Rijndael Encryption Technique for User Authentication in Cloud Computing

Similar documents
Introduction To Cloud Computing

Mitigating Risks with Cloud Computing Dan Reis

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

1/10/2011. Topics. What is the Cloud? Cloud Computing

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures

Cloud Computing introduction

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

Cloud & AWS Essentials Agenda. Introduction What is the cloud? DevOps approach Basic AWS overview. VPC EC2 and EBS S3 RDS.

Computing as a Service

JOURNEY TO CLOUD (J2C) CONSUMING TECHNOLOGY, NOT OWNING IT

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

Why the cloud matters?

Privacy hacking & Data Theft

Automated Deployment of Private Cloud (EasyCloud)

Large Scale Computing Infrastructures

ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast

CHEM-E Process Automation and Information Systems: Applications

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

CS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,

Community Clouds And why you should care about them

CLOUD COMPUTING-ISSUES AND CHALLENGES

DEEP DIVE INTO CLOUD COMPUTING

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Fundamental Concepts and Models

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

Cloud Computing. Technologies and Types

Automated Deployment of Private Cloud (EasyCloud)

Introduction to data centers

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

itsmf Annual Conference 2012

Third Party Cloud Services Its Adoption in the New Age

3. What do you mean by virtualization? What is the role of virtualization in cloud computing?

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Cloud Computing, SaaS and Outsourcing

Clouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services

Examining Public Cloud Platforms

Introduction to Cloud Computing and Virtual Resource Management. Jian Tang Syracuse University

Reviewing Nist Cloud Computing Definition

Introduction to ArcGIS Server Architecture and Services. Amr Wahba

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

SCADA Traditional definition and application.

THE DATA CENTER AS A COMPUTER

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense

Cloud Computing Technologies and Types

Multi Packed Security Addressing Challenges in Cloud Computing

Copyright 2011 EMC Corporation. All rights reserved.

Top 40 Cloud Computing Interview Questions

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Tech Talk #11. Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11

Cloud Computing Overview. The Business and Technology Impact. October 2013

20533B: Implementing Microsoft Azure Infrastructure Solutions

Association of Cloud Computing in IOT

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop

UVA HPC & BIG DATA COURSE. Cloud Computing. Adam Belloum

Upgrading Your Skills to MCSA Windows 8

ECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University

The webmethods CloudStreams Amazon EC2 Connector

CogniFit Technical Security Details

ISACA Phoenix Chapter Meeting

Science Computing Clouds.

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.

VMware Hybrid Cloud Solution

Cloud Computing Introduction & Offerings from IBM

SURVEY PAPER ON CLOUD COMPUTING

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

NIST Cloud Computing Security Working Group

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to

INFS 214: Introduction to Computing

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Middle East Technical University. Jeren AKHOUNDI ( ) Ipek Deniz Demirtel ( ) Derya Nur Ulus ( ) CENG553 Database Management Systems

Check Point vsec for Microsoft Azure

Cloud Computing Concepts, Models, and Terminology

ERP Solution to the Cloud

Introduction to Cloud Computing

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Building Trust in the Era of Cloud Computing

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Kroll Ontrack VMware Forum. Survey and Report

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

SEEM3450 Engineering Innovation and Entrepreneurship

Moving to the Cloud: Making It Happen With MarkLogic

Implementing Microsoft Azure Infrastructure Solutions

The Challenge of Cloud Security

Core of Cloud Computing

Benefits of Cloud Computing

Parameter Sweeping Programming Model in Aneka on Data Mining Applications

[MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Lecture 09: VMs and VCS head in the clouds

High Performance and Cloud Computing (HPCC) for Bioinformatics

Research Article Volume 6 Issue No. 5

Analytics in the Cloud Mandate or Option?

