SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1922 | P a g e
Secure User Data in Cloud Computing Using Encryption
Algorithms
Anshu Parashar*, Rachna Arora**
*(Assistant Professor, HCTM, Kaithal, Haryana)
** (Research Scholar, HCTM, Kaithal, Haryana)
ABSTRACT
Cloud Computing is transforming
information technology. As information and
processes are migrating to the cloud, it is
transforming not only where computing is done,
but also fundamentally, how it is done. As
increasingly more corporate and academic worlds
invest in this technology, it will also drastically
change IT professionals’ working environment.
Cloud Computing solves many problems of
conventional computing, including handling peak
loads, installing software updates, and, using
excess computing cycles. However, the new
technology has also created new challenges such as
data security, data ownership and trans-code data
storage. In this paper we have discussed about
cloud computing security issues, mechanism,
challenges that cloud service provider face during
cloud engineering and presented the metaphoric
study of various security algorithms.
Keywords - Algorithms: AES, Blowfish, DES, RSA,
Cloud Computing, Data Security
I. INTRODUCTION
Cloud Computing is the ability to access a
pool of computing resources owned and maintained
by a third party via the Internet. It is not a new
technology but a way of delivering computing
resources based on long existing technologies such as
server virtualization. The “cloud” is composed of
hardware, storage, networks, interfaces, and services
that provide the means through which users can
access the infrastructures, computing power,
applications, and services on demand which are
independent of locations. Cloud computing usually
involves the transfer, storage, and processing of
information on the „providers‟ infrastructure, which
is not included in the „customers‟ control policy.
The concept Cloud Computing is linked
closely with those of Information as a Service (IaaS),
Platform as a Service (PaaS), Software as a Service
(SaaS) all of which means a service oriented
architecture [1]. Here comes the first benefit of the
Cloud Computing i.e. it reduces the cost of hardware
that could have been used at user end. As there is no
need to store data at user‟s end because it is already
at some other location. So instead of buying the
whole infrastructure required to run the processes and
save bulk of data which You are just renting the
assets according to your requirements.
The similar idea is behind all cloud network
[2].It uses remote services through a network using
various resources. It is basically meant to give
maximum with the minimum resources i.e. the user
end is having the minimum hardware requirement but
is using the maximum capability of computing. This
is possible only through this technology which
requires and utilizes its resources in the best way.
The advantage of cloud computing over traditional
computing include: agility, lower entry cost, device
independency, location independency, and
scalability [1]. In order to solve the problem of data
integrity checking, many schemes are proposed
under different systems and security models [2], [3],
[4], [5], [6]. In all these works, great efforts are made
to design solutions that meet various requirements:
high scheme efficiency, stateless verification,
unbounded use of queries and retrievability of data,
etc. Considering the role of the verifier in the model
all the schemes presented before fall into two
categories: private auditability and public
auditability. Although schemes with private
auditability can achieve higher scheme efficiency,
public auditability allows anyone not just the client
(data owner), to challenge the cloud server for
correctness of data storage while keeping no private
information.
II. SECURITY ISSUES AND CHALLENGES OF
CLOUD COMPUTING
Security is considered as one of the most
critical aspects in everyday computing and it is not
different for cloud computing due to sensitivity and
importance of data stored on the cloud. Cloud
Computing infrastructure uses new technologies and
services, most of which haven‟t been fully evaluated
with respect to the security. Cloud Computing has
several major issues and concerns, such as data
security, trust, expectations, regulations, and
performances issues.
One issue with cloud computing is that the
management of the data which might not be fully
trustworthy; the risk of malicious insiders in the
