There was a problem previewing this document. Retrying. ... Design and Implement Secure Cloud ComputingSystem Based on H
Design and Implement Secure Cloud Computing System Based on Hadoop
A thesis Submitted to the Council of the College of Science at the University of Sulaimani in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer
By Ribwar Khalid Mohammed B.Sc. Computer Science (2009), University of Sulaimani
Supervised by Dr. Soran Ab. Saeed Assistant Professor
2017, May
Dr. Alaa Kh. Jumaa Lecturer
2717, Jozardan
ﺴ ِﻢ ﱠ ﯿﻢ ﺑِ ْ ﷲِ اﻟ ﱠﺮ ْﺣﻤٰ َ ِﻦ اﻟ ﱠﺮ ِﺣ ِ وح ِﻣﻦْ أَ ْﻣ ِﺮ َرﺑﱢﻲ ) َوﯾَ ْ وح ﻗُ ِﻞ ﱡ ﺴﺄَﻟُﻮﻧَﻚَ َﻋ ِﻦ ﱡ اﻟﺮ ُ اﻟﺮ ِ َو َﻣﺎ أُوﺗِﯿﺘُ ْﻢ ِﻣ َﻦ ا ْﻟ ِﻌ ْﻠ ِﻢ إِ ﱠﻻ ﻗَﻠِ ً ﯿﻼ(. ﺻ َﺪق ْ ﱠ ﷲ ا ْﻟ َﻌ ِﻈﯿﻢ ﺳﻮرة اﻻﺳﺮاء اﻵﯾﺔ٨٥
Supervisor Certification
I certify that the preparation of thesis titled "Design and Implement Secure Cloud Computing System Based on Hadoop"accomplished by (Ribwar Khalid Mohammed), was prepared under my supervision in the college of Science, at the University of Sulaimani, as partial fulfillment of the requirements for the degree of Master of Science in (Computer).
Signature: Name: Dr. Soran A. Saeed Title: Assistant Professor Date:
/
/ 2017
Signature: Name: Dr. Alaa K. Jumaah Title: Lecturer Date:
/
/ 2017
In view of the available recommendation, I forward this thesis for debate by the examining committee
Signature: Name: Aree Ali Mohammed Title: Professor Date:
/
/ 2017
Linguistic Evaluation Certification I herby certify that this thesis titled "Design and Implement Secure Cloud Computing System Based on Hadoop" prepared by (Ribwar Khalid Mohammed), has been read and checked and after indicating all the grammatical and spelling mistakes; the thesis was given again to the candidate to make the adequate corrections. After the second reading, I found that the candidate corrected the indicated mistakes. Therefore, I certify that this thesis is free from mistakes.
Signature: Name: Soma Nawzad Abubakr Position: English Department, College of Languages, University of Sulaimani Date:
/
/ 2017
Examining Committee Certification We certify that we have read this thesis entitled "Design and Implement Secure Cloud Computing System Based on Hadoop" was prepared by (Ribwar Khalid Mohammed), and as Examining Committee, examined the student in its content and in what is connected with it, and in our opinion it meets the basic requirements toward the degree of Master of Science in Computer. Signature:
Signature:
Name: Dr.Sufyan T. Faraj
Name: Dr. Najmadin W. Abdulrahman
Title: Professor
Title: Lecturer
Date:
Date:
/
/ 2017
(Chairman)
/
/ 2017
(Member)
Signature:
Signature:
Name: Dr.Fadhil S. Abed
Name: Dr. Soran A. Saeed
Title: Assistant Professor
Title: Assistant Professor
Date:
Date:
/
/ 2017
(Member)
/
/ 2017
(Member- Supervisor)
Signature: Name: Dr. Alaa K. Jumaa Title: Lecturer Date:
/
/ 2017
(Member- Co-Supervisor) Approved by the Dean of the College of Science. Signature: Name: Dr. Bakhtiar Q. Aziz Title: Professor Date:
/
/ 2017
Acknowledgements First of all, my great thanks to Allah who helped me and gave me the ability to fulfill this work. We thank everybody who helped us to complete this project specially my supervisor Lecturer Dr. Alaa K. jumaa and Assistant Professor Dr.Soran A. Saeed for his help. Special thanks to my wife Miss.Shaida, for her encouragements, scientific notes, and support that she has shown during my study and to finalize this work . Special thanks to my father, my mother and all my family for their endless support, understanding and encouragement. They have taken their part of suffering and sacrifice during the entire phase of my research. Special thank goes to those who helped me during this work. I am glad to have this work done, thanks to my colleagues and the entire faculty members.
Dedications
This thesis is dedicated to
My mother and father my son
our families
our friends
Computer Department
all who shared by any support .
Ribwar
Abstract A proposed secure cloud computing system has been built using Linux OS and Hadoop package. Hadoop package was utilized to build the area for saving and managing users’ source ~/.bashrc
A-Edit core-site.xml edit $HADOOP_HOME/etc/hadoop/hadoop-env.sh file 70
fs.default.name hdfs://localhost:9000
B-Edit hdfs-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/hdfs-site.xml dfs.replication 1 dfs.namenode.name.dir file:/usr/local/hadoop_tmp/hdfs/namenode dfs.datanode.data.dir file:/usr/local/hadoop_tmp/hdfs/datanode
C-Edit yarn-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/yarn-site.xml yarn.nodemadnager.aux-services mapreduce_shuffle yarn.nodemanager.aux-services.mapreduce.shuffle.class org.apache.hadoop.mapred.ShuffleHandler
71
D-Edit mapred-site.xml cp /usr/local/hadoop/etc/hadoop/mapred-site.xml.template /usr/local/hadoop/etc/hadoop/mapred-site.xml sudo gedit /usr/local/hadoop/etc/hadoop/mapred-site.xml mapreduce.framework.name yarn
72
References
[1]
Venkata Sravan Kumar , (2011)“Security Techniques for Protecting Data in Cloud Computing”, MSc, School of Computing Blekinge Institute
of
Technology SE - 371 79 Karlskrona Sweden . [2]
D. Anil Kumar, Y. Manasa,(2015)“A Survey on Security Issues in Cloud Computing”, International Journal for Development of Computer Science & Technology ,vol. 7884 Issue- V-3, I-5, SW-23.
[3] Poonam M. Pardeshi , Deepali R. Borade,(2015)”Improving Data Integrity for Data Storage Security in Cloud Computing”, International Journal of Computer Science and Network Security, vol. 15, no. 6, pp. 75–82.
[4] Mandeep Kaur and Manish Mahajan,(2013)”Using encryption Algorithms to enhance the Data Security in Cloud Computing”, International Journal of Communication and Computer Technologies vol. 01, no. 12, pp. 56–59.
[5]
Mohammed
A.
AlZain,Eric
Pardede
,Ben
Soh
and
James
A.
Thom,(2012)“Cloud Computing Security: From Single to Multi-Clouds”, 45th Hawaii International Conference on System Sciences, Pages: 5490 5499, DOI: 10.1109/HICSS.2012.153 .
[6]
Yashpalsinh
Jadeja
and
Kirit
Modi,(2012)“Cloud
Computing
Concepts, Architecture and Challenges “,International Conference on Computing,
Electronics
and
Electrical
880,DOI:10.1109/ICCEET. 73
Technologies
,Page
:877
[7] Available https://www.tutorialspoint.com,access on May 2016.
[8]
H. Karajeh, M. Maqableh, and T. Masa ,(2014) “Security of Cloud Computing Environment”, International Business Information Management Association Conference ,pp. 2202–2215.
[9] Suresh Kumar R G,(2014)“Security Facet in Cloud Computing “,International Journal of Advanced Research in
Computer Science and Software
Engineering, vol. 4, no. 5, pp. 964–967.
[10]
Sudhansu Ranjan Lenka1, Biswaranjan Nayak2 k,(2014)“Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm”,International Journal of Computer Science Trends
and
Technology ,vol. 2, no. 3, pp. 60–64.
[11]
Nikisha J. Mithaiwala , Nikisha B. Jariwala ,(2016) “A Study on Cloud Computing and its Security”,International Journal of Innovations & Advancement in Computer Science ,ISSN 2347 – 8616 vol. 5, no. 4, pp. 1–6.
[12] Anca Apostu, Florina Puican, Geanina Ularu, George Suciu and GyorgyTodoran,(2012)”Study on advantages and disadvantages of Cloud Computing – the advantages of Telemetry Applications in the Cloud”,Recent Advances in Applied Computer Science and Digital Services, ISBN: 978-161804-179-1 . [13]
Pooja.D.Bardiya1, Miss. Rutuja.A.Gulhane , Dr. Prof. P.P.Karde, (2014) “Data Security using Hadoop on Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol. 3, no. 4, pp. 802–809. 74
[14]
Ya Liu ,(2012) “Data Security in Cloud Computing”, MSc, Eindhoven University of Technology .
[15] Atul Patel and Kalpit Soni ,(2014) “Three Major Security Issues in Single Cloud Environment”, International Journal of Advanced Research in Computer Science and Software Engineering , ISSN: 2277 128X, vol. 4, no. 4, pp. 268–271.
[16]
Krunal Suthar,Parmalik Kumar,Gupta and Hiren Patel,(2012)“Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment “,International Journal of Computer Applications (0975 – 8887), vol. 60, no. 19, pp. 16–19 .
[17] Prashant Rewagad and Ms.Yogita Pawar,(2013) “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, International Conference on Communication Systems and Network Technologies, DOI 10.1109/CSNT..
[18]
Sudhansu Ranjan Lenka and Biswaranjan Nayak,(2014) “Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm”, international Journal of Computer Science Trends and Technology ,vol. 2, no. 3, pp. 60–64..
[19]
Vishwanath S Mahalle and Aniket K Shahade,(2014) “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa&Aes) Encryption Algorithm”,IEEE,Pages: 146 149, DOI: 10.1109/INPAC.2014.6981152.
75
[20]
H.Mehak and Gagandeep,(2014)“Improving Data Storage Security in Cloud using Hadoop”, International Journal of Engineering Research and Applications ,vol. 4, no. 9, pp. 133–138.
[21] P. Kulurkar ,Ruchira. H. Titare1,(2015) “Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server”, International Journal of Engineering Science & Advanced Technology,Volume-5, Issue-2, pp,149-153
[22] Nandita Sengupta,(2015)“Designing of Hybrid RSA Encryption Algorithm for Cloud Security”, International Journal of Innovative Research in Computer and Communication Engineering ,pp. 4146–4152.
[23] Santosh Kumar Singh, Dr. P.K. Manjhi and Dr. R.K. Tiwari,(2016) “Data Security using RSA Algorithm in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified .
[24]
Wentao Liu,( 2012) “Research on Cloud Computing Security Problem and Strategy” , Department of Computer and Information Engineering, Wuhan Polytechnic University, Wuhan Hubei Province 430023, China .
[25]
Varsha Alangar ,( 2013)“ Cloud Computing Security and Encryption” International Journal of Advance Research in Management Studies, vol. 1, no. 5, pp. 58–63 .
76
Computer Science and
[26] S. B. Dash, H.Saini , T.C.Panda , A. Mishra,(2014) “ A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm” Journal of Engineering Research and Applications, vol. 4, no. 6, pp. 248– 254.
[27]
Gurpreet Kaur and Manish Mahajan, (2013) “Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms” International Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct, pp.782-786 .
[28] Mandeep Kaur and Manish Mahajan,(2013)”Using encryption Algorithms to enhance the Data Security in Cloud Computing” International Journal of Communication and Computer Technologies, vol. 01, no. 12, pp. 56–59.
[29] Kangchan Lee,(2012)“Security Threats in Cloud Computing Environments” International Journal of Security and Its Applications, vol. 6, no. 4, pp.2532.
[30]
Shreya Srivastav and Neeraj Verma ,(2015)“Improving Data Security in Cloud Computing Using RSA Algorithm and MD5 Algorithm “,International Journal of Innovative Research in Science,Engineering and Technology pp. 5450–5457.
[31]
Pachipala Yellamma, C h a lla Narasimham and Velagapudi sreenivas ,(2013) “Data Security In Cloud Using Rsa”, International Conference on Computing,
Communications
and
DOI: 10.1109/ICCCNT.2013.6726471 . 77
Networking
Technologies,
[32] Mzhda Hiwa Hama,(2015) “Sentimental Analysis Of Big Data Using Naïve Bayes And Neural Network”, MSc, University of Sulaimani [33]
Hadoop
characteristics,
available
at:https://www
01.ibm.com/software/au/data/infosphere/hadoop/ accessed on 29/09/2016.
[34]
Ketaki Subhash Raste,(2014)"Big Data Analytics -Hadoop Performance Analysis", M.Sc. Thesis, San Deng State University .
[35]
Konstantin Shvachko, Hairong Kuang, Sanjay Radia and Robert Chansler,(2010)” The Hadoop Distributed File System”, IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST) 1 10, DOI: 10.1109/MSST.2010.5496972
[36]
Benoy Bhagattjee, ( 2014) “Emergence and Taxonomy of Big Data as a Service”,MSc,Composite Information Systems Laboratory (CISL) Sloan School
of
Management,
Massachusetts
Institute
of
Technology
Cambridge,MSc,Massachusetts Institute of Technology . [37] Jeffrey Dean and Sanjay Ghemawa, (2008) “MapReduce: simplified data processing on large clusters”, Communications of the ACM, vol. 51, no. 1, pp. 107–113. [38] Avalibale https://www.hadoop.apache.org/docs/r2.7.1/ on May 2016
78
. .
, Data Name Node . .Node , HDFS . MapReduce cloud computing cloud computing. , cloud computing. . , , RSA private key,RSA public , ,uploadfile.sh. key AES secret keykey . shell scripting programs . . . .hosts, . (RSA and AES algorithms) , cloud computing Software as a Service (SaaS),
. Infrastructure as a Service (IaaS)Platform as a Service (PaaS) , cloud computing . , , , , , RSA .. AES , .
..
(Hadoop) (Apache Server) RSA SaaSAES IaaSPaaS