Backup Solution. User Guide. Issue 01 Date

A Review on Reliability Issues in Cloud Service

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Transcription:

Rijndael Encryption Technique for User Authentication in Cloud Computing 1 Firkhan Ali Bin Hamid Ali and 2 Md Yazid Mohd Saman 1 Fakulti Teknologi Maklumat & Multimedia, Universiti Tun Hussein Onn Malaysia. 86400 Parit Raja, Johor, Malaysia 2 Jabatan Sains Komputer, Universiti Malaysia Terengganu K. Terengganu Malaysia (Email: firkhan@uthm.edu.my) 1. Introduction Cloud Computing (CC) refers to applications & services that run on a distributed network [1,2]. It uses virtualized resources and hosted services are accessed or delivered over the Internet. The main two characteristics of cloud computing are: (a) virtualization - resources are virtual and limitless (b) abstraction - details of physical systems on which the software are run are abstracted from users. There are three categories of CC: (a) Infrastructure-as-a-Service (IaaS), (b) Platform-as-a-Service (PaaS) and (c) Softwareas-a-Service (SaaS). The US NIST definition of CC is that it is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [3]. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Figure 1 shows the model of CC. 1 Figure 1: Cloud Computing Model [1] Figure 2 show the four deployment models of CC. They are Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud [1, 2]. A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. For a Private cloud, also called internal cloud or corporate cloud, it refers to a term for a proprietary computing architecture. It provides hosted services to a limited number of people behind a firewall.

The combination of at least one private cloud and at least one public cloud gives the Hybrid Cloud. It can be an on-premises private cloud or a virtual private cloud located outside the enterprise data center. The simplest macro views of a hybrid cloud - a single on-premises private cloud and a single off-premises public cloud. 2. Security in IaaS @ CC Figure 2: Cloud Deployment Models [1] The Infrastructure as a Service (IaaS) model is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components [1,2,3]. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis. Some examples of IaaS service providers are Amazon Elastic Compute Cloud (EC2), Eucalyptus, GoGrid, FlexiScale, Linode, RackSpace Cloud and Terremark. In Figure 3, the Cloud reference Model is shown [1]. It shows that for the IaaS category, the needs for authentication and security are highlighted [4]. 2

Figure 3: Cloud Computing Model [1] 3. Development of PMS-R A system called Password Management System (PMS-R) has been developed. This could be deployed on the IaaS category of CC. This system focuses on managing password for all files in computers. This could be useful for the authentication of users in the Cloud. It has been developed based on Rijndael s encryption technique [5]. < half-page details of Rijndael s encryption technique> This system is able to secure the usage of password for files and software from any threats. This system has one main password for all computers files. This is important to avoid any failure occur in this system. There are several modules in this system as state in Table 1. Table 1: Modules in PMS-R Index Module Decription 1 Registration This is a first module that experience by user to access other modules in PMS-R system. User information is required in this module. 2 Password Recovery This module will keep recovery support to get back any lost password. 3 Password Management This is a main module to secure all files with one encryption password. 3

The system is able to have a systematic password management system. With that, it will secure all the files by using encrypted password. This information system had provided user-friendly interface to perform all the functions in the modules. The modules are including user log in, registration, password recovery and password management with encryption functional. Figure 4 shows the new user registration interface for this system. A user is allowed for a one time registration only. He needs to provide individual information during the registration. With that, a user can use all the functions that have in this information system. He can manage all file with the encryption password through this system. Figure 4: Interface for registring new user In Figure 5, the interface for password recovery is depicted. A user needs to input his name, a question and the correct answer to get back the loss password. The interface for file management with encryption password is shown in Figure 3. User can select any files to secure with this encryption password. The process of encryption and decryption will be doing at this space of interface. In this module, there are several functions such Secured Files & Folders, Unsecured Files & Folder, Ungroup Files & Folders and Account Info. 4

Figure 5: Recovering a password Figure 3: Encrypting password 5. Conclusion IaaS @ Cloud Computing has provided utility computing, service and billing model, automation of administrative tasks, dynamic scaling, desktop virtualization, policy-based 5

services and Internet connectivity. However these may pose severe security issues [4]. The Password Management System (PMS-R) developed and discussed in this paper may provide an environment that make it easier for users to manage all the files. With a good encryption technique, it will secure all the files by using encryption and decryption. 6. References [1] Sosinsky, R (2011), Cloud Computing Bible, Wiley [2] Buyya, R, Broberg, J. & Goscinski, A. (2011), Cloud Computing, Principles & Paradigms, Wiley [3] Cloud Computing NIST http://www.nist.gov/itl/cloud/ retrieved on 1 April 2011 [4] Krutz, R. L. and Vines, R. D. (2010), Cloud Security : A Comprehensive Guide to Secure Cloud Computing, Wiley [5] REF ON Rijndael s encryption technique 6