SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS
|
|
|
- Oswald Turner
- 10 years ago
- Views:
Transcription
1 SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS Subramanian Anbazhagan 1, Dr. K. Somasundaram 2 1 Department of Computer Science and Engineering, Karpagam University, Coimbatore. [email protected] 2 Department of Computer Science and Engineering, Jaya Engineering College, Chennai. [email protected] Abstract Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effective manner. Cloud Computing is a way of providing and consuming IT Services. Cloud computing constitutes the biggest IT advancements rent in years and touches on just about every facet of the enterprise. Topics can include development platforms, software/applications, service level agreements, enterprise security, outsourcing, Big Data, storage, Shadow IT, compliance and governance. Cloud computing is currently the most over-hyped and least understood technological innovation since the advent of the Internet. The latter tremendously impacted businesses of all sizes globally, and the former has the potential to similarly and dramatically transform the business and economics of IT over the next few years. The cloud is enabling new ways for IT to operate and is helping organizations to define a new, more collaborative relationship between IT and the business. Increasingly, IT leaders view cloud computing as a catalyst for change and are using it for IT or business transformation. The concept of cloud computing creates new challenges for security, because sensitive data may no longer reside on dedicated hardware. On the contrary, there are also potential security benefits of Cloud Computing. Keywords: Cloud Computing, Cloud security, Security Threats, Cloud Encryption, Cloud Services. 1. INTRODUCTION The European Network and Information Security Agency (ENISA) define cloud computing as an ondemand service model for IT provision, often based on virtualization and distributed computing technologies. It says that cloud computing architectures have highly abstracted resources, near-instant scalability and flexibility, nearly instantaneous provisioning, shared resources, service on demand, and programmatic management. The US National Institute of Standards and Technology (NIST) have also published a cloud definition, which it has submitted as the US contribution for an international Standard. As cloud computing expands rapidly, its security s nuances are becoming more evident. In a recent Prism Microsystems survey, 58 percent of the respondents indicated that their biggest fear is that the hypervisor, a program allowing multiple OSs to share a single host, can and will create an entry point into multiple machines. More than half the respondents also believe that virtualization will create a new layer that could be attacked and that the proliferation of virtualized environments will reduce security visibility. Even though the respondents admitted these concerns, 58 percent of them admitted that they re implementing traditional security solutions to provide virtual security. This mind-set is creating opportunities for attack. This revelation, although not surprising, demonstrates the security challenges inherent in public-cloud computing and virtualization. This work aims to focus on problems associated with security of clouds and also analyze the security benefits of cloud computing. This paper is structured as follows: section 2 provides the review of relevant literature, section 3 provides the detailed study of the encryption technologies associated with cloud computing, section 4 provides the cloud computing threats and benefits, and section 5 discusses proposed work and section 6 concludes the paper. 2. RELATED LITERATURE 2.1 CLOUD ARCHITECTURES Cloud computing architecture is divided into two sections: 1. The front end 2. The back end. They connect to each other through a network usually called the Internet. The front end includes the client s computer (or computer network) and the application required to access the cloud computing system. On the back end of the system are the various computers, servers and the data storage systems that create the cloud of the computing services. A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set of rules called protocols and uses a special kind of software called middleware. Middleware allows networked computers to communicate with each other. Figure 1 shows the cloud computing architecture. 43 P age August 2014, Volume- 1, Issue- 1
2 software and infrastructure underneath it. Clients are provided platform access, which enables them to put their own customized software s and other applications on the clouds. Fig.2.Cloud Services 2.3 TYPES OF CLOUD Fig.1.Cloud Computing Architecture 2.2 CLOUD COMPUTING SERVICES The architecture of Cloud computing can be categorized according to the three types of service models, namely 1.Infrastructure as a service (IaaS), 2.Software as a service (SaaS) and 3.Platform as a service (PaaS). It is shown in figure Infrastructure As A Service (IAAS): Infrastructure as a Service is a way of delivering Cloud Computing infrastructure servers, storage, network and operating systems as an on-demand service. Rather than purchasing servers, software, data Centre space or network equipment, clients instead buy those resources as a fully outsourced service on demand Software As A Service (SAAS): SaaS model offers the service as an application to the consumer using standard interfaces. These services run on top of cloud infrastructure and consumer cannot see. The software as a service which provides software and application, and manages on demand user software requirement and cloud provider manages applications, operating system and infrastructure. SaaS provides the services according to user requirement Platform As A Service (PAAS): Platform as a service provides a platform for any type of application and brings the benefits that SaaS bought for applications, the platform as a service offers as an operational development platform for consumer. PaaS can be defined as a computing platform that allows the creation of web applications quickly and easily and without the complexity of buying and maintaining the In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are three types of cloud deployment models offered, namely, 1.Public, 2. private and 3.hybrid cloud. These, together with their security implications will be discussed below. Cloud models are shown in figure Public Cloud: Public cloud is based on mainstream and we can say cloud resources shared outside there are no restrictions anyone can use it Private Cloud: The private cloud is that there are limited no of resources to use for people and it is used in any organization. Fig.3.Cloud Models 44 P age August 2014, Volume- 1, Issue- 1
3 2.3.3 Hybrid Cloud: The concept of hybrid cloud is a collection of public and private cloud. Hybrid cloud like a private cloud is linked to one or more services. 3. ENCRYPTION TECHNOLOGIES FOR CLOUD COMPUTING In cloud computing, it is frequent for the entities to communicate manually. To achieve the security in the communication, it is important to impose an encryption and signature schemes. Therefore, the following encryption techniques are proposed: Linear Search Algorithm In the Linear Search algorithm, a symmetric encryption algorithm is used to encrypt the plain text. For the cipher text of each keyword under symmetric encryption scheme, a pseudo-random sequence is generated with a length less than that of the cipher text. Meanwhile, a check sequence is generated with a length less than that of the cipher text. The pseudo random check sequence equals the length of the cipher text. Finally, the pseudo random sequence and the check sequence equal the length of the cipher text again by modulo 2 addition. When searching, a user submits the cipher text sequence under symmetric encryption schemes. On the server side, modulo 2 additions with each sequence is performed. If the result satisfy the checking, the sequence is the encryption of the cipher text; otherwise, the sequence is not encryption of the cipher text. Identity Based Signature An identity based signature scheme is deterministic if the signature on a message by the same user is always the same. The framework of identity based signature scheme consists of algorithms described below: Setup: The Private Key Generator (PKG) provides the security parameter as the input to this algorithm, generates the systems parameters and the master private key. Extract: The user provides his identity ID to the PKG. the PKG runs this algorithm with identity ID, parameters and master private key as the input and obtain the private key D. the private key D is sent to user through a secure channel. Sign: For generating a signature on a message m, the user provides his identity ID, his private key D, parameters and the message m as input. This algorithm generates a valid signature on message m by the user. Verify: This algorithm on input a signature on message m by the user with Identity ID, parameters, checks whether signature is valid on message m by ID. Homomorphic Encryption Homomorphic encryption alludes to encryption where plain texts and cipher texts both are treated with an equivalent algebraic function. Now the plain text and cipher text might also be not related but the emphasis is on the algebraic operation that works on both of them. Structured Encryption: A structured encryption scheme encrypts structured data in such a way that it can be queried through the use of a query-specific token that can only be generated with knowledge of the secret key. In addition, the query process reveals no useful information about either the query or the data. An important consideration in this context is the efficiency of the query operation on the server side. Public Key Encryption with Keyword Search A Public Key Encryption with Keyword Search (PEKS) scheme consists of four polynomial time algorithms: KeyGen: Take a input a security parameter and generate a public/private key pair (pk, sk). Trapdoor: Take as input the receiver s private key sk and a word W, produce a trapdoor Tw. PEKS: Take as input the receiver s public key pk and word W, produce a searchable encryption of W. Test: Take as input the receiver s public key pk, a searchable encryption C=PEKS (pk,w). Attribute Based Encryption (ABE) In ABE, the attributes and policies associated with the message and the user decides which user can decrypt a cipher text. A central authority will create secret keys for the users based on attributes/policies for each user. Cipher text policy in ABE: Users in the system have attributes; receives a key ( or key bundle ) from an authority for its set of attributes. Cipher text contains a policy (a Boolean predicate over the attribute space). If a user s attribute set satisfies the policy, can use its key bundle to decrypt the cipher text. Multiple users cannot pool their attributes together. 3.1 CLOUD SECURITY THROUGH KEY AGREEMENT In order to effectively manage and control the use of cloud technology in an organization, business and strategic decision makers need to begin with assessing the potential impact of Cloud computing on their competitive edge. So it is necessary to build up proper security for cloud implementation. This protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms. The protocol is secure only if the authenticity of the two participants can be established and 45 P age August 2014, Volume- 1, Issue- 1
4 provides cloud computing security through secret key using a public-key scheme. Asymmetric-key algorithms are those algorithms that use different keys for encryption and decryption. The two keys are: Private Key and Public Key. The Public key is used by the sender for encryption and the private key is used for decryption of data by the receiver. In cloud computing asymmetric-key algorithms are used to generate keys for encryption. The most common asymmetric-key algorithms for cloud are: RSA, IKE, and Diffie-Helman Key Exchange. In 1976, Whitfield Diffie and Martin Hellman introduced a key exchange protocol with the use of the discrete logarithm problem. In this protocol sender and receiver will set up a secret key to their symmetric key system, using an insecure channel. To set up a key Alice chooses a random integer a [1; n] computes ga, similarly Bob computes gb for random b [1; n] and sends it to Alice. The secret key is gab, which Alice computes by computing (gb) a and Bob by computing (ga)b. The important concepts on which the security of the Diffie- Hellman key exchange protocol depends are: Discrete Logarithm Problem (DLP): If from g and ga Eve, an adversary can compute a, then he can compute gab and the scheme is broken. Diffie-Hellman Problem (DHP): If from given the information g, ga and gb with or without solving the discrete logarithm problem, Eve can compute gab then the protocol is broken. It is still an open problem if DHP is equivalent to DLP. Decision Diffie-Hellman Problem (DDH): If we are given g; ga; gb and gc, DDH is to answer the question, deterministically or probabilistically, Is ab = c mod n? 3.2 CLOUD SECURITY THROUGH SYMMETRIC CIPHER MODEL Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key. It is important to note that security of depends encryption on the secrecy of the key, not the secrecy of algorithm. We do not need to keep the algorithm secrecy; we need to keep only the secrecy key. In symmetric key algorithm, the encryption and decryption keys are known to both Alice and Bob. For example the encryption key is shared and the decryption key is easily calculated from it. In many cases the encryption key and the decryption key are the same. All of the classical (pre-1970) cryptosystems are symmetric. The modern study of symmetric-key ciphers relates mainly to the study of block ciphers, stream ciphers and application of hash function. 3.3 SYMMETRIC KEY ENCRYPTION ALGORITHMS USED IN CLOUD The most important type of the encryption is the symmetric key encryption. Symmetric-key algorithms are those algorithms which use the same key for both encