U Dhanush, Prasannasai S Hulikatti, Raghavendra H Malager, S. Shreesha, P. Biswagar
{"title":"A Secure File Transfer over Virtual Machine Instances using Hybrid Encryption Technique","authors":"U Dhanush, Prasannasai S Hulikatti, Raghavendra H Malager, S. Shreesha, P. Biswagar","doi":"10.51201/JUSST/21/05219","DOIUrl":null,"url":null,"abstract":"Cloud Computing is used to share data, services and resources via a network but this system is vulnerable to cyber-attacks by an unauthorized person denying the user privacy and confidentiality. The exponential growth in Information technology especially in the field of Cloud Computing has seen a rise in security attacks such as Interruption, Interception, Modification, Fabrication making it absolutely necessary to enhance the cloud security as well as network security. To tackle the menace of security threats is to make use of the various encryption techniques and to ensure secure transmission of the data to ensure the user of his rights of Privacy, Confidentiality, Integrity, Authentication and access controls of data. This can be achieved by Cryptographic techniques. In the former implementation a new virtual instance is created and embedded with all the requested resources and allocated to the user where as in the later implementation the size of the allotted VM is being altered to account for the extra requested resource or to free the unused resource to increase efficiency. To achieve Secure file transfer between instances Hypervisor tool Virtual Box developed by Oracle Corporation is used. To interface with Hypervisor via Host CLI commands provided by the Virtual Box is used. Thus, developing a model that mimics the cloud environment in small scale using the laptop/desktop which enacts as a cloud with limited resource pool.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"37 1","pages":"77-84"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the University of Shanghai for Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51201/JUSST/21/05219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud Computing is used to share data, services and resources via a network but this system is vulnerable to cyber-attacks by an unauthorized person denying the user privacy and confidentiality. The exponential growth in Information technology especially in the field of Cloud Computing has seen a rise in security attacks such as Interruption, Interception, Modification, Fabrication making it absolutely necessary to enhance the cloud security as well as network security. To tackle the menace of security threats is to make use of the various encryption techniques and to ensure secure transmission of the data to ensure the user of his rights of Privacy, Confidentiality, Integrity, Authentication and access controls of data. This can be achieved by Cryptographic techniques. In the former implementation a new virtual instance is created and embedded with all the requested resources and allocated to the user where as in the later implementation the size of the allotted VM is being altered to account for the extra requested resource or to free the unused resource to increase efficiency. To achieve Secure file transfer between instances Hypervisor tool Virtual Box developed by Oracle Corporation is used. To interface with Hypervisor via Host CLI commands provided by the Virtual Box is used. Thus, developing a model that mimics the cloud environment in small scale using the laptop/desktop which enacts as a cloud with limited resource pool.