Design and Implement Secure Cloud ComputingSystem Based on ...

2 downloads 285 Views 2MB Size Report
There was a problem previewing this document. Retrying. ... Design and Implement Secure Cloud ComputingSystem Based on H
Design and Implement Secure Cloud Computing System Based on Hadoop

A thesis Submitted to the Council of the College of Science at the University of Sulaimani in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer

By Ribwar Khalid Mohammed B.Sc. Computer Science (2009), University of Sulaimani

Supervised by Dr. Soran Ab. Saeed Assistant Professor

2017, May

Dr. Alaa Kh. Jumaa Lecturer

2717, Jozardan

‫ﺴ ِﻢ ﱠ‬ ‫ﯿﻢ‬ ‫ﺑِ ْ‬ ‫ﷲِ اﻟ ﱠﺮ ْﺣﻤٰ َ ِﻦ اﻟ ﱠﺮ ِﺣ ِ‬ ‫وح ِﻣﻦْ أَ ْﻣ ِﺮ َرﺑﱢﻲ‬ ‫) َوﯾَ ْ‬ ‫وح ﻗُ ِﻞ ﱡ‬ ‫ﺴﺄَﻟُﻮﻧَﻚَ َﻋ ِﻦ ﱡ‬ ‫اﻟﺮ ُ‬ ‫اﻟﺮ ِ‬ ‫َو َﻣﺎ أُوﺗِﯿﺘُ ْﻢ ِﻣ َﻦ ا ْﻟ ِﻌ ْﻠ ِﻢ إِ ﱠﻻ ﻗَﻠِ ً‬ ‫ﯿﻼ‪(.‬‬ ‫ﺻ َﺪق ْ ﱠ‬ ‫ﷲ ا ْﻟ َﻌ ِﻈﯿﻢ‬ ‫ﺳﻮرة اﻻﺳﺮاء اﻵﯾﺔ‪٨٥‬‬

Supervisor Certification

I certify that the preparation of thesis titled "Design and Implement Secure Cloud Computing System Based on Hadoop"accomplished by (Ribwar Khalid Mohammed), was prepared under my supervision in the college of Science, at the University of Sulaimani, as partial fulfillment of the requirements for the degree of Master of Science in (Computer).

Signature: Name: Dr. Soran A. Saeed Title: Assistant Professor Date:

/

/ 2017

Signature: Name: Dr. Alaa K. Jumaah Title: Lecturer Date:

/

/ 2017

In view of the available recommendation, I forward this thesis for debate by the examining committee

Signature: Name: Aree Ali Mohammed Title: Professor Date:

/

/ 2017

Linguistic Evaluation Certification I herby certify that this thesis titled "Design and Implement Secure Cloud Computing System Based on Hadoop" prepared by (Ribwar Khalid Mohammed), has been read and checked and after indicating all the grammatical and spelling mistakes; the thesis was given again to the candidate to make the adequate corrections. After the second reading, I found that the candidate corrected the indicated mistakes. Therefore, I certify that this thesis is free from mistakes.

Signature: Name: Soma Nawzad Abubakr Position: English Department, College of Languages, University of Sulaimani Date:

/

/ 2017

Examining Committee Certification We certify that we have read this thesis entitled "Design and Implement Secure Cloud Computing System Based on Hadoop" was prepared by (Ribwar Khalid Mohammed), and as Examining Committee, examined the student in its content and in what is connected with it, and in our opinion it meets the basic requirements toward the degree of Master of Science in Computer. Signature:

Signature:

Name: Dr.Sufyan T. Faraj

Name: Dr. Najmadin W. Abdulrahman

Title: Professor

Title: Lecturer

Date:

Date:

/

/ 2017

(Chairman)

/

/ 2017

(Member)

Signature:

Signature:

Name: Dr.Fadhil S. Abed

Name: Dr. Soran A. Saeed

Title: Assistant Professor

Title: Assistant Professor

Date:

Date:

/

/ 2017

(Member)

/

/ 2017

(Member- Supervisor)

Signature: Name: Dr. Alaa K. Jumaa Title: Lecturer Date:

/

/ 2017

(Member- Co-Supervisor) Approved by the Dean of the College of Science. Signature: Name: Dr. Bakhtiar Q. Aziz Title: Professor Date:

/

/ 2017

Acknowledgements First of all, my great thanks to Allah who helped me and gave me the ability to fulfill this work. We thank everybody who helped us to complete this project specially my supervisor Lecturer Dr. Alaa K. jumaa and Assistant Professor Dr.Soran A. Saeed for his help. Special thanks to my wife Miss.Shaida, for her encouragements, scientific notes, and support that she has shown during my study and to finalize this work . Special thanks to my father, my mother and all my family for their endless support, understanding and encouragement. They have taken their part of suffering and sacrifice during the entire phase of my research. Special thank goes to those who helped me during this work. I am glad to have this work done, thanks to my colleagues and the entire faculty members.

