Local Data Security and Privacy Protection in Cloud Service Applications

Size: px
Start display at page:

Download "Local Data Security and Privacy Protection in Cloud Service Applications"

Transcription

1 2015 Ninth International Conference on Frontier of Computer Science and Technology Local Data Security and Privacy Protection in Cloud Service Applications Qi-Tao Lin, Chang-Dong Wang, Jing Pan, Lu Ling and Jian-Huang Lai School of Mobile Information Engineering, Sun Yat-sen University, Zhuhai, P. R. China, School of Information Science and Technology, Sun Yat-sen University, Guangzhou, P. R. China, SYSU-CMU Shunde International Joint Research Institute (JRI), Shunde, P.R. China, Daniel.lin Abstract In the past ten years, the technology researches and applications on Cloud Computing have been booming. Depending on large data centers and distributed cluster servers, different layers of Cloud Services make it possible that computing performance becomes stronger, storage space extends vastly and price becomes much lower. With the development of Cloud Computing, countless entrepreneurs and individual users benefit from it. However, it is evident that there exist hidden security problems in individual cloud applications privacy protection and data safety. At present, the safety of cloud services usually only depends on the security policies provided by cloud service providers and their implementation level. Once users data and privacy are leaked, it will have a terrible impact on social order besides economic losses. This is an obstacle to the development of cloud computing services. Therefore, our project is going to encrypt users data in local clients through the BlowFish encryption algorithm and then use the interface of cloud computing to upload the encrypted data so that we can establish a perfect data security and privacy s mode protection without affecting the experience and efficiency of use. Because the mode is independent of cloud computing service providers, users data and privacy security can be guaranteed. It can enhance users confidence and is good for the further development of cloud services. Index Terms cloud services; privacy protection; BlowFish encryption algorithm; mode protection; security I. INTRODUCTION With the fast development of cloud computing technology, cloud computing has attracted more and more attention from both academia and industry [1]. Based on the framework of cloud computing, cloud service provider can provide service at three levels: infrastructure, platform and software. Due to a large number of advantages cloud service, such as reducing the hardware spending [2], rapid deployment, on-demand service and charging for using, cloud computing has become an important network application model around the world in recent years [3]. However, cloud computing is applied in some special environment. It means that cloud computing has a few significant particularity inevitably [4]. 1) There may be security problem because hardware facilities of cloud service are shared by a large number of users. 2) It has lost certain physical boundary because cloud service is based on virtual technology. Especially, in the public cloud environment, one logic server may have several virtual servers. Meanwhile, one virtual server can belong to different logic server groups [5]. So the role of traditional information security technologies such as firewall are weakened greatly. At the same time, with the service time expanding, cloud services data security and privacy protection problems arise gradually. For example, not long ago Linux Bash vulnerability caused the server of Ali to be cracked violently and Apple s icloud vulnerability caused private information to be disclosed. These data and privacy security problem will upset cloud service consumers greatly and become an obstacle to cloud services smooth development. Under the current cloud application circumstance, cloud computing users are forced to store part of or all data and applications on the cloud [6], which means users will lose the control to their data partly even thoroughly. Based on this fact, data security and user privacy protection mainly depend on the security methods provided by cloud service provider and what extent they are carried out to. Because we can t make sure that those security methods don t have vulnerability and are carried out absolutely, users can t foresee the leak of data. Once it happens, it will cause deadly losses to users. What s more, it is well-known that the security of corporation data in the cloud is difficult to guarantee, as they provide three types of services, namely Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Every service has its own security issues holding different levels of security and complexity. So, it s more convincible to make the customer understand the local data security and privacy protection in cloud service [7]. In this work, based on the BlowFish encryption algorithm [8], we propose to encrypt users data in local clients and then use the interface of cloud computing to upload the encrypted data so that we can establish a perfect data security and privacy s mode protection without affecting the experience and efficiency of use. The BlowFish encryption algorithm is a symmetric encryption algorithm with high efficiency and great difficulty of reverse engineering, which is suitable for the file or folder encryption but still has a defect in secret key safekeeping. Therefore, an improved version of the BlowFish encryption algorithm is designed to enhance its data protection. Because the mode is independent of cloud computing service providers, users data and privacy security can be guaranteed /15 $ IEEE DOI /FCST