cloud and the failure of cloud services have received
a strong attention by companies.
Whenever we discussed about security of cloud
computing, there are various security issues arise in
Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1923 | P a g e
path of cloud. Some of the security concerns and
solutions of them are listed and directed below:
2.1 SECURITY CONCERN 1
With the cloud physical security is lost
because of sharing computing resources with other
companies. No knowledge or control of where the
resources run.
ENSUE: Secure Data Transfer
2.2 SECURITY CONCERN 2
Ensuring the integrity of the data (transfer,
storage, and retrieval) really means that it changes
only in response to authorized transactions. A
common standard to ensure data integrity does not
yet exists.
ENSUE: Secure Software Interfaces
2.3 SECURITY CONCERN 3
Customer may be able to sue cloud service
providers if privacy rights are violated, and in any
case the cloud service providers may face damage to
their reputation. Concerns arise when it is not clear to
individuals why their personal information is
requested or how it will be used or passed on to other
parties.
ENSUE: Data Separation
2.4 SECURITY CONCERN 4
Who controls the encryption/decryption
keys? Logically it should be the customer.
ENSUE: Secure Stored Data
2.5 SECURITY CONCERN 5
In case of Payment Card Industry Data
Security Standard (PCI DSS) data logs must be
provide to security mangers and regulators [6], [7],
[8].
ENSUE: User Access Control
III. PROBLEM FORMULATION
There are various policies issues and threats
in cloud computing technology which include
privacy, segregation, storage, reliability, security,
capacity and more. But most important among these
to concern is security and how service provider
assures it to maintain. Generally cloud computing has
several customers such as ordinary users, academia
and enterprises who have different motivations to
move to cloud. If cloud clients are academia, security
effect on performance of computing and for them
cloud providers have to find a way to combine
security and performance. For enterprises most
important problem is also security but with different
vision. So, we mainly concentrate on USER_CLOUD
security of cloud computing using encryption
algorithm using particular proposed plan.
IV. PROPOSED WORK PLAN
We have proposed different security
algorithms to eliminate the concerns regarding data
loss, segregation and privacy while accessing web
application on cloud. Algorithms like: RSA, DES,
AES, Blowfish have been used and comparative
study among them have also been presented to ensure
the security of data on cloud. DES, AES, Blowfish
are symmetric key algorithms, in which a single key
is used for both encryption/decryption of messages
whereas DES (Data Encryption Standard) was
developed in early 1970s by IBM. Blowfish was
designed by Bruce Schneier in 1993, expressly for
use in performance constrained environments such as
embedded system. AES (Advanced Encryption
Standard) was designed by NIST in 2001. RSA is a
public key algorithm invented by Rivest, Shamir and
Adleman in 1978 and also called as Asymmetric key
algorithm, the algorithm that uses different keys for
encryption and decryption purposes. The key sizes of
all the algorithms are different from each other. The
key length of DES algorithm is 56 bits. The key size
of AES algorithm is 128, 192, 256 bits. The key size
of Blowfish algorithm is 128-448 bits. The key size
of RSA algorithm is 1024 bits.
Using Net beans IDE 7.3, and Java Run Time
Environment, we have implemented our idea in the
form of encryption and decryption algorithms which
have discussed above and also we have made
comparison between them on the basis of their
characteristics.
V. SECURITY ALGORITHM USED IN CLOUD
COMPUTING
5.1 RSA ALGORITHM
The most common Public Key algorithm is
RSA, named for its inventors Rivest, Shamir, and
Adleman (RSA). RSA is basically an asymmetric
encryption /decryption algorithm. It is asymmetric
in the sense, that here public key distributed to all
through which one can encrypt the message and
private key which is used for decryption is kept
secret and is not shared to everyone.
How RSA is going to work in cloud
environment is explained as: RSA algorithm is used
to ensure the security of data in cloud computing. In
RSA algorithm we have encrypted our data to
provide security. The purpose of securing data is that
only concerned and authorized users can access it.
