You are on page 1of 20

DYNAMIC KEY GENERATION FOR

LINEAR PROGRAMMING IN

SECURE

OUTSOURCING OF

CLOUD COMPUTING

Contents
 INTRODUCTION  LITERATURE REVIEW  EXISTING SYSTEM  PROPOSED SYSTEM  SYSTEM SPECIFICATION  METHEDOLOGY  CONCLUSION

Introduction
Why Cloud Computing ?  A promising computing paradigm for business companies and government agencies holding large volume of data  Provide pay-as-you-use billing feature at low price.
 Amazon S3 storage service: just $0.12 - $0.15 per

gigabyte/month  Google storage service :just $ 0.16 -$ 0.19 per gigabyte/month

Cloud Outsourcing
It is an arrangement in which one company provides services for another company or user.  “Cloud-based outsourcing is emerging as one of the biggest changes underway in the outsourcing delivery model,” said IAOP chairman Michael Corbett.

Secure Outsourcing
 There are some designs on secure outsourcing of scientific

computations, sequence comparisons, and matrix multiplication etc. have been proposed but it is still hardly possible to apply them directly in a practically efficient manner.  Secure outsourcing of computational data with cryptography only is not feasible and with hardware only has large online latency.

LITERATURE SURVEY
Managing the Risk of an Extreme Form of IT Outsourcing
1. Standards for cloud computing may reduce many of the risk of opportunistic behaviour on the part of vendors.

2. Despite the enormous concerns of potential cloud customers for lock-in, hold-up, and opportunistic reprising, almost no significant standardization efforts under way today are aimed at ensuring interoperability or portability.
3. Standards efforts cannot mitigate most of the development risks of cloud computing.

Cloud Hooks: Security and Privacy Issues in Cloud computing
1 . Security of the cloud infrastructure relies on trusted computing and cryptography. 2. The risks must be carefully balanced against the available safeguards and expected benefits with the understanding that accountability for security remains with the organization. 3. Too many controls can be inefficient and ineffective, if the benefits outweigh the costs and associated risks.

Verifiable Computation with Two or More Clouds
1.

Instead of using one cloud, the client uses two or more different clouds to perform his computation. The client can verify the correct result of the computation, as long as at least one of the clouds is honest.

2.

Ran Canitte experiment with several parameters on live clouds.

Harnessing the Cloud for Securely Outsourcing Largescale Systems of Linear Equations

1.

Cong Wang investigated the problem of securely outsourcing large-scale LE in cloud computing

2. Different from previous study, the computation outsourcing framework is based on iterative methods, which has the benefits of easy-to-implement and less memory requirement in practice.

Work on Secure Computation Outsourcing
1. General secure computation outsourcing that fulfils all aforementioned requirements , such as input/output privacy and correctness/soundness guarantee has been shown feasible in theory by Gennaro.

2. Later on, Atallah give two protocol designs for both secure sequence comparison outsourcing and secure algebraic computation outsourcing

Existing System
 Ordinary data encryption techniques exist for

data security.
 The operational details inside the cloud are not

transparent .
 Secure outsourcing

computations is

expensive.
 No standards or model is defined for secure

Proposed System
 Sensitive data have to be encrypted before outsourcing.  Provide dynamic key every time, when a user logged in for

cloud service.
 Provides more secure environment for

cloud service

provider and clients.
 This task secure cloud services from malicious or unwanted

access.

PROVIDERS CONFIDENCE LEVEL
Ensure recovery from significant IT rules Ensure Data Assets are in safe environments Investigate Illigale activity Ensure Viability and Availibilty Of IT Legal Aspects Ensure ProperData Segregation User Access

PROVIDERS CONFIDENCE LEVEL

0

20

40

60

80

CONCLUSION
 In this paper after literature survey we found that secure

outsourcing of computational data with cryptography only is not feasible and with hardware only has large online latency. We also found that there is lack of secure and practical computational cloud model for secure outsourcing.
 From “Provider Confidence Level” graph shown

in previous slide we get there is less concern about secure user access.

METHODOLOGY
1. Firstly, a dynamic key generation mechanism is developed for security at client’s end.

2. KeyGen(1k) → {K}. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. 3. ProbEnc(K,ɸ) → {ɸk}. This algorithm encrypts the input tuple ɸ into ɸk with the secret key K. According to problem transformation, the encrypted input ɸk has the same form as ɸ, and thus defines the problem to be solved in the cloud. 4. ProofGen(ɸk) → {(y, Γ)}. This algorithm augments a generic solver that solves the problem ɸk to produce both the output y and a proof Γ. The output y later decrypts to x, and Γ is used later by the customer to verify the correctness of y or x.

5. ResultDec(K, ɸ, y, Γ) → {x,⊥}. This algorithm may choose to verify either y or x via the proof Γ. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation faithfully.

USER A After Getting Password Login 1. Enter ID User Gets Password 2. Password Generated in User ‘s Mobile

3.Enter Password

Customer ‘s LP Problem ɸ 4. Encrypt

Cloud Server
Secret K

5. Verify & Decrypt

USER B

Hardware Requirements
 System

 Hard Disk
 Floppy Drive  Monitor  Mouse  Ram

Pentium IV 2.4 GHz. 40 GB. 1.44 Mb. 15 VGA Color. Logitech. 512 MB.

Software Requirements
 Operating System

Windows xp,
Jdk 1.6 Jsp, Servlet Oracle 10g

Linux  Language  Technology  Back End

References
[1] P. Mell and T. Grance, “The NIST definition of cloud computing,”National Institute of Standards and Technology, vol. 53, no. 6, p. 50,2009. [2] J. Viega, "Cloud computing and the common man”, Computer, 42, 2009, pp. 106-108. [3] C. Cachin, I. Keidar and A. Shraer, "Trusting thecloud", ACM SIGACT News, 40, 2009, pp. 81-86. [4] Clavister, "Security in the cloud", Clavister White Paper, 2008. [5] H.Mei, J. Dawei, L. Guoliang and Z. Yuan, “Supporting Database Applications as a Service",ICDE'09:Proc. 25thIntl.Conf. on Data Engineering,2009, pp. 832-843 [6] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data storage security in cloud computing",ARTCOM'10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, 2010, pp. 1-9.5499 [7] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, 34(1), 2011, pp 1-11. [8] G. Brunette and R. Mogull (eds), "Security guidance of critical areas of focus in cloud”, Cloud Security Alliance 2011 [9] S. Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010. [10] Eric K. Clemons,” Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcings”,

Thanks