to download project abstract of aws cloud computing

ABSTRACT

We provided aws cloud computing project in this paper. Today data sharing and maintaining its security is major challenge. User in the data sharing system upload their file with the encryption using private key. This property is especially important to any large scale data sharing system, as any user leak the key information then it will become difficult for the data owner to maintain security of the information. In this paper provide a concrete and efficient instantiation of scheme, prove its security and provide an implementation to show its practicality. There are lots of challenges for data owner to share their data on servers or cloud. There are different solutions to solve these problems. These techniques are very much critical to handle key shared by the data owner. This paper will introduce the trusted authority to authenticate user those who have the access to the data on cloud. SHA algorithm is used by the trusted authority to generate the key and that key will get share to user as well as the owner. The trusted authority module receives encrypted file using AES Algorithm from the data owner and computes hash value using MD-5 algorithm. It stores key in its database which will be used during the dynamic operations and to determine the cheating party in the system. Trusted authority send file to CSP module to store on cloud. The resulting key sets are shown to have a number of desirable properties that ensure the confidentiality of communication sessions against collusion attacks by other network nodes.

INTRODUCTION
One possible solution is to migrate character sequences to public cloud computing platforms and to request that Cloud Service Providers process sequence comparisons. At present, primary sequence comparison algorithms are deployed as a universal outsourcing service on public clouds. But at the same time, its security and privacy issues are increasingly emerging. The outsourced data stored as plaintext could easily be exposed to malicious external intruders and internal attackers in the CSP, and the individual private information carried by character sequences (e.g., personal identification, financial transaction records, genetic markers for some diseases, information that is used to identify paternity or maternity, etc.) could more or less be disclosed or abused. Therefore, secure outsourcing is designed to protect the privacy of character sequences, and to ensure that the scheduled computing requests are normally performed on the cloud servers. For this purpose, we present a scheme called Encrypted Sequence Comparison based on a single-server model. Some novel salted hash and encryption techniques are employed to allow public clouds to perform sequence comparisons directly on the character sequences outsourced as ciphertext. Overall, E-SC achieves a user-controlled reliable storage and a collusion-resistant outsourcing service, which plays an important role in the trade-off between security and execution performance. Our scheme is easy in deployment, efficient in processing and controllable in overhead. The contribution soft his paper are mainly in the following four aspects.
1) Based on the universal model of a public cloud outsourcing, we propose
an overall architecture for E-SC. This architecture is built on the end user
and the unmodified CSP. Its overall system model, which has been
demonstrated to be secure under the threat model, is user-friendly and
implementation-friendly.
2) A salted hash algorithm is improved to hash the character sequences and
the indexes of cost matrices, so as to defend against statistical attacks. An
additive order preserving encryption algorithm is designed to encrypt the
elements of cost matrices. Also, this algorithm can achieve an
indistinguishability under additive ordered chosen-plaintext attack with
linear time complexity.
3)A single cloud server works for the first time to provide a privacy-preserving
computable outsourcing service to effectively resist collusion attacks from
the cloud. With pre-processing modules of padding, partition and expansion,
there is no need to decrypt any outsourced data in the non-interactive
sequence comparison stage.

4) Simulation results show that the overall
execution performance of our E-SC is negatively correlated with its
security.

LITERATURE SURVEY
Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy and company strength. Once these things are satisfied, then the next step is to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system aws cloud computing.

ANALYSIS ON RELIABLE TECHNIQUES FOR KEYWORD BASED  SEARCH AND DATA SHARING IN CLOUD COMPUTING-aws cloud computing
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *