You are on page 1of 15

CLOUD

COMPUTING

SECURITY ENHANCED
MODEL FOR CLOUD DATA

CREATED BY:
Parneet - 25133
agenda • Introduction

• Proposed Methodology

• AES

• Data fragmentation

• Flowchart

• Experimental results

• Conclusion
Introduction • Cloud computing allows their user to store
and retrieve the digital data anywhere.
• A high level of data security is required on
the data stored in cloud nodes.
• The security and data availability is
enhanced by dynamic fragmentation and
replication process.
CONTRIBUTION
• An outsourced data scheme is proposed that enhance both the performance and security by
fragmenting the cloud user file and replicates those file in various location.
• The dynamic fragmentation generates the fragments based on the number of virtual machine
Availability
• The replication process improves the load balancing and data reliability by performing the multiple
times replica placement.
• The proposed Dynamic Data Fragmentation and Replication (DDFR) method ensure the security of
the fragmented data through the AES encryption techniques.
SYSTEM ARCHITECTURE
AES Algo
• Advanced Encryption Standard
(AES)
• AES is one of the powerful
symmetric algorithm which is
commonly used for enhancing
the security.
• Our model used the 128 bit
block and key for encryption
• The number of rounds depends
on the key length
• AES considers each block as a
16 byte (4 byte x 4 byte = 128)
grid in a column major
arrangement.
DATA • The security of cloud computing
depend on each node security instead
FRAGMENTATION of entire node.
• To overcome this issue fragmentation
is applied in the proposed system to
ensure the security.
• The process of dividing the database
into smaller multiple parts or
sub−tables is called fragmentation.
The smaller parts or sub−tables are
called fragments and are stored at
different locations.
• .
FLOWCHART
OF ENTIRE
PROCESS
EXPERIMENTAL RESULTS
• The cloud setup and the simulation modeling
are utilized through Cloud sim Tool.
• The performance metrics such as Response
time, Throughput and Memory utilization is
measured.
RESULTS OF RESPONSE TIME

15
RESULTS OF THROUGHPUT
RESULTS OF MEMORY UTILIZATION
RESULTS OF FRAGMENTATION
CONCLUSION

• The performance of the system is


evaluated based on the number of
tasks and the size of the virtual
machines. The high throughput 4.9
Kbps is achieved. Like-wise the
retrieval time is also reduced.
• Future scope – No. of Replicas
• Enhanced Data Availability and
performance
THANK YOU...

You might also like