CFP last date
20 June 2024
Reseach Article

A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool

by Amita Sharma, Shweta Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 17
Year of Publication: 2015
Authors: Amita Sharma, Shweta Singh
10.5120/ijca2015906713

Amita Sharma, Shweta Singh . A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool. International Journal of Computer Applications. 127, 17 ( October 2015), 12-19. DOI=10.5120/ijca2015906713

@article{ 10.5120/ijca2015906713,
author = { Amita Sharma, Shweta Singh },
title = { A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 17 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number17/22820-2015906713/ },
doi = { 10.5120/ijca2015906713 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:37.263564+05:30
%A Amita Sharma
%A Shweta Singh
%T A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 17
%P 12-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A cloud storage mechanism repressed a storage device design and cloud based protocols. Cloud storage architecture can be exposed design for remote method access through cloud storage device. Cloud storage is a centralized data distribution center meant for authorized clients, among them cloud data will share towards different clients as apiece their authority in addition to access permissions. Based on this assortment of researches are being proceeding. However, within this article it focuses the storing data in the midst of fully secure in cloud report also. The swift progression of the cloud has formed it as a desirable ambition of attack intended for both foreign attackers and malicious insiders. Files, blocks, data sets and objects are common logic units of data storage within cloud storage device mechanism. In this research it pioneer with a new set of methods or new unit of methods handled by means of the AES algorithm meant for creating strong encryption and decryption.

References
  1. Aparjita Sidhu and Rajiv Mahajan, Enhancing security in cloud computing structure by hybrid encryption, International Journal of Recent Scientific Research Vol. 5, Issue, 1, pp.128-132, January, 2014.
  2. Chou, Te-Shun. "Security Threats On Cloud Computing Vulnerabilities. "International Journal of Computer Science & Information Technology (IJCSIT) Vol 5 (2013).
  3. Dr. Prerna Gupta & Abhishek Sachdeva IITM India (Eds)-A Study of Encryption Algorithms AES, DES and RSA for Security. (Global Journal Inc.) Volume13 Issue 15.Year 2013.
  4. Khan, Miss Shakeeba S. , and Miss Sakshi S. Deshmukh. "Security in Cloud Computing Using Cryptographic Algorithms" (2014).
  5. Liu, Wentao. "Research on cloud computing security problem and strategy”. Consumer Electronics, Communications and Networks [CECNet], 2012 2nd International Conference on. IEEE, 2012.
  6. Padhy, Rabi Prasad, Manas Ranjan Patra, and Suresh Chandra Satapathy. "Cloud Computing: Security Issues and Research Challenges", International Journal of Computer Science and Information Technology & Security, 2011.
  7. Swati Kashyap, Er. Neeraj Madan, Haryana Engineering College, Network Security and Cryptographic Algorithm, ijarcsse journal, Volume 5, Issue 4, April 2015.
  8. E. Cole, R. Krutz and J. W. Conley, Network Security Bible, Wiley Publishing Inc, 2005.
  9. A. Menezes, V. Oosrschot and A. Vanstone,Handbook on Applied Cryptography, CRC Press Inc., NY, USA, 2000.
  10. D. Stinson, Cryptography Theory and Practice, CRC Press Inc., NY, USA, 1995.
  11. G. Blelloch, Introduction to Cryptography, online: http://www-2.cs.cmu.edu/afs/cs/project/pscicoguyb/ realworld/crypto.ps, 2000, accessed on Sept. 1,2008.
  12. G. Carter, E. Dawsony and L. Nielseny, Key Schedule Classification of the AES Candidates, in Proceedings of the end AES Conference, Rome, Italy, 1999.
  13. J. Dray, Report on the NIST Java AES Candidate Algorithm Analysis, online: http://csrc.nist.gov/encryption/aes/round/r1-java.pdf, 1999, accessed on Sept. 1, 2008.
  14. J. Dray, NIST Performance Analysis of the Field Round Java AES Candidates, online: http://csrc.nist.gov/encryption/aes/roubd2/conf2/papers/8-jdray.pdf, 2000, accessed on Sept. 1, 2008.
  15. J. Nakahara, B. Preneel and J. Vandewalle, Square Attack on Extended Rijndael Block Copher, COSIC Technology Report, 2002.
  16. D. Baudran, H. Gilbert, L. Granboulan, H. Handschun, A. Joux, P. Nguyae, F. Noilhan, O. Poincheva, T. Pornin, G. Poupard, J. Stern and S. Vaudenay, Report on the AES Candidates, in Proceedings of the 2nd ASE Conference, Rome, Italy, 1999.
  17. T. Verhoeff, Encryptography, online: http://www.pa.win.tue.nl/wstomv/software/AESRijndael/rijndael-test.pas, 2001, accessed on Sept. 1, 2008.
  18. C. P. Pfleeger and S. L. Pfleeger, Security in Computing, 3rd ed., Prentice-Hall, 2003.
  19. W. Stallings, Cryptography and Network Security, 4th ed., Prentice-Hall, 2005
  20. B. A. Forouzan, Data Communications and Networking, 4th ed., McGraw-Hill, , 2007
  21. Wikipedia Website, online: http://en.wikipedia.org, accessed on Nov., 13, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Report EnDeCloudReports Secure Sockets Layer (SSL) Transport Layer Security (TLS) Certificate Signing Request (CSR) Certificate Authority (CA) Internet Engineering Task Force (IETF).