Abstract

Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving with tremendous momentum and rapidly being adopted throughout the IT industry. In this dissertation, we identify security challenges that arise in integration of cloud-based services, and present a set of novel solutions to address them. We analyze the security of our solutions, demonstrate their usage and effectiveness, and evaluate their performance by extensive experimentation. To address the problem of security in untrusted cloud storage, we introduce a hybrid solution of AES and file encryption. The key used in AES algorithm is generated randomly from the file's data which is sent by the cloud provider. After implementing the proposed methodology, we have seen an improvement in the processing time and cost which will increase the overall efficiency of the system.Â

Highlights

  • Cloud Computing is a term used to describe both a platform and type of application

  • There are many benefits stated of Cloud Computed by different researchers which make it more preferable to be adopted by enterprises

  • After implementing the proposed methodology, we have reached up to a solution that the cloud security can be enhanced by applying the file based encryption algorithm along with the AES

Read more

Summary

Introduction

Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. Cloud Computing infrastructure allows enterprises to achieve more efficient use of their IT hardware and software investments. This is achieved by breaking down the physical barrier inherent in isolated systems, automating the management of the group of the systems as a single entity. Cloud Computing can be described as virtualized system and a natural evolution for data centers which offer automated systems management

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call