After encryption data is stored in the cloud. So that
when it is required then a request can be placed to
cloud provider. Cloud provider authenticates the user
and delivers the data to user. As RSA is a Block
Cipher in which every message is mapped to an
integer. In the proposed cloud environment, Public
key is known to all, whereas Private Key known
only to user who originally owns the data. Thus
encryption is done by the cloud service provider and
decryption is done by the cloud user or consumer.
Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1924 | P a g e
Once the data is encrypted with the Public key, it
will be decrypted using the corresponding Private
Key only.
5.2 AES ALGORITHM
Advanced Encryption Standard (AES), also
known as Rijindael is used for securing information.
AES is a symmetric block cipher that has been
analyzed extensively and is used widely now-a-days.
How AES works in cloud environment? AES,
symmetric key encryption algorithm is used with key
length of 128-bits for this purpose. As AES is used
widely now-a-days for security of cloud.
Implementation proposal states that First, User
decides to use cloud services and will migrate his
data on cloud. Then User submits his services
requirements with Cloud Service Provider (CSP) and
chooses best specified services offered by provider.
When migration of data to the chosen CSP happens
and in future whenever an application uploads any
data on cloud, the data will first encrypted using
AES algorithm and then sent to provider. Once
encrypted, data is uploaded on the cloud, any request
to read the data will occur after it is decrypted on the
users end and then plain text data can be read by
user. The plain text data is never written anywhere
on cloud. This includes all types of data. This
encryption solution is transparent to the application
and can be integrated quickly and easily without any
changes to application. The key is never stored next
to the encrypted data, since it may compromise the
key also. To store the keys, a physical key
management server can be installed in the user‟s
premises. This encryption protects data and keys and
guarantees that they remain under user‟s control and
will never be exposed in storage or in transit. AES
has replaced the DES as approved standard for a
wide range of applications.
5.3 DES ALGORITHM
The Data Encryption Standard (DES) is a
block cipher. It encrypts data in blocks of size 64 bits
each. That is 64 bits of plain text goes as input to
DES, which produces 64 bits of cipher text. The same
algorithm and key are used for encryption and
decryption, with minor differences. The key length of
this algorithm is 56 bits; however a 64 bits key is
actually input. DES is therefore a symmetric key
algorithm.
5.4 BLOWFISH ALGORITHM
Blowfish is a symmetric key cryptographic
algorithm. Blowfish encrypts 64 bit blocks with a
variable length key of 128-448 bits. According to
Schneier, Blowfish was designed with the followings
objectives in mind:
a) Fast- Blowfish encryption rate on 32-bit
microprocessors is 26 clock cycles per byte.
b) Compact- Blowfish can execute in less than 5
kb memory.
c) Simple-Blowfish uses only primitive operation
-s, such as addition, XOR and table look up,
making its design and implementation simple.
d) Secure- Blowfish has a variable key length up
to maximum of 448-bit long, making it both
secure and flexible.
Blowfish suits applications where the key remains
constant for a long time (e.g. Communications link
encryption), but not where the key changes
frequently (e.g. Packet Switching).
5.5 IMPLEMENTATION OF ALGORITHMS
Implementation of algorithms has been done
using NetBeans IDE and Java.
Coding examples of algorithms have shown below:
Example Coding 1 for making Cloud data secure
Example Coding 2 for making Cloud data secure
5.6 RESULTS
5.6.1 CHARACTERISTICS AND COMPARISON OF
ALGORITHMS
TABLE 1
Charact
eristics
AES RSA BLOW
FISH
DES
Platfor
m
Cloud
Computi
ng
Cloud
Computi
ng
Cloud
Comput
ing
Clou
d
Com
putin
g
Key Size 128,192,
256 bits
1024
bits
32-448
bits
56
bits
Key
Used
Same
key is
Public
key is
Same
key is
For
encr
Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1925 | P a g e
used to
encrypt
and
decrypt
the
blocks.
used for
encrypti
on and
private
key, for
decrypti
on
used for
both
encrypti
on and
decrypti
on of
data.
yptio
n
and
decr
yptio
n
same
key
is
used.
Scalabili
ty
Scalable Not
Scalable
Scalable Scal
able
Initial
Vector
Size
128 bits 1024
bits
64 bits 64
bits