2 It can enhance users confidence and is good for the further development of cloud services. II. RELATED WORK To solve the security problems of cloud service, some research efforts have been made, which mainly focus on the encryption of authorization link and many methods have been proposed, such as secure cloud authentication using EIDs [9], communication encryption [10] and private information retrieval [10]. However, given untrusted cloud service provider, users data should be encrypted and protected effectively in the local clients before uploading to the cloud. Jawahar Thakur et al [8] provide a fair comparison between three most common symmetric key cryptography algorithms, DES, AES, and BlowFish. Eman M.Mohamed et al [3] illustrate that cloud computing moves the application software and databases to the large data centers. This unique feature raises many new security challenges [11]. For example, both data and software are fully not contained in users computer but the cloud provider premises. So, it is obvious that cloud typically has a single security architecture but with many different demand on security from cloud consumers. What s more, they provide a comparability between AES and BlowFish as well as the data security model based on the study of cloud architecture. They first introduce some background studies like Cryptography Goals, Modes of Encryption/Decryption, Concepts of three most commonly used encryption algorithms, DES, 3DES and AES. Then they analyze the performances of these methods by running several encryption settings to process different sizes of data blocks to evaluate the algorithm s speed for encryption and decryption. Based on the comparison results, we can know that BlowFish has a better performance than other common encryption algorithms [12]. By treating the raw data with BlowFish, we can turn the original data into the encrypted one. Without the encryption key, it s rarely possible to decipher the data in the cloud or anywhere. Thus the security of the data could be guaranteed. The key step of BlowFish is to expand the user s key, as the key varies in the length, and the key could be expanded to as long as over 400 bits, and this is the most complicated step of the method. All the characters would be treated as 16 bit integer, avoiding the problem of coding of some unicode characters. And then the data would be divided into 64 bit blocks, and each block would be encrypted independently. However, this brings another problem. All of the encryption processes, including the key initialization and even the decipher, are dependent on the key which the user chooses. If the key is got by the cracker, the data would be leaked. So it is important to keep the key properly. To achieve this, we encipher the key itself with BlowFish using the first 2 bits of the key as the encryption key, ensuring that the key couldn t be found or cracked by anyone else. Besides, we simulate the cloud storage application and create a cloud environment with the Microsoft Azure cloud platform, the experimental results of which have confirmed the effectiveness of the proposed method. A. Data encryption In the traditional BlowFish algorithm, there are two main steps [13]. The first one is the key extension and the second one is enciphering the data as shown in Fig. 1, which is quite similar to ours. III. OUR WORK To solve the security problems of cloud service, in our project, we propose a security schema to protect the data and privacy of the users of the cloud storage application, which is based on the following two ideas, namely local encryption and cloud interface. Our strategy is to encrypt the data in the local end system before the data is sent the cloud server, which could strongly increase the confidence of the consumers. To achieve this, we have to find a proper encryption algorithm. In this work, we use a new method based on the BlowFish encryption algorithm, which is a secret-key block cipher, and efficient/easy to implement. The BlowFish method encrypts a 64 bits block each time, where a simple encryption is iterated 16 times. In the BlowFish method, the key can be of any length up to 448 bits. Although the key has to be initialized through a complex initialization phase, the encryption of data with BlowFish is very efficient on large microprocessors. Fig. 1. The basic process of BlowFish. For key extension, there are two types of boxes to produce strong ciphers, namely S-boxes and P -boxes. There are large S-boxes, which are more resistant to variant cryptanlysis. In our implementation, we use 32-bit S-boxes. And there is a P -box, the function of which is to operate with the key. These boxes are initialized as the value of decimal part of π. The size of P -box and S-box are 18 and 256, respectively. 255

