Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15154
Title: METHOD TO MAINTAIN DATA SECURITY IN CLOUD COMPUTING
Authors: AGGARWAL, DHEERAJ
Keywords: DATA SECURITY
CLOUD COMPUTING
CRYPTOGRAPHY ALGORITHMS
DNA TECHNIQUE
Issue Date: Sep-2016
Series/Report no.: TD NO.2414;
Abstract: The emergence of cloud computing in recent years has brought an interest from different organizations, institutions and users to take advantage of its services and applications. Because of providing a very attractive package of services, cloud technology has collected a huge attention from academia, IT industry and government organizations. Cloud computing promises scalability and on-demand availability of resources. Day-by-day number of users on the internet goes on increasing; and attacker are also on same path it becomes very necessary to provide efficient security mechanism over cloud computing to ensure the security to the millions of user requests on it. Security problem can be at any level. Therefore, one of the important issues which need a major consideration of the researchers is strong security in cloud computing systems. A number of cryptography algorithms are proposed by various researchers, to solve this problem. Two kinds of cryptography algorithms are there one is symmetric and other is asymmetric. Since users lose their control after storing of information at cloud storage. So there is need of strong security mechanism so that even cloud service provider must not be aware of user’s data. Many symmetric and Asymmetric algorithm is proposed but many of them has broken by attacker or is about to be broken. There is a new encryption technology has proposed, that is DNA symmetric algorithm which is computationally very less expensive than existing cryptography algorithm because no complex mathematical algebra is involved but cipher is very complex than other one. The basic idea behind this encryption technique is the exploitation of DNA cryptographic strength, such as its storing capabilities and parallelism in order to enforce other conventional cryptographic algorithms. In the given method we hide the MAC address using the DNA cryptography. The cryptography technique uses the key obtained by DNA technique; the image is shuffled and then encrypted with the key. The encrypted image is kept at server side and whenever the user wants to access the data he uses the dna key for the decryption.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15154
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
dheeraj2k14isy20THESIS.pdf1.15 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.