Dedications

This thesis is dedicated to

My mother and father my son

our families

our friends

Computer Department

all who shared by any support .

Ribwar

Abstract A proposed secure cloud computing system has been built using Linux OS and Hadoop package. Hadoop package was utilized to build the area for saving and managing users’ source ~/.bashrc

A-Edit core-site.xml edit $HADOOP_HOME/etc/hadoop/hadoop-env.sh file 70

fs.default.name hdfs://localhost:9000

B-Edit hdfs-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/hdfs-site.xml dfs.replication 1 dfs.namenode.name.dir file:/usr/local/hadoop_tmp/hdfs/namenode dfs.datanode.data.dir file:/usr/local/hadoop_tmp/hdfs/datanode

C-Edit yarn-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/yarn-site.xml yarn.nodemadnager.aux-services mapreduce_shuffle yarn.nodemanager.aux-services.mapreduce.shuffle.class org.apache.hadoop.mapred.ShuffleHandler

71

D-Edit mapred-site.xml cp /usr/local/hadoop/etc/hadoop/mapred-site.xml.template /usr/local/hadoop/etc/hadoop/mapred-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/mapred-site.xml mapreduce.framework.name yarn

72

References

[1]

Venkata Sravan Kumar , (2011)“Security Techniques for Protecting Data in Cloud Computing”, MSc, School of Computing Blekinge Institute

of

Technology SE - 371 79 Karlskrona Sweden . [2]

D. Anil Kumar, Y. Manasa,(2015)“A Survey on Security Issues in Cloud Computing”, International Journal for Development of Computer Science & Technology ,vol. 7884 Issue- V-3, I-5, SW-23.

[3] Poonam M. Pardeshi , Deepali R. Borade,(2015)”Improving Data Integrity for Data Storage Security in Cloud Computing”, International Journal of Computer Science and Network Security, vol. 15, no. 6, pp. 75–82.

[4] Mandeep Kaur and Manish Mahajan,(2013)”Using encryption Algorithms to enhance the Data Security in Cloud Computing”, International Journal of Communication and Computer Technologies vol. 01, no. 12, pp. 56–59.

[5]

Mohammed

A.

AlZain,Eric

Pardede

,Ben

Soh

and

James

A.

Thom,(2012)“Cloud Computing Security: From Single to Multi-Clouds”, 45th Hawaii International Conference on System Sciences, Pages: 5490 5499, DOI: 10.1109/HICSS.2012.153 .

[6]

Yashpalsinh

Jadeja

and

Kirit

Modi,(2012)“Cloud

Computing

Concepts, Architecture and Challenges “,International Conference on Computing,

Electronics

and

Electrical

880,DOI:10.1109/ICCEET. 73

Technologies

,Page

:877

[7] Available https://www.tutorialspoint.com,access on May 2016.

[8]

H. Karajeh, M. Maqableh, and T. Masa ,(2014) “Security of Cloud Computing Environment”, International Business Information Management Association Conference ,pp. 2202–2215.

[9] Suresh Kumar R G,(2014)“Security Facet in Cloud Computing “,International Journal of Advanced Research in

Computer Science and Software

Engineering, vol. 4, no. 5, pp. 964–967.

[10]

Sudhansu Ranjan Lenka1, Biswaranjan Nayak2 k,(2014)“Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm”,International Journal of Computer Science Trends

and

Technology ,vol. 2, no. 3, pp. 60–64.

[11]

Nikisha J. Mithaiwala , Nikisha B. Jariwala ,(2016) “A Study on Cloud Computing and its Security”,International Journal of Innovations & Advancement in Computer Science ,ISSN 2347 – 8616 vol. 5, no. 4, pp. 1–6.

[12] Anca Apostu, Florina Puican, Geanina Ularu, George Suciu and GyorgyTodoran,(2012)”Study on advantages and disadvantages of Cloud Computing – the advantages of Telemetry Applications in the Cloud”,Recent Advances in Applied Computer Science and Digital Services, ISBN: 978-161804-179-1 . [13]

Pooja.D.Bardiya1, Miss. Rutuja.A.Gulhane , Dr. Prof. P.P.Karde, (2014) “Data Security using Hadoop on Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol. 3, no. 4, pp. 802–809. 74

[14]

Ya Liu ,(2012) “Data Security in Cloud Computing”, MSc, Eindhoven University of Technology .

[15] Atul Patel and Kalpit Soni ,(2014) “Three Major Security Issues in Single Cloud Environment”, International Journal of Advanced Research in Computer Science and Software Engineering , ISSN: 2277 128X, vol. 4, no. 4, pp. 268–271.

[16]

Krunal Suthar,Parmalik Kumar,Gupta and Hiren Patel,(2012)“Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment “,International Journal of Computer Applications (0975 – 8887), vol. 60, no. 19, pp. 16–19 .

[17] Prashant Rewagad and Ms.Yogita Pawar,(2013) “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, International Conference on Communication Systems and Network Technologies, DOI 10.1109/CSNT..