3 As for our approach, the P -array (data structure of P -box) consists of bit subkeys: (P 1,P 2,,P 18 ). And there ( are 432-bit S-array ) (data ( structure of S-box) ) ( with 256 entries: S 1 0,S1, 1,S255 1, S 2 0,S1, 2,S255 2, S 3 0,S1, 3,S255) 3 with several main steps as shown below (Fig. 3). and ( S 4 0,S 4 1,,S 4 255). After that, we begin extending the key picked by the user and generate the subkeys in the following steps (See Fig. 2). Fig. 3. The encipher function - BF En Fig. 2. The process of the subkey generation 1) Initialize, in order, the P -array and then the four S- arrays with a given string, which is composed of the hexadecimal digits of constant value, decimal part of the π. For example, P 1 = 0 243f6a88,P 2 = 0 85a308d3, and so on. 2) XOR P N with the N-th 32 bits of the key. For example we XOR P 1 with the first 32 bits of the key and for all bits of the key like this. XOR operation repeatedly cycle through the key bits until the entire P -aaray has been XORed with the key bits. It can be referred that for every short key, there s one equivalent key that is longer, at least. For instance, suppose that K is a 32-bit key, then KK, KKK, etc are equivalent keys. 3) Encrypt the all-zero string with the BlowFish encipher function (marked as BF En), using the subkeys described in steps 1) and 2). The function BF En will be described later. 4) Replace P 1 and P 2 with the output of step 3). 5) Encrypt output of step 3) using the BlowFish algorithm with the modified subkeys. 6) Replace P 3 and P 4 with the output of step 5). 7) Continue the process, replacing all entries of the P - array, and the all four S-arrays in order, with the output of the continuously changing BF En function. The BF En function is the core of the BlowFish algorithm, 1) The BF En receives one 64-bit parameter x and divides it into 32-bit halves xl and xr. 2) Execute the cycle: set xl = xl XOR Pi, xr = F (xl) XOR xr, where the function F will be described later, and then swap the value of xl and xr, for i =1,..., 16. 3) After jumping out of the cycle, swap the value of xl and xr again, then set xr = xr XOR P 17 and xl = xl XOR P 18. 4) Merge xl and xr again and return. 5) Function F is easy to implement. Exactly one 32-bit parameter should be passed in and first divide it into four 8-bit quarters: a, b, c and d. Then return the value of ((S 1, a + S 2, b mod 2 3 2) XOR S 3, c) +S 4, d mod See Fig. 4. So far, the key extension and subkeys generation have been finished. The user data now can be divided into 64-bit blocks and passed into function BF En to be enciphered. What we have revised in this algorithm is that we will encrypt the key with its first 4-bit, in order to enhance the security of the BlowFish algorithm. B. Cloud Platform After the brief introduction and analysis on the BlowFish algorithm, we continue to set about the whole preparation of the cloud platform as follows. 1) Compare and choose: Now there exist plenty of cloud platforms on the Internet, such as Microsoft Azure, Aliyun, Amazon AWS and so on. However, based on our investigation in terms of convenience and efficiency, we choose Microsoft Azure as our experimental platform, which is a flexible and open platform. 2) Register an account: In the following step, we register an Azure account in order to ensure our long-term use on 256

