Cloud computing and a new approach in data encryption technique

4

Click here to load reader

Transcript of Cloud computing and a new approach in data encryption technique

Page 1: Cloud computing and a new approach in data encryption technique

Cloud Computing and A New Approach in Data

Encryption Technique

Rahman, Mahmuda13-22990-1,B

[email protected]

American International University-Bangladesh

Abstract. Cloud computing is a very growing �eld in this passing year.We can discuss about how to secure the data. We can discuss about thealgorithm and how the algorithm is working. Then we propose some newtechnique to secure the data in cloud. There is no 100 percent securesystem. So we want to discuss in this paper how to make the systemmuch better and more essential. The goal of this paper is to secure thedata system in cloud computing.

Keywords: Cloud computing, encryption algorithms, Multiple encryptions, Datastorage method, Biometric security

1 Introduction

Security system in cloud for storing data is not safe enough[9]. When data isvaluable specially in the cloud computing, it's security considered to be the keyrequirement. Also it is get more important when it is hard to make it safe. Itbecomes hard to keep data safe due to lack of strong data encryption system[8]. Cloud possesses the security problem [4] in Data segregation, Data theft,unauthorized access, Uncleared Owner and responsibility of Data Protection,Data Loss conditions. Discussing some encryption algorithm we want to proposesome extra function to add the algorithm and make them better.

2 Related Work

Nelson et.al [2] want to develop new mechanisms that provide the required se-curity level by isolating virtual machines and the associated resources. Amongother requirements, such solutions should employ virtual machine identi�cation,provide an adequate separation of dedicated resources combined with a constantobservation of shared ones, and examine any attempt of exploiting cross-VMand data leakage.

A shared authority based privacy preserving protocol [1] which enables sharedaccess authority to cloud users by using anonymous access request matchingmechanism. Attribute based access control is used which enables user to access

Page 2: Cloud computing and a new approach in data encryption technique

2

only its own data �elds. Proxy re-encryption scheme is used by cloud server tofacilitate data sharing between multiple users.

Randeep Kaur[5] Discuss in his paper some algorithm to encryption the data.Using this technique we can make the cloud storage system is more essential.

Data Redundancy is one of the major problem that the cloud computing isfacing. It is known that many storage nodes are �lled with the replication of datain cloud computing, more and more data intensive applications are developedin this computing environment. The data-intensive applications devote most oftheir execution time in disk Input and output for processing a large volume ofdata [6]. So the Complexity of Time and Space are important to improve theperformance of the Cloud storage.

Cloud service providers should fortify both application and network levelsecurity in order to protect the privacy of the users and the intellectual propertyof them as these services collect and compile an increasing amount of sensitiveinformation [3]. By this way, the service providers may increase security andprivacy perceptions of the users.

3 Methodology

Now a days there are many security (encryption) algorithms which are suc-cessfully implement in data storages. There are 2 types are algorithm one issymmetric algorithm another is asymmetric. There is some algorithm like DES,RC5, AES, 3DES as symmetric algorithm. And as asymmetric, RSA, DES, EIGamal. The main deference between symmetric and asymmetric is symmetricuse one key which is use to encrypt and decrypt the data. But asymmetric al-gorithm use two key one is for encrypt and another is for decrypt the data. Weare discuses abut only 2 algorithm one is from symmetric (AES)[5] one is fromasymmetric(RSA)[3].

AES:

AES (Advanced Encryption Standard) is used for prevent Brute force attack.S algorithm performs a number Nr of cryptographic rounds depending on theactual key length. It has variable key length of 128, 192, or 256 bits[3]. It is abyte substitution. Each round consists of four byte-oriented cryptographic trans-formations. There are for type of Bite Shifting. There are SubBytes, ShiftRows,MixColumns, AddRoundKey. After shifting the byte Round key addition to thestate array[7]. The pseudo code is,Cipher(byte[] input, byte[] output){byte[4,4] State;copy input[] into State[] AddRoundKeyfor (round = 1; round < Nr-1; ++round){SubBytes, ShiftRows, MixColumns, AddRoundKey}

Page 3: Cloud computing and a new approach in data encryption technique

3

SubBytes ShiftRows AddRoundKeyopy State[] to output[]}

RSA:

Key Generation Algorithm. Which is mainly use for Internet encryption and au-thentication system. It is developed in 1977 by Ron Rivest[5], Adi Shamir, andLeonard Adleman. The RSA algorithm is the most commonly used encryption.Till now it is the only algorithm used for private and public key generation andencryption. It is a fast encryption. There are four step in the algorithm.