Security Secure
for both
provider
and user.
Secure
for user
only
Secure
for both
provider
s and
user/clie
nt side
Secu
rity
appli
ed to
both
prov
iders
and
user
Data
Encrypt
ion
Capacit
y
Used for
encryptio
n of large
amount
of data
Used for
encrypti
on of
small
data
Less
than
AES
Less
than
AES
Authent
ication
Type
Best
authentic
ity
provider
Robust
authenti
cate
impleme
ntation
Compar
able to
AES
Less
auth
entic
ation
type
than
AES
.
Memory
Usage
Low
RAM
needed
Highest
memory
usage
algorith
m
Can
execute
in less
than 5
kb
Mor
e
than
AES
Executi
on Time
Faster
than
others
Requires
maximu
m time
Lesser
time to
execute
Equa
ls to
AES
VI. CONCLUSION AND FUTURE PROSPECTS
In this paper we have proposed encryption
algorithm to make cloud data secure and vulnerable
and we gave concern to security issues, challenges
and made comparison between AES, DES,
BLOWFISH and RSA Algorithms to find the best
one security algorithm, which has to be used in cloud
computing for making cloud data secure and not to
be hacked by attackers.
Encryption algorithms play an important
role in data security on cloud and by comparison of
different parameters used in algorithms, we have
found that AES algorithm uses least time to execute
cloud data. Blowfish algorithm has least memory
requirement. DES algorithm consumes least
encryption time. RSA consumes longest memory size
and encryption time. By doing implementation for all
algorithms in IDE tool and JDK 1.7 we have
achieved the desired output for our data on cloud
computing. In today‟s era demand of cloud is
increasing so the security of the cloud and user is on
top concern. Our proposed algorithms are helpful for
today‟s requirement. In future we can provide several
comparisons with our approach with result to show
effectiveness of our proposed framework.
ACKNOWLEDGEMENT
Our Thanks to HCTM, Kaithal for
development of this paper.
REFERENCES
Journal Papers:
[1] Zhidong Shen, Li Li , Fei Yan, Xiaoping
Wu , Cloud Computing System Based on
Trusted Computing Platform,(2010)
International Conference on Intelligent
Computation Technology and Automation.
[2] Mr. Pritesh Jain, Prof. Vaishali Chourey,
Prof. Dheeraj Rane, An Analysis of Cloud
Model-Based Security for Computing
Secure Cloud Bursting and Aggregation in
Real Environment, International Journal of
advanced Computer Research(IJACR)
Volume 1, September 2011.
[3] Rohit Bhadauria, Rituparna Chaki,
Nabendu Chaki and Sugata Sanyal,” A
Survey on Security Issues in Cloud
Computing”. IJRCCT, ISSN 2278-5841, Vol
1, Issue 4, September 2012.
[4] Mohammed, E.M, Ambelkadar, H.S,
Enhanced Data Security Model on Cloud
Computing, IEEE publication, 2012,8th
International Conference on, On page(s):cc-
12-cc-17
[5] Sang Ho.Na, Jun-Young Park, Eui- Nam
Huh, Personal Cloud Computing Security
Framework, Service Computing Conference
(APSSC), Dec 2010 IEEE, On page(s): 671-
675.
[6] Wang,J.K.;Xinpei Jia, Data Security and
Authentication in hybrid cloud computing
model, Global High Tech Congress on
Electronics (GHTCE), 2012 IEEE, On
page(s): 117-120.
[7] Iankoulova, I.; Daneya, M., Cloud
computing security reuirements: A
systematic review, Research Challenges in
Information Science (RCIS), 2012 Sixth
International Conference on, On page(s): 1
- 7.
Anshu Parashar, Rachna Arora / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
1926 | P a g e
[8] Cloud Security Alliance, Top Threats to
Cloud
ComputingV1.0,http://www.cloudsecurityall
iance.org/topthreats.
[9] Puneet Jai Kaur, Sakshi Kaushal, Security
Concerns in Cloud Computing,
Communication in Computer and
Information Science Volume169, 2011, pp
103-112.
[10] Pearson, S., Benameur, A., Privacy, Security
and Trust Issues Arises from Cloud
Computing, Cloud Computing Technology
and Science (CloudCom), 2010 IEEE
Second International Conference, On
page(s): 693-702.
Books:
[11] McGraw Hill, Cloud Computing, A Practical
Approach, By Toby Velte, Anthony Velte,
Robert Elsenpeter.
[12] Furht,B., and Escalante,A. (2010).
Handbook of Cloud Computing. New York:
Springer.
Chapters in Books:
[13] Cloud Computing, A Practical Approach,
Chapter 8, Cloud Storage, page(s): 234-253
in (2012) by Toby Velte, Anthony Velte, and
Robert Elsenpeter.
[14] Vamsee Krishna Yarlagadda and Sriram
Ramanujam, Data Security in Cloud
Computing, Vol 2 (1), page(s):15-23 in 2011
Proceeding Papers:
[15] W.J. Book, European Network and
Information Security Agency (ENISA), 29th
IEEE Conference on Cloud Computing
Benefits, Risks and Recommendations.

