Enhanced Data Security Model For Cloud Computing: Presented by
Enhanced Data Security Model For Cloud Computing: Presented by
Enhanced Data Security Model For Cloud Computing: Presented by
Presented By
ABSTRACT
In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. This paper investigates the basic problem of cloud computing data security. We present the data security model of cloud computing based on the study of the cloud architecture. We improve data security model for cloud computing. In this paper we are presenting Three-layered security mechanism.
EXISTING SYSTEMS
In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms
The management of the data and services may not be fully trustworthy
PROPOSED SYSTEM
This paper enhances data security model for cloud computing. We propose a new data .security model based on studying of cloud computing architecture. We Implement software to select the suitable and the highest security encryption algorithm.
ADVANTAGES OF PROPOSED SYSTEM:
Highly Secure
MODULES
1. Three-layer system Construction module 2. Storage data Module 3. Transmission data Module 4. Processing data Module
HARDWARE REQUIREMENTS
PROCESSOR RAM : : PENTIUM IV 2.6 GHz 512 MB DD RAM
HARD DISK
20 GB
SOFTWARE REQUIREMENTS
Technology Tools Used : Jsp,servlets : IDE(Eclipse)
REFERENCE
1.C. Dwork, The Differential Privacy Frontier Extended Abstract, Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444, Springer, 2009, pp. 496-502. 2. C. Gentry, Fully Homomorphic Encryption Using Ideal Lattices, Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
3. E. Naone, The Slow-Motion Internet, Technology Rev., Mar./Apr. 2011; www.technologyreview.com/files/54902/ GoogleSpeed_charts.pdf