4 which holds plenty of blobs. Besides, each parent blob contains more child blobs to split files in order to upload them. Its schematic diagram is shown in Fig. 6. So, firstly we create an account for storing and set up the key in Azure, then configure monitoring and log record. Finally, we install the Azure Storage Explorer to upload files to cloud and other operation of storing. < < Blob REST API Windows Azure Storage Account Blob Container < Blobs Fig. 4. The F function Blocks Pages Fig. 6. Basic process of Microsoft Azure cloud storing Access the official website Register a Microsoft account Verify your account with your mobile phone Activate your account Fig. 5. Basic process of Microsoft Azure registering IV. ENCRYPTION PERFORMANCE AND RESULTS In this section, experiments have been conducted to analyze the performances of our security protection schema with the BlowFish algorithm and show the difference from other common encryption algorithms such as DES, 3DES and AES. The comparation focuses on running different encryption settings to process various sizes of data blocks to evaluate the security and the efficiency of the large file encryption. DES: Data Encryption Standard (DES) is known as the first encryption technique based on the Lucifer algorithm proposed by IBM. As the first encryption standard, it had many defects and loopholes which make it unsafe. 3DES: DES was enhanced, known as Triple DES or 3DES. The basic algorithm is the same compared to DES, it just enciphers 3 times to increase the security. Microsoft Azure. So, as shown in Fig. 5, we give a process s overview of registering. 3) Upload the file to cloud: In this step, we take advantage of the Microsoft Azure to upload and store files. Among services of storing in Microsoft Azure, Blob, Table and Queue, we choose Azure Blob, which is the easiest way to apply in the storing service. It is realized by a simple hierarchical relationship, and every account owns a container, AES: Advanced Encryption Standard was proposed by NIST in order to replace DES. So far there s only one attack, brute force. However, if the combination of numbers is high enough, even super computer can t figure it out with brute force. We implement these common algorithms and our alternative BlowFish algorithm with C++, we encipher a 256 MB file with these method and compare their efficiency. We conduct 257