Weitere ähnliche Inhalte

Was ist angesagt?

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingIAEME Publication
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 

Was ist angesagt? (16)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Paper1
Paper1Paper1
Paper1
 

Andere mochten auch

Andere mochten auch (20)

FAO - Peru, casos de exito
FAO - Peru, casos de exitoFAO - Peru, casos de exito
FAO - Peru, casos de exito
 
DIPLOMAS BEATRIZ
DIPLOMAS BEATRIZDIPLOMAS BEATRIZ
DIPLOMAS BEATRIZ
 
Gestao da Inovacao - Processo e Projeto de Inovacao
Gestao da Inovacao - Processo e Projeto de InovacaoGestao da Inovacao - Processo e Projeto de Inovacao
Gestao da Inovacao - Processo e Projeto de Inovacao
 
Ssa1 resultado
Ssa1   resultadoSsa1   resultado
Ssa1 resultado
 
El lenguaje del cuerpo
El lenguaje del cuerpoEl lenguaje del cuerpo
El lenguaje del cuerpo
 
Autoestima
AutoestimaAutoestima
Autoestima
 
Foucault a verdade e as formas juridicas
Foucault   a verdade e as formas juridicasFoucault   a verdade e as formas juridicas
Foucault a verdade e as formas juridicas
 
Solecita...tic
Solecita...ticSolecita...tic
Solecita...tic
 
ADP\'s New Workforce Now Solution
ADP\'s New Workforce Now SolutionADP\'s New Workforce Now Solution
ADP\'s New Workforce Now Solution
 
14014 ch3
14014 ch314014 ch3
14014 ch3
 
Tema 11 ciudadanía 1º bachilerato
Tema 11 ciudadanía 1º bachileratoTema 11 ciudadanía 1º bachilerato
Tema 11 ciudadanía 1º bachilerato
 
NFR Framework
NFR FrameworkNFR Framework
NFR Framework
 
Investigacion Cualitativa Mapa Conceptual
Investigacion Cualitativa Mapa ConceptualInvestigacion Cualitativa Mapa Conceptual
Investigacion Cualitativa Mapa Conceptual
 
FB van der Meer 1.4
FB van der Meer 1.4FB van der Meer 1.4
FB van der Meer 1.4
 
El autoestima
El autoestimaEl autoestima
El autoestima
 
Hola
HolaHola
Hola
 
E-BOOK: ASSESSORIA DE IMPRENSA RESPONSÁVEL NA ERA DIGITAL
E-BOOK: ASSESSORIA DE IMPRENSA RESPONSÁVEL NA ERA DIGITALE-BOOK: ASSESSORIA DE IMPRENSA RESPONSÁVEL NA ERA DIGITAL
E-BOOK: ASSESSORIA DE IMPRENSA RESPONSÁVEL NA ERA DIGITAL
 
¿Sabías que tenemos más de una inteligencia?
¿Sabías que tenemos más de una inteligencia?¿Sabías que tenemos más de una inteligencia?
¿Sabías que tenemos más de una inteligencia?
 
10.05.04.01_questionário satisfação colaboradores
10.05.04.01_questionário satisfação colaboradores10.05.04.01_questionário satisfação colaboradores
10.05.04.01_questionário satisfação colaboradores
 
Linear Correlation
Linear Correlation Linear Correlation
Linear Correlation
 

Ähnlich wie Kp3419221926

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 

Ähnlich wie Kp3419221926 (20)

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
U04503119122
U04503119122U04503119122
U04503119122
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
C017421624
C017421624C017421624
C017421624
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Kp3419221926

