You are on page 1of 14

Proposal for Final Year Project

Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

Proposal / Application
For
Final Year Project
Computer & Information Systems Engineering Department

SECURED AND OPTIMIZED SOLUTION FOR ACCESSING


CLOUD

Muhammad Usman (CS-12108)


Syed Saad Ahmed (CS-12057)
Muhammad Yasir Junaid (CS-12033)
Erum Rizvi (CS-12032)

NED University of Engineering & Technology


Page 1 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

1.

NED University of Engineering & Technology

Project Identification
A.

Reference Number(for office use only)


C

B.

Project Title
Secured and optimized solution for accessing cloud

C.

Project Internal Advisor

D.

Name

Dr. Muhammad Ali Ismail

Designation

Associate Professor

Project Internal Co-Advisor


Name
Muhammad Faraz Haider
Designation

E.

Project External Advisor

F.

Designation

Organization

Mobile #

Email

Roll No.

Name

Email

1.

CS-12108

Muhammad Usman

umuhammad202@yahoo.com

2.

CS-12057

Syed Saad Ahmed

syedsaadahmed2094.sa@gmail.com

3.

CS-12033

Muhammad Yasir Junaid

myasirjunaid16@gmail.com

4.

CS-12032

Erum Rizvi

erumrizvi27@gmail.com

Sponsoring Organization
Null

H.

Student Team

S. No.

G.

Name

Keywords

General purpose-Graphic processing unit (GP-GPU)


Data security
Cryptography
AES Algorithm
Cloud Computing
CUDA

Page 2 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

I.

NED University of Engineering & Technology

Project Idea
New
to a previous project

2.

Abstract
Data security is a major challenge in cloud computing environment. In order to ensure the
secure transfer and retrieval of users data between user and the cloud, modern encryption
techniques are used. These encryption techniques will be established at user end as well
as in the GP-GPU. The GP-GPU will be deployed as a trusted third party security
provider. When the user shares his or her data, or transfers it on the cloud, it gets
encrypted immediately in order to prevent any side channel attacks that might occur
during the transfer. Once the data reaches the GP-GPU, it is re-encrypted using modern
cryptographic algorithm. This double encryption ensures the ultimate security of users
data. After that, the data is transferred from the GP-GPU to the cloud where it is kept
encrypted, keeping it safe from any possible harmful attacks.
When the user needs the data, it is retrieved from the cloud and the key for decryption of
that data is provided by a random key generator which is deployed along with GP-GPU.
The purpose of this key generator is to generate the keys which shall be used for reencrypting users data as well as for decrypting it. This key generator has access only to
the users re-encryption key, but it is unable to learn anything or get any information
about the cipher-text.
The re-encryption is basically done by using the combination of users public key and
private key which will generate another key that will allow the GP-GPU to do reencryption.

3.

Project Background and Literature Review


GP-GPUs are used for General purpose computing i.e. to use the graphics processing unit
to perform the computational application that is done by CPU. Recently, many
researchers have been working on exploiting the use and application of GP-GPU
techniques to accelerate the cryptographic algorithms to provide security. The increase in
computational parameters impose a great challenge for the core processor, but the GPUs
provide a high performance environment for cryptography. For modern hardware,
making a single cryptographic computation is not a hard task, however in a different
scenario where there are endless number of users placing their data on cloud, and
demanding fast access to download or retrieve their data from the cloud, these hardware
might malfunction. As a result dedicated GP-GPUs can be deployed with AES encryption
algorithm which will provide fast access to user, while securing his or her data from
malicious users.

Page 3 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

The challenges faced in order to ensure maximum security allow us to look towards the
GP-GPU for fast and optimized cryptographic solution to make users data secure on
cloud. We aim to provide this facility by implementing the core operations of GP-GPUs
for advanced encryption algorithms. We will be making use of Nvidias GPU series,
along with its new GP-GPU interface CUDA. The inherent parallel architecture of GPU
is the base of GPUs core computational power. For this, the thread is introduced by the
CUDA framework as the smallest unit of parallelism, a small piece of concurrent code
with associated state. Algorithms are designed to achieve optimal performance using
CUDA, by running in a multitude of parallel threads. It also takes advantage of the
presented hierarchical memory mode.
4.

Motivation and Need


One of the most critical concerns in the deployment of public cloud is the security of
users private and important data, especially for big enterprises and government agencies
having sensitive data. Currently a large number of cloud service providers are unable to
provide maximum security to the user. However in the real world, it is very improbable
that the big companies like Amazon, MegaNZ, Google or Microsoft will try to penetrate
the users data without getting permission from them. But the main threat usually might
come from different users and administrators who might cross the boundary maliciously
in order to access other users data.
Amazon.com's wireless retail site experienced a cross-site scripting attack in April 2010
that allowed the attackers to hijack customer credentials as they came to the site.
In order to protect users data for simple data storage on cloud, we make use of this
highly encrypted system which will provide maximum security to protect the data from
such malicious attacks and threats, by making use of different encryption schemes and
General Purpose GPUs. Since GP-GPUs are powerful and fast computational devices,
our motivation is to develop a general security solution for cloud based service providers,
by using the high security algorithms with GP-GPUs.

