Advance security in cloud computing for military weapons

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 01 | Jan -2017

p-ISSN: 2395-0072

www.irjet.net

ADVANCE SECURITY IN CLOUD COMPUTING FOR MILITARY WEAPONS Akash Bagul1, Puja Sonawane2, Laxmi Sawant 3, Rohit Doshi4 Department of Computer Engineering AISSMS College of Engineering Shivajinagar, Pune 01 Guide: Professor Amol Jagtap

---------------------------------------------------------------------***--------------------------------------------------------------------phrased as "the cloud") is used as a metaphor for "the Abstract - Cloud storage systems are widely deployed Internet," so the phrase cloud computing means "a type in the world, and many people use them to download and of Internet-based computing," where deferent services upload their personal stuff like videos, text document, such as servers, storage and applications are delivered images, etc. Now a day many private firms, company’s, to an organization's computers and devices through governments, military move their database on cloud the Internet. Cloud computing is comparable to grid storage. However, a significant question is, can users computing, a type of computing where unused trust the media services provided by the media cloud processing cycles of all computers in a network are service providers? Many traditional security approaches harnesses to solve problems too intensive for any are proposed to secure the data exchange between users stand-alone machine. and the media cloud. However, the problem comes to There are a number of security issues/concerns military users if scientist develop a new weapon for associated with cloud computing but these issues fall military and he want to send a launching code to into two broad categories: Security issues faced by military admirals /chiefs through cloud, how he can cloud providers (organizations providing, software trust cloud that he’s codes will be safely delivered to platform, or infrastructure-as-a-service via the cloud) admirals. and security issues faced by their customers. In most Now a day’s cloud storage can easily have cases, the provider must ensure that their cracked by hacker and gain information of military infrastructure is secure and that their clients data and weapons and confidential secrets. It could be dangerous applications are protected while the customer must if they sold this information to terrorists or rival country, ensure that the provider has taken the proper security in this article, we propose to use steganography, measures to protect their information. The extensive watermarking, image encryption and visual use of virtualization in implementing cloud cryptography schemes to protect military weapons data infrastructure brings unique security concerns for in clouds. steganography allows users to hide the customers or tenants of a public cloud service. weapons launch code in image captcha. Visual cryptography shares the image captcha in shares which 1.1 Problem Statement is depend on number peoples in group in military. image encryption will apply on each share of captcha. After this Leaking of personal information, secret watermarking is apply on each share for authentications government document, confidential secrets about our between users and cloud. For receiving the launch code country defense, military secret is now a day big receivers have to from de-watermarking, image serious problem facing today. Uploading an decryption then visual cryptography to get captcha and information on cloud can now easily hacked by launch code. Our studies show that the proposed hackers. Several methods have been proposed in order approach achieves good security performance and to combat this. Providing more techniques in security securing the future of country. could solve the problem that we facing today. Introduction 1.2 Purpose The aim of the project is to provide high Cloud computing is a type of computing that security in cloud for Military including multiple relies on sharing computing resources rather than organizations for their confidential information. It also having local servers or personal devices to handle applications. In cloud computing, the word cloud (also © 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

| Page 1511


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.