  • 1. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926 1922 | P a g e Secure User Data in Cloud Computing Using Encryption Algorithms Anshu Parashar*, Rachna Arora** *(Assistant Professor, HCTM, Kaithal, Haryana) ** (Research Scholar, HCTM, Kaithal, Haryana) ABSTRACT Cloud Computing is transforming information technology. As information and processes are migrating to the cloud, it is transforming not only where computing is done, but also fundamentally, how it is done. As increasingly more corporate and academic worlds invest in this technology, it will also drastically change IT professionals’ working environment. Cloud Computing solves many problems of conventional computing, including handling peak loads, installing software updates, and, using excess computing cycles. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms. Keywords - Algorithms: AES, Blowfish, DES, RSA, Cloud Computing, Data Security I. INTRODUCTION Cloud Computing is the ability to access a pool of computing resources owned and maintained by a third party via the Internet. It is not a new technology but a way of delivering computing resources based on long existing technologies such as server virtualization. The “cloud” is composed of hardware, storage, networks, interfaces, and services that provide the means through which users can access the infrastructures, computing power, applications, and services on demand which are independent of locations. Cloud computing usually involves the transfer, storage, and processing of information on the „providers‟ infrastructure, which is not included in the „customers‟ control policy. The concept Cloud Computing is linked closely with those of Information as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) all of which means a service oriented architecture [1]. Here comes the first benefit of the Cloud Computing i.e. it reduces the cost of hardware that could have been used at user end. As there is no need to store data at user‟s end because it is already at some other location. So instead of buying the whole infrastructure required to run the processes and save bulk of data which You are just renting the assets according to your requirements. The similar idea is behind all cloud network [2].It uses remote services through a network using various resources. It is basically meant to give maximum with the minimum resources i.e. the user end is having the minimum hardware requirement but is using the maximum capability of computing. This is possible only through this technology which requires and utilizes its resources in the best way. The advantage of cloud computing over traditional computing include: agility, lower entry cost, device independency, location independency, and scalability [1]. In order to solve the problem of data integrity checking, many schemes are proposed under different systems and security models [2], [3], [4], [5], [6]. In all these works, great efforts are made to design solutions that meet various requirements: high scheme efficiency, stateless verification, unbounded use of queries and retrievability of data, etc. Considering the role of the verifier in the model all the schemes presented before fall into two categories: private auditability and public auditability. Although schemes with private auditability can achieve higher scheme efficiency, public auditability allows anyone not just the client (data owner), to challenge the cloud server for correctness of data storage while keeping no private information. II. SECURITY ISSUES AND CHALLENGES OF CLOUD COMPUTING Security is considered as one of the most critical aspects in everyday computing and it is not different for cloud computing due to sensitivity and importance of data stored on the cloud. Cloud Computing infrastructure uses new technologies and services, most of which haven‟t been fully evaluated with respect to the security. Cloud Computing has several major issues and concerns, such as data security, trust, expectations, regulations, and performances issues. One issue with cloud computing is that the management of the data which might not be fully trustworthy; the risk of malicious insiders in the cloud and the failure of cloud services have received a strong attention by companies. Whenever we discussed about security of cloud computing, there are various security issues arise in
  • 2. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926 1923 | P a g e path of cloud. Some of the security concerns and solutions of them are listed and directed below: 2.1 SECURITY CONCERN 1 With the cloud physical security is lost because of sharing computing resources with other companies. No knowledge or control of where the resources run. ENSUE: Secure Data Transfer 2.2 SECURITY CONCERN 2 Ensuring the integrity of the data (transfer, storage, and retrieval) really means that it changes only in response to authorized transactions. A common standard to ensure data integrity does not yet exists. ENSUE: Secure Software Interfaces 2.3 SECURITY CONCERN 3 Customer may be able to sue cloud service providers if privacy rights are violated, and in any case the cloud service providers may face damage to their reputation. Concerns arise when it is not clear to individuals why their personal information is requested or how it will be used or passed on to other parties. ENSUE: Data Separation 2.4 SECURITY CONCERN 4 Who controls the encryption/decryption keys? Logically it should be the customer. ENSUE: Secure Stored Data 2.5 SECURITY CONCERN 5 In case of Payment Card Industry Data Security Standard (PCI DSS) data logs must be provide to security mangers and regulators [6], [7], [8]. ENSUE: User Access Control III. PROBLEM FORMULATION There are various policies issues and threats in cloud computing technology which include