1. Choose two very large random prime integers:p and q

2. Compute n and �(n):n = pq and �(n) = (p-1)(q-1)

3. Choose an integer e,1 < e < �(n) such that:gcd(e, �(n)) = 1(where gcd means greatest common denominator)

4. Compute d, 1 < d < �(n) such that:ed = 1 (mod �(n))

Where are,

� The public key is (n, e) and the private key is (n, d)� The values of p, q and �(n) are private� e is the public or encryption exponent� d is the private or decryption exponent

Encryption : The cyphertext C is found by the equation 'C = Me mod n'where M is the original message.

Decryption : The message M can be found form the cyphertext C by theequation 'M = Cd mod n'.

4 Further Research and Proposal

Now we have three new types of propose in encryption technique.Multiple encryptions: Where we can use two type of encryption. We can useone technique to encrypt the data. And again encrypt the key which is generatedin that algorithm. This is a good way to encrypt. This is time cost now to hackthe data in cloud.Data storage method: This is method we propose another technique. We cansegment the data at least 3 part. Then we can generate 3 key is link the 3 partwhen we decrypted the data. If hacker hack one of the data they never hack theother 2 part. On the other hand if one �le is hacked, user can know about it andhe can do something better to secure his data.Biometric security: In this system we can generate the key using his biometricsystem. We can use eye scan to secure his data. But only one user�s eye canopen the data. Using it is very good process and more secure.

Page 4: Cloud computing and a new approach in data encryption technique

4

5 CONCLUSION

We can discuss about secure the data in cloud computing. Now a days cloudcomputing is one of the growing �eld. We can use cloud everywhere. It canchange the world. And give a new path in computer science and business �eld.I suggest some system by which we can secure our data and give them moresecurity. We do not implement the system. I just propose it to secure our datain cloud. If we can implement it we can secure our data.

References

1. Ibrahim Arpaci, Kerem Kilicer, and Salih Bardakci. E�ects of security and privacyconcerns on educational use of cloud services. Computers in Human Behavior,45(0):93�98, 2015.

2. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Car-valho, Mats Näslund, and Makan Pourzandi. A quantitative analysis of currentsecurity concerns and solutions for cloud computing. Journal of Cloud Computing:

Advances, Systems and Applications, 1(1):11, 2012.3. Randeep Kaur and Supriya Kinger. Analysis of Security Algorithms in Cloud Com-

puting. 3(3):171�176, 2014.4. Okal Christopher Otieno. Cloud-Aware Web Service Security. 13(8):120�124, 2015.5. Ms Soumya N S and R Prabha. Cloud Computing : Data Security Using RSA.

IV(X):57�59, 2015.6. Diaa Salama, Abdul Elminaam, Hatem M Abdul Kader, and Mohie M Hadhoud.

Performance Evaluation of Symmetric Encryption Algorithms on Power Consump-tion for Wireless Devices. International Journal, 1(4):343�351, 2009.

7. Gurpreet Singh and Supriya Kinger. Integrating AES, DES, and 3-DES EncryptionAlgorithms for Enhanced Data Security. 4(7):2058�2062, 2013.

8. Information Technology and Ogun State. A Privacy Preserving Access ControlModel for Personal Health Record System. pages 4�9, 2015.

9. Manoj S Tore and S K Sonkar. A CLOUD STORAGE SYSTEM FOR SHARINGDATA SECURELY WITH PRIVACY PRESERVATION AND FRAUD DETEC-TION. pages 2319�2322, 2015.