc have started increasing their capacities and building server farm to
store information of the clients. All the big companies have started investing in
Suppose you are running a company and you cannot store all the data of all the
employees in the company, therefore you can hire someone that can save your
data in the remote system and you can access it only whenever you need it.
Such services are provided by cloud providers ex-amazon AWS, azure, etc
1.a Types of cloud computing on the basis of deployment model
are:
provide you the infrastructure and you can use it to your advantage and can
design and use it as per your requirement. Example- AWS (Amazon web
services)
provided by the third party. It provides runtime environment for application and
its development. Ex- azure,the app engine of google, force.com, etc. [6]
way of delivering services and application over the internet. Hardware and
it.
2.Cryptography
codes so that for only whom the information is intended can understand it. The
prefix “crypt” means hidden and the suffix “graphy” means writing. These
methods are used to protect information that are obtained from mathematical
concepts and a set of rule based calculations which are known as algorithm. [2]
unreadable format so that for only whom the information is intended to receive
can decipher it. The earliest known example of cryptography dates back to 1900
BC when the Egyptian king Ramses II hid a message within the fold of the
pharaoh’s robe.
during world war II . The need for secure communication arose when the allied
forces discovered that the axis power had broken their codes.
3.CLOUD SECURITY CHALLENGES
From a system where everything was centralized and connected, we are now
We save our information in a faraway database and access it only when we need
it. But the problem is that user is in no control of data [5]. The only mode of
communication between the cloud providers and the user is internet. The
3. Privacy
4. Secure Communication
5. Hijacking of Accounts
7. Trust Management
8. Heterogeneity
9. Accounting
SYMMETRIC ALGORITHM
KEY MANAGEMENT
BLOWFISH
ASSYMETRIC ALGORITHM
HASH FUNCTION
The future scope of cloud computing security using cryptography is vast and
Quantum-resistant cryptography
Homomorphic encryption
Blockchain-based security
Through this project I will learn the various cryptographic methods that are
used in cloud computing to secure data transmission as well as storing data
safely and efficiently using mathematics to encrypt and decrypt data.I will also
learn that what are the ongoing studies and experiments underway and what are
the future technological developments and how different method like digital
signature, elliptic curve cryptography are being used to secure data.
DECLARATION
I also declare that this project is the outcome of my own effort and that it has
not been submitted to any other university for the award of any degree.
Bibliography