privacy, segregation, storage, reliability, security, capacity and more. But most important among these to concern is security and how service provider assures it to maintain. Generally cloud computing has several customers such as ordinary users, academia and enterprises who have different motivations to move to cloud. If cloud clients are academia, security effect on performance of computing and for them cloud providers have to find a way to combine security and performance. For enterprises most important problem is also security but with different vision. So, we mainly concentrate on USER_CLOUD security of cloud computing using encryption algorithm using particular proposed plan. IV. PROPOSED WORK PLAN We have proposed different security algorithms to eliminate the concerns regarding data loss, segregation and privacy while accessing web application on cloud. Algorithms like: RSA, DES, AES, Blowfish have been used and comparative study among them have also been presented to ensure the security of data on cloud. DES, AES, Blowfish are symmetric key algorithms, in which a single key is used for both encryption/decryption of messages whereas DES (Data Encryption Standard) was developed in early 1970s by IBM. Blowfish was designed by Bruce Schneier in 1993, expressly for use in performance constrained environments such as embedded system. AES (Advanced Encryption Standard) was designed by NIST in 2001. RSA is a public key algorithm invented by Rivest, Shamir and Adleman in 1978 and also called as Asymmetric key algorithm, the algorithm that uses different keys for encryption and decryption purposes. The key sizes of all the algorithms are different from each other. The key length of DES algorithm is 56 bits. The key size of AES algorithm is 128, 192, 256 bits. The key size of Blowfish algorithm is 128-448 bits. The key size of RSA algorithm is 1024 bits. Using Net beans IDE 7.3, and Java Run Time Environment, we have implemented our idea in the form of encryption and decryption algorithms which have discussed above and also we have made comparison between them on the basis of their characteristics. V. SECURITY ALGORITHM USED IN CLOUD COMPUTING 5.1 RSA ALGORITHM The most common Public Key algorithm is RSA, named for its inventors Rivest, Shamir, and Adleman (RSA). RSA is basically an asymmetric encryption /decryption algorithm. It is asymmetric in the sense, that here public key distributed to all through which one can encrypt the message and private key which is used for decryption is kept secret and is not shared to everyone. How RSA is going to work in cloud environment is explained as: RSA algorithm is used to ensure the security of data in cloud computing. In RSA algorithm we have encrypted our data to provide security. The purpose of securing data is that only concerned and authorized users can access it. After encryption data is stored in the cloud. So that when it is required then a request can be placed to cloud provider. Cloud provider authenticates the user and delivers the data to user. As RSA is a Block Cipher in which every message is mapped to an integer. In the proposed cloud environment, Public key is known to all, whereas Private Key known only to user who originally owns the data. Thus encryption is done by the cloud service provider and decryption is done by the cloud user or consumer.
  • 3. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926 1924 | P a g e Once the data is encrypted with the Public key, it will be decrypted using the corresponding Private Key only. 5.2 AES ALGORITHM Advanced Encryption Standard (AES), also known as Rijindael is used for securing information. AES is a symmetric block cipher that has been analyzed extensively and is used widely now-a-days. How AES works in cloud environment? AES, symmetric key encryption algorithm is used with key length of 128-bits for this purpose. As AES is used widely now-a-days for security of cloud. Implementation proposal states that First, User decides to use cloud services and will migrate his data on cloud. Then User submits his services requirements with Cloud Service Provider (CSP) and chooses best specified services offered by provider. When migration of data to the chosen CSP happens and in future whenever an application uploads any data on cloud, the data will first encrypted using AES algorithm and then sent to provider. Once encrypted, data is uploaded on the cloud, any request to read the data will occur after it is decrypted on the users end and then plain text data can be read by user. The plain text data is never written anywhere on cloud. This includes all types of data. This encryption solution is transparent to the application and can be integrated quickly and easily without any changes to application. The key is never stored next to the encrypted data, since it may compromise the key also. To store the keys, a physical key management server can be installed in the user‟s premises. This encryption protects data and keys and guarantees that they remain under user‟s control and will never be exposed in storage or in transit. AES has replaced the DES as approved standard for a wide range of applications. 5.3 DES ALGORITHM The Data Encryption Standard (DES) is a block cipher. It encrypts data in blocks of size 64 bits each. That is 64 bits of plain text goes as input to DES, which produces 64 bits of cipher text. The same algorithm and key are used for encryption and decryption, with minor differences. The key length of this algorithm is 56 bits; however a 64 bits key is actually input. DES is therefore a symmetric key algorithm. 