5 this test on 1.4 GHz CPU running OS X Yosemite. The comparison results are listed in Table I. TABLE I COMPARISON RESULTS Algorithm Data Time(Seconds) Average MB/S DES 1MB DES 1MB AES 1MB Revised Blowfish 1MB DES 22MB DES 22MB AES 22MB Revised Blowfish 22MB DES 256MB DES 256MB AES 256MB Revised BlowFish 256MB As shown in this table, our method is typically suitable for the encryption of the relatively larger data (with size bigger than 10MB). With this big size data, the modified Blowfish algorithm gains the highest throughput (MB/S). Besides, when it comes to the issue of the security, so far, the only known method to crack the Blowfish algorithm is brute force. In our strategy, we encrypt the key of Blowfish algorithm again with the first 8-bit of the key. In this way, theoretically, the cost of brute force could be doubled, at most. Due to the cost of brute force and the capability of our device, we can t verify our inference, though, the security of our modified Blowfish algorithm is increased. Among the papers on the modified encryption algorithms, almost none of them directly confirms the security of its method, because how they modified is aimed at the cracking methods that are already known. So we decides to confirm it logically. V. CONCLUSION In this work, we firstly introduce the related work of the secure research for the cloud computing and introduce the problem that will influence people s data and privacy security. There s no denying that these problems will be in the way of the development of cloud computing. We hope that an efficient method can be designed to address this problem. So we propose a method to implement local data security and privacy protection based on the cloud service application. After comparing the most efficient data encryptions on the Internet, we choose the BlowFish algorithm to encrypt data. In the graces of the key management problem for it, we have made an improvement to encrypt the key with the first 8-bit of it so that it is able to enhance the security of the BlowFish algorithm. In the experiment, we compare the algorithm s speed of encryption of the BlowFish and other common encryption algorithm. Obviously, the algorithm that we choose is with the highest efficiency to encrypt the file. Moreover, through the comparison of the security performance, there s no denying that the BlowFish is the safest. For the further research, we will implement the abutment to our cloud platform and test the performance of the cloud storage application. In fact, we are considering to use the other commercial cloud application API such as Baidu cloud or Amazon cloud, for the purpose that we want to make our schema more practical. We ll try to build our schema upon a secure basic with high efficiency. In future work, we intend to realize and apply the method we have proposed in a software, and make it like a client software to encrypt data directly then upload the cloud, like Cloudfogger and Cloud Safety Box. We intend to build a safeguard for users data through local encryption and cloud encryption. This is just one of the practical business models that can be applied. We believe that there s still a huge potential for the cloud computing security market. ACKNOWLEDGEMENT This project was supported by CCF-Tencent Open Research Fund, the PhD Start-up Fund of Natural Science Foundation of Guangdong Province, China (No. 2014A ), the Fundamental Research Funds for the Central Universities ( ), Pilot Program of SYSU-CMU Shunde International Joint Research Institute, Undergraduate Innovation Program of Sun Yat-sen University, and Zhuhai Academy of Social Sciences philosophyproject (No ). REFERENCES [1] A. Bisong, M. Rahman et al., An overview of the security concerns in enterprise cloud computing, arxiv preprint arxiv: , [2] Y. Jadeja and K. Modi, Cloud computing-concepts, architecture and challenges, in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012, pp [3] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, Enhanced data security model for cloud computing, in 8th International Conference on Informatics and Systems (INFOS). IEEE, [4] M. Kaur and M. Mahajan, Using encryption algorithms to enhance the data security in cloud computing, International Journal of Communication and Computer Technologies, vol. 1, [5] W.-K. Zhang and G.-F. Liu, Data security and privacy protection of cloud computing, Information Security and Communications Privacy, vol. 11, [6] M. H. Diallo, B. Hore, E.-C. Chang, S. Mehrotra, and N. Venkatasubramanian, Cloudprotect: managing data privacy in cloud applications, in 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). IEEE, 2012, pp [7] B. R. Kandukuri, V. R. Paturi, and A. Rakshit, Cloud security issues, in IEEE International Conference on Services Computing. IEEE, 2009, pp [8] J. Thakur and N. Kumar, DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis, International journal of emerging technology and advanced engineering, vol. 1, no. 2, [9] B. Zwattendorfer and A. Tauber, Secure cloud authentication using eids, in 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 1. IEEE, 2012, pp [10] C. Orencik, M. Kantarcioglu, and E. Savas, A practical and secure multi-keyword search method over encrypted cloud data, in IEEE Sixth International Conference on Cloud Computing (CLOUD). IEEE, 2013, pp [11] Y. Brun and N. Medvidovic, Keeping data private while computing in the cloud, in 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). IEEE, 2012, pp [12] B. Schneier, The blowfish encryption algorithm retrieved, October [13] B. Schneier, J. Kelsey, D. Whiting, D. W. C. Hall, and N. Ferguson, Two sh: A 128-bit block cipher, vol. 15,

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm G.Devi 1, M.Pramod Kumar 2 1 M.Tech(CSE),devi.gujjula9@gmail.com,Sri Vasavi Engineering College, Tadepalligudem

More information

A Study of New Trends in Blowfish Algorithm

A Study of New Trends in Blowfish Algorithm A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Keywords Web Service, security, DES, cryptography.

Keywords Web Service, security, DES, cryptography. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

Protecting Data in Cloud Storage Using Blowfish Encryption Algorithm and Image-Based One-Time Password

Protecting Data in Cloud Storage Using Blowfish Encryption Algorithm and Image-Based One-Time Password Protecting Data in Cloud Storage Using Blowfish Encryption Algorithm and Image-Based One-Time Password M Rama Raju Asst. Professor CSE Department, Christu Jyothi Institute of Technology & Science. J Purna

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms. A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

How To Encrypt With A 64 Bit Block Cipher

How To Encrypt With A 64 Bit Block Cipher The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,

More information

Analysis of Security Algorithms in Cloud Computing

Analysis of Security Algorithms in Cloud Computing Analysis of Security s in Cloud Computing Randeep Kaur 1,Supriya Kinger 2 1 Student Masters Of Technology, Shri Guru Granth Sahib World University, Fatehgarh Sahib. 2 Assistant Professor, Shri Guru Granth

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 kgovinda@vit.ac.in

More information

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Secret Sharing based on XOR for Efficient Data Recovery in Cloud Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, kimsh@sch.ac.kr