[18]

Sudhansu Ranjan Lenka and Biswaranjan Nayak,(2014) “Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm”, international Journal of Computer Science Trends and Technology ,vol. 2, no. 3, pp. 60–64..

[19]

Vishwanath S Mahalle and Aniket K Shahade,(2014) “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa&Aes) Encryption Algorithm”,IEEE,Pages: 146 149, DOI: 10.1109/INPAC.2014.6981152.

75

[20]

H.Mehak and Gagandeep,(2014)“Improving Data Storage Security in Cloud using Hadoop”, International Journal of Engineering Research and Applications ,vol. 4, no. 9, pp. 133–138.

[21] P. Kulurkar ,Ruchira. H. Titare1,(2015) “Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server”, International Journal of Engineering Science & Advanced Technology,Volume-5, Issue-2, pp,149-153

[22] Nandita Sengupta,(2015)“Designing of Hybrid RSA Encryption Algorithm for Cloud Security”, International Journal of Innovative Research in Computer and Communication Engineering ,pp. 4146–4152.

[23] Santosh Kumar Singh, Dr. P.K. Manjhi and Dr. R.K. Tiwari,(2016) “Data Security using RSA Algorithm in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified .

[24]

Wentao Liu,( 2012) “Research on Cloud Computing Security Problem and Strategy” , Department of Computer and Information Engineering, Wuhan Polytechnic University, Wuhan Hubei Province 430023, China .

[25]

Varsha Alangar ,( 2013)“ Cloud Computing Security and Encryption” International Journal of Advance Research in Management Studies, vol. 1, no. 5, pp. 58–63 .

76

Computer Science and

[26] S. B. Dash, H.Saini , T.C.Panda , A. Mishra,(2014) “ A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm” Journal of Engineering Research and Applications, vol. 4, no. 6, pp. 248– 254.

[27]

Gurpreet Kaur and Manish Mahajan, (2013) “Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms” International Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct, pp.782-786 .

[28] Mandeep Kaur and Manish Mahajan,(2013)”Using encryption Algorithms to enhance the Data Security in Cloud Computing” International Journal of Communication and Computer Technologies, vol. 01, no. 12, pp. 56–59.

[29] Kangchan Lee,(2012)“Security Threats in Cloud Computing Environments” International Journal of Security and Its Applications, vol. 6, no. 4, pp.2532.

[30]

Shreya Srivastav and Neeraj Verma ,(2015)“Improving Data Security in Cloud Computing Using RSA Algorithm and MD5 Algorithm “,International Journal of Innovative Research in Science,Engineering and Technology pp. 5450–5457.

[31]

Pachipala Yellamma, C h a lla Narasimham and Velagapudi sreenivas ,(2013) “Data Security In Cloud Using Rsa”, International Conference on Computing,

Communications

and

DOI: 10.1109/ICCCNT.2013.6726471 . 77

Networking

Technologies,

[32] Mzhda Hiwa Hama,(2015) “Sentimental Analysis Of Big Data Using Naïve Bayes And Neural Network”, MSc, University of Sulaimani [33]

Hadoop

characteristics,

available

at:https://www

01.ibm.com/software/au/data/infosphere/hadoop/ accessed on 29/09/2016.

[34]

Ketaki Subhash Raste,(2014)"Big Data Analytics -Hadoop Performance Analysis", M.Sc. Thesis, San Deng State University .

[35]

Konstantin Shvachko, Hairong Kuang, Sanjay Radia and Robert Chansler,(2010)” The Hadoop Distributed File System”, IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST) 1 10, DOI: 10.1109/MSST.2010.5496972

[36]

Benoy Bhagattjee, ( 2014) “Emergence and Taxonomy of Big Data as a Service”,MSc,Composite Information Systems Laboratory (CISL) Sloan School

of

Management,

Massachusetts

Institute

of

Technology

Cambridge,MSc,Massachusetts Institute of Technology . [37] Jeffrey Dean and Sanjay Ghemawa, (2008) “MapReduce: simplified data processing on large clusters”, Communications of the ACM, vol. 51, no. 1, pp. 107–113. [38] Avalibale https://www.hadoop.apache.org/docs/r2.7.1/ on May 2016

78

           





     

.      .             

 

                          

                            , Data    Name Node    .     .Node  , HDFS . MapReduce cloud computing            cloud computing. , cloud computing. . , , RSA private key,RSA public , ,uploadfile.sh. key AES secret keykey . shell scripting programs .      .          .     .hosts, . (RSA and AES algorithms)             ,   cloud computing  Software as a Service (SaaS),

. Infrastructure as a Service (IaaS)Platform as a Service (PaaS) ,  cloud computing .  ,     , , ,   ,  RSA ..  AES   ,     .

 



  

     

       ..                 

                         

              (Hadoop)    (Apache Server) RSA SaaSAES IaaSPaaS 

     

Suggest Documents