5.4 BLOWFISH ALGORITHM Blowfish is a symmetric key cryptographic algorithm. Blowfish encrypts 64 bit blocks with a variable length key of 128-448 bits. According to Schneier, Blowfish was designed with the followings objectives in mind: a) Fast- Blowfish encryption rate on 32-bit microprocessors is 26 clock cycles per byte. b) Compact- Blowfish can execute in less than 5 kb memory. c) Simple-Blowfish uses only primitive operation -s, such as addition, XOR and table look up, making its design and implementation simple. d) Secure- Blowfish has a variable key length up to maximum of 448-bit long, making it both secure and flexible. Blowfish suits applications where the key remains constant for a long time (e.g. Communications link encryption), but not where the key changes frequently (e.g. Packet Switching). 5.5 IMPLEMENTATION OF ALGORITHMS Implementation of algorithms has been done using NetBeans IDE and Java. Coding examples of algorithms have shown below: Example Coding 1 for making Cloud data secure Example Coding 2 for making Cloud data secure 5.6 RESULTS 5.6.1 CHARACTERISTICS AND COMPARISON OF ALGORITHMS TABLE 1 Charact eristics AES RSA BLOW FISH DES Platfor m Cloud Computi ng Cloud Computi ng Cloud Comput ing Clou d Com putin g Key Size 128,192, 256 bits 1024 bits 32-448 bits 56 bits Key Used Same key is Public key is Same key is For encr
  • 4. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926 1925 | P a g e used to encrypt and decrypt the blocks. used for encrypti on and private key, for decrypti on used for both encrypti on and decrypti on of data. yptio n and decr yptio n same key is used. Scalabili ty Scalable Not Scalable Scalable Scal able Initial Vector Size 128 bits 1024 bits 64 bits 64 bits Security Secure for both provider and user. Secure for user only Secure for both provider s and user/clie nt side Secu rity appli ed to both prov iders and user Data Encrypt ion Capacit y Used for encryptio n of large amount of data Used for encrypti on of small data Less than AES Less than AES Authent ication Type Best authentic ity provider Robust authenti cate impleme ntation Compar able to AES Less auth entic ation type than AES . Memory Usage Low RAM needed Highest memory usage algorith m Can execute in less than 5 kb Mor e than AES Executi on Time Faster than others Requires maximu m time Lesser time to execute Equa ls to AES VI. CONCLUSION AND FUTURE PROSPECTS In this paper we have proposed encryption algorithm to make cloud data secure and vulnerable and we gave concern to security issues, challenges and made comparison between AES, DES, BLOWFISH and RSA Algorithms to find the best one security algorithm, which has to be used in cloud computing for making cloud data secure and not to be hacked by attackers. Encryption algorithms play an important role in data security on cloud and by comparison of different parameters used in algorithms, we have found that AES algorithm uses least time to execute cloud data. Blowfish algorithm has least memory requirement. DES algorithm consumes least encryption time. RSA consumes longest memory size and encryption time. By doing implementation for all algorithms in IDE tool and JDK 1.7 we have achieved the desired output for our data on cloud computing. In today‟s era demand of cloud is increasing so the security of the cloud and user is on top concern. Our proposed algorithms are helpful for today‟s requirement. In future we can provide several comparisons with our approach with result to show effectiveness of our proposed framework. ACKNOWLEDGEMENT Our Thanks to HCTM, Kaithal for development of this paper. REFERENCES Journal Papers: [1] Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , Cloud Computing System Based on Trusted Computing Platform,(2010) International Conference on Intelligent Computation Technology and Automation. [2] Mr. Pritesh Jain, Prof. Vaishali Chourey, Prof. Dheeraj Rane, An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment, International Journal of advanced Computer Research(IJACR) Volume 1, September 2011. [3] Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal,” A Survey on Security Issues in Cloud Computing”. IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012. [4] Mohammed, E.M, Ambelkadar, H.S, Enhanced Data Security Model on Cloud Computing, IEEE publication, 2012,8th International Conference on, On page(s):cc- 12-cc-17 [5] Sang Ho.Na, Jun-Young Park, Eui- Nam Huh, Personal Cloud Computing Security Framework, Service Computing Conference (APSSC), Dec 2010 IEEE, On page(s): 671- 675. [6] Wang,J.K.;Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE), 2012 IEEE, On page(s): 117-120. [7] Iankoulova, I.; Daneya, M., Cloud computing security reuirements: A systematic review, Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, On page(s): 1 - 7.
  • 5. Anshu Parashar, Rachna Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926 1926 | P a g e [8] Cloud Security Alliance, Top Threats to Cloud ComputingV1.0,http://www.cloudsecurityall iance.org/topthreats. [9] Puneet Jai Kaur, Sakshi Kaushal, Security Concerns in Cloud Computing, Communication in Computer and Information Science Volume169, 2011, pp 103-112. [10] Pearson, S., Benameur, A., Privacy, Security and Trust Issues Arises from Cloud Computing, Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference, On page(s): 693-702. Books: [11] McGraw Hill, Cloud Computing, A Practical Approach, By Toby Velte, Anthony Velte, Robert Elsenpeter. [12] Furht,B., and Escalante,A. (2010). Handbook of Cloud Computing. New York: Springer. Chapters in Books: [13] Cloud Computing, A Practical Approach, Chapter 8, Cloud Storage, page(s): 234-253 in (2012) by Toby Velte, Anthony Velte, and Robert Elsenpeter. [14] Vamsee Krishna Yarlagadda and Sriram Ramanujam, Data Security in Cloud Computing, Vol 2 (1), page(s):15-23 in 2011 Proceeding Papers: [15] W.J. Book, European Network and Information Security Agency (ENISA), 29th IEEE Conference on Cloud Computing Benefits, Risks and Recommendations.