Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment

The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. This lead to the demand of cloud computing. But there are some security concerns when we handle and share data in the cloud computing environment. In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment admin. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to read and update the data then it take permission from the client environment. This provides a way to hide the data and normal user and can protect their data from the cloud provider. This provides a two way security protocol which helps both the cloud and the normal user. For the above concept we apply RSA and MD 5 algorithm. When the cloud user upload the data in the cloud environment, the data is uploaded in encrypted form using RSA algorithm and the cloud admin can decrypt using their own private key. For updating the data in the cloud environment admin request the user for a secure key. Cloud user sends a secure key with a message digest tag for updating data. If any outsiders perform a change in the key, the tag bit is also changed indicating the key is not secure and correct.

[1]  Abdallah Khreishah,et al.  Resource Planning for Parallel Processing in the Cloud , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.

[2]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[3]  Khawaja S. Shams,et al.  Redefining tactical operations for MER using cloud computing , 2011, 2011 Aerospace Conference.

[4]  Yong Zhao,et al.  Property-Based Remote Attestation Oriented to Cloud Computing , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[5]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.

[6]  Pritesh Jain,et al.  An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment , 2011 .

[7]  Moni Naor,et al.  The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[8]  Umberto Villano,et al.  CHASE: An Autonomic Service Engine for Cloud Environments , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[9]  Xiaoping Wu,et al.  Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[10]  Wei-Tek Tsai,et al.  Service-Oriented Cloud Computing Architecture , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[11]  Maneesh Shrivastava,et al.  Overview of Security issues in Cloud Computing , 2012 .

[12]  Yoseba K. Penya,et al.  Cloud Computing Services Accounting , 2012 .

[13]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[14]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[15]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.