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

Cloud Computing Security and Encryption

Cloud Computing Security and Encryption ISSN: 2321-7782 (Online) Volume 1, Issue 5, October 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Cloud

More information

6 Data Encryption Standard (DES)

6 Data Encryption Standard (DES) 6 Data Encryption Standard (DES) Objectives In this chapter, we discuss the Data Encryption Standard (DES), the modern symmetric-key block cipher. The following are our main objectives for this chapter:

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

Research on Storage Techniques in Cloud Computing

Research on Storage Techniques in Cloud Computing American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei

More information

vpaas Model for Amateurish Users in Cloud Computing

vpaas Model for Amateurish Users in Cloud Computing 2015 Ninth International Conference on Frontier of Computer Science and Technology vpaas Model for Amateurish Users in Cloud Computing Ying-Kun Huang, Chang-Dong Wang, De-Kai Kang, Chuan Jiang and Jian-Huang

More information

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College,

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud

Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud 680 Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud 1 Ramandeep Kaur, 2 Gurjot Kaur 1 Department of Computer Engineering Chandigarh University, Gharuan 2 Assistant Professor, Department

More information

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft

More information

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, er.aman_jot@yahoo.co.in 2 Assistant Professor,

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

Survey on Data security Issues in Cloud Environment

Survey on Data security Issues in Cloud Environment Survey on Data security Issues in Cloud Environment Vasanth.C.Bhagawat Research Scholar/ Computer Science Bharathiar University, Coimbatore Dr. A.Arul L.S.Kumar Prof & Dean, Dept. of. CSE RGIT, Bangalore.

More information

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Blaze Vault Online Backup. Whitepaper Data Security

Blaze Vault Online Backup. Whitepaper Data Security Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

(C) Global Journal of Engineering Science and Research Management

(C) Global Journal of Engineering Science and Research Management DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Secure Data Storage in Cloud Service using RC5 Algorithm

Secure Data Storage in Cloud Service using RC5 Algorithm International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-5 November 2013 Secure Data Storage in Cloud using RC5 Algorithm Sachindra K. Chavan, Manoj L. Bangare

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3. Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Simple Encryption/Decryption Application

Simple Encryption/Decryption Application Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia majdi.qdah@mmu.edu.my Lin Yi Hui Faculty of Information Technology

More information

SECURE DATA TRANSMISSION-USING DYNAMIC ROUTING AND VULNERABILITY EVALUATION

SECURE DATA TRANSMISSION-USING DYNAMIC ROUTING AND VULNERABILITY EVALUATION SECURE DATA TRANSMISSION-USING DYNAMIC ROUTING AND VULNERABILITY EVALUATION S.Kavin hari hara sudhan(1), (1)M.Tech student in Computer Science and Engineering Dr.MGR Educational and Research Institute,

More information

Split Based Encryption in Secure File Transfer

Split Based Encryption in Secure File Transfer Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical

More information

Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

More information

Cloud Computing Training

Cloud Computing Training Cloud Computing Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333 TechAge Labs 2014 version 1.0 Cloud Computing Training Cloud Computing

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput. Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation

More information

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based

More information

Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node

Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node Dhvani. K. Shah Information Technology Thakur College of Engineering and Technology. Vinayak Bharadi,

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING ENVIRONMENT

COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING ENVIRONMENT Volume 3, No. 9, September 2012 Journal of Global Research in Computer Science REVIEW ARTICAL Available Online at www.jgrcs.info COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati

More information

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY Yogita Gangboir 1, Praveen Shende 2 1.,2 CSE Dept, CSIT Durg, (India) ABSTRACT Cloud computing is rising day by day around

More information

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com Cloud & Security Dr Debabrata Nayak Debu.nayak@huawei.com AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages

More information

Evaluation of the RC4 Algorithm for Data Encryption

Evaluation of the RC4 Algorithm for Data Encryption Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information