Professional Documents
Culture Documents
Proposal / Application
For
Final Year Project
Computer & Information Systems Engineering Department
1.
Project Identification
A.
B.
Project Title
Secured and optimized solution for accessing cloud
C.
D.
Name
Designation
Associate Professor
E.
F.
Designation
Organization
Mobile #
Roll No.
Name
1.
CS-12108
Muhammad Usman
umuhammad202@yahoo.com
2.
CS-12057
syedsaadahmed2094.sa@gmail.com
3.
CS-12033
myasirjunaid16@gmail.com
4.
CS-12032
Erum Rizvi
erumrizvi27@gmail.com
Sponsoring Organization
Null
H.
Student Team
S. No.
G.
Name
Keywords
Page 2 of 14
I.
Project Idea
New
to a previous project
2.
Abstract
Data security is a major challenge in cloud computing environment. In order to ensure the
secure transfer and retrieval of users data between user and the cloud, modern encryption
techniques are used. These encryption techniques will be established at user end as well
as in the GP-GPU. The GP-GPU will be deployed as a trusted third party security
provider. When the user shares his or her data, or transfers it on the cloud, it gets
encrypted immediately in order to prevent any side channel attacks that might occur
during the transfer. Once the data reaches the GP-GPU, it is re-encrypted using modern
cryptographic algorithm. This double encryption ensures the ultimate security of users
data. After that, the data is transferred from the GP-GPU to the cloud where it is kept
encrypted, keeping it safe from any possible harmful attacks.
When the user needs the data, it is retrieved from the cloud and the key for decryption of
that data is provided by a random key generator which is deployed along with GP-GPU.
The purpose of this key generator is to generate the keys which shall be used for reencrypting users data as well as for decrypting it. This key generator has access only to
the users re-encryption key, but it is unable to learn anything or get any information
about the cipher-text.
The re-encryption is basically done by using the combination of users public key and
private key which will generate another key that will allow the GP-GPU to do reencryption.
3.
Page 3 of 14
The challenges faced in order to ensure maximum security allow us to look towards the
GP-GPU for fast and optimized cryptographic solution to make users data secure on
cloud. We aim to provide this facility by implementing the core operations of GP-GPUs
for advanced encryption algorithms. We will be making use of Nvidias GPU series,
along with its new GP-GPU interface CUDA. The inherent parallel architecture of GPU
is the base of GPUs core computational power. For this, the thread is introduced by the
CUDA framework as the smallest unit of parallelism, a small piece of concurrent code
with associated state. Algorithms are designed to achieve optimal performance using
CUDA, by running in a multitude of parallel threads. It also takes advantage of the
presented hierarchical memory mode.
4.
5.
Objectives
Privacy is one of the critical concerns that hinder the adoption of public cloud. For simple
application, like storage of data, encryption can be used to protect user's data. But for big
data processing on cloud, there is no satisfying solution for the security of Data.
The objective of this project is to provide a secure and complete security solution for fast
processing of Data between user and cloud service provider. The hardware security
solution which we will be providing is a trusted hardware module which works as a third
party between cloud service provider and user. The main objective will be accomplished
using hardware and Different advanced cryptographic algorithms.
Page 4 of 14
6.
Data will be submitted by user in encrypted form, encryption at user end will be done
using certain algorithm. This will be termed as Lighter-level Encryption.
The processing unit retrieves bulk of data from user end and it performs another layer
of encryption on the given data which is termed as Heavy-level Encryption.
After the double layer encryption of data from processing unit, it will store the
respective data onto the cloud.
After the data is stored onto the cloud, if the user requested the required data, the
processing unit will fetch the respective data from cloud and show it to user.
The encryption of data that will be done at user end and by the processing unit will be
done in an optimized and smart manner.
Expected Equipment that will be used in FYP:
Hardware:
GP-GPU (General Purpose Graphics Processing Unit): GPGPU applications do
General-Purpose computing on a GPU, where GPU is the processing unit of a video card.
Modern video cards can do much more than displaying graphics. They can perform
complex computations, much like an ordinary processor (CPU).
Open-Stack Based CIS Cloud (open source): Open source CIS cloud is a cloud that
uses freely available source code to build and manage a private cloud platform.
Software:
CUDA is an excellent framework to start with. It lets you write GPGPU kernels in C. The
compiler will produce GPU microcode from your code and send everything that runs on
the CPU to your regular compiler. You can call CUDA programs from C, C++,
FORTRAN, or Python. There are also many more language bindings to call CUDA
programs (or actually their kernels) from other languages.
Page 5 of 14
OpenCL allows portability with some effort- across vendors, and even across widely
differing types of hardware, both current and future (HSA-enabled hardware for example
looks very promising). It runs well on NVIDIA & AMD GPUs. OpenCL only allows you
to write kernels (single functions that can be called from your regular code) in a C
dialect.
Java (SOAP / RESTFUL API) Simple Object Access Protocol (SOAP) is a standard
protocol specification for message exchange based on XML. Communication between
the web service and client happens using XML messages.
Block Diagram:
Page 6 of 14
Flow Diagram :
Required Data
Retrieval from
GP-GPU
Page 7 of 14
7.
1.
1 month
Design Document
2.
2 month
Progress Report
3.
3 month
Implementation of AES
Algorithm.
Code Modules
4.
5 month
Progress Report
5.
6 month
Mid-Year Presentation
7 month
User Interface
8 month
Security module
11 month
6.
7.
8.
8.
Milestone
Deliverables
Expected Outcome
The GPUs uniquely integrates with re-encryption so that users can utilize the capabilities
of cloud computing while keeping the privacy of their data. The main approach here is to
leverage the usage of modern GP-GPU frameworks in providing an accelerated
cryptographic algorithm using the full capabilities of modern GP-GPUs. The processing
of users data to make it secure and optimized will be done by using numbers of GP-GPUs
and advanced encryption algorithms.
9.
Page 8 of 14
10.
11.
Consent of Advisors
Consent of the Internal Advisor
Signature:
Signature:
Signature:
Page 9 of 14
12.
Page 10 of 14
Page 11 of 14
Page 12 of 14
Page 13 of 14
13.
Signature:
Signature:
Page 14 of 14