5.

Objectives
Privacy is one of the critical concerns that hinder the adoption of public cloud. For simple
application, like storage of data, encryption can be used to protect user's data. But for big
data processing on cloud, there is no satisfying solution for the security of Data.
The objective of this project is to provide a secure and complete security solution for fast
processing of Data between user and cloud service provider. The hardware security
solution which we will be providing is a trusted hardware module which works as a third
party between cloud service provider and user. The main objective will be accomplished
using hardware and Different advanced cryptographic algorithms.
Page 4 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

6.

NED University of Engineering & Technology

Methodology and Equipment/Tools


Software tools and related hardware components will be required for this project.
Software tools will be utilized for implementing the cryptographic algorithms at user end
and at our third party processing unit.
The flow of working will be as follows;

Data will be submitted by user in encrypted form, encryption at user end will be done
using certain algorithm. This will be termed as Lighter-level Encryption.
The processing unit retrieves bulk of data from user end and it performs another layer
of encryption on the given data which is termed as Heavy-level Encryption.
After the double layer encryption of data from processing unit, it will store the
respective data onto the cloud.
After the data is stored onto the cloud, if the user requested the required data, the
processing unit will fetch the respective data from cloud and show it to user.

The encryption of data that will be done at user end and by the processing unit will be
done in an optimized and smart manner.
Expected Equipment that will be used in FYP:

Hardware:
GP-GPU (General Purpose Graphics Processing Unit): GPGPU applications do
General-Purpose computing on a GPU, where GPU is the processing unit of a video card.
Modern video cards can do much more than displaying graphics. They can perform
complex computations, much like an ordinary processor (CPU).

Open-Stack Based CIS Cloud (open source): Open source CIS cloud is a cloud that
uses freely available source code to build and manage a private cloud platform.

Software:
CUDA is an excellent framework to start with. It lets you write GPGPU kernels in C. The
compiler will produce GPU microcode from your code and send everything that runs on
the CPU to your regular compiler. You can call CUDA programs from C, C++,
FORTRAN, or Python. There are also many more language bindings to call CUDA
programs (or actually their kernels) from other languages.
Page 5 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

OpenCL allows portability with some effort- across vendors, and even across widely
differing types of hardware, both current and future (HSA-enabled hardware for example
looks very promising). It runs well on NVIDIA & AMD GPUs. OpenCL only allows you
to write kernels (single functions that can be called from your regular code) in a C
dialect.

Java (SOAP / RESTFUL API) Simple Object Access Protocol (SOAP) is a standard
protocol specification for message exchange based on XML. Communication between
the web service and client happens using XML messages.

Block Diagram:

Encrypted Data from User (Lighter-level Encryption)


Encryption/Decryption at GP-GPU (Higher-level Encryption)

Page 6 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

Flow Diagram :

User Inputs Data in


Encrypted Form
(Lighter-level Encryption)

GP-GPU Based Processing for


Encryption/Decryption
(Higher-level Encryption)

Final Encrypted Data Storage


to Cloud by GP-GPU

Required Data
Retrieval from
GP-GPU

Decryption of the user


requested Data and submission
of Data to User

Page 7 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

7.

Key Milestones and Deliverables


No.

Elapsed time (in months)


from start of the project

1.

1 month

Learning and exploring


GP-GPU.

Design Document

2.

2 month

Configuration of first GP-GPU


based system.

Progress Report

3.

3 month

Implementation of AES
Algorithm.

Code Modules

4.

5 month

Interface between User and


Encryption server.

Progress Report

5.

6 month

Interface between Encryption


server and Cloud.

Mid-Year Presentation

7 month

Integration and Validation.

User Interface

8 month

Presentation and Preparation.

Security module

11 month

Final Documentation and


Report.

FYP Report and Research


Paper

6.
7.
8.

8.

NED University of Engineering & Technology

Milestone

Deliverables

Expected Outcome
The GPUs uniquely integrates with re-encryption so that users can utilize the capabilities
of cloud computing while keeping the privacy of their data. The main approach here is to
leverage the usage of modern GP-GPU frameworks in providing an accelerated
cryptographic algorithm using the full capabilities of modern GP-GPUs. The processing
of users data to make it secure and optimized will be done by using numbers of GP-GPUs
and advanced encryption algorithms.

9.

Direct Customers / Beneficiaries of the Project

This project is useful for:

CIS cloud users


Ecommerce applications
Intelligence and security sector
Organizations using public or even private cloud.

Page 8 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

10.

11.

NED University of Engineering & Technology

Consent of Advisors
Consent of the Internal Advisor

Signature:

Consent of the Co-Internal Advisor

Signature:

Consent of the External Advisor (if any)

Signature:

Reviewers Committees Comments

Page 9 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

12.

NED University of Engineering & Technology

Project Schedule / Milestone Chart

Page 10 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

Page 11 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

Page 12 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

NED University of Engineering & Technology

Page 13 of 14

Proposal for Final Year Project


Department of Computer & Information Systems Engineering

13.

NED University of Engineering & Technology

Project Approval Certificate

Recommendation of FYP Coordinator

Signature:

Approval by the Chairman

Signature:

Page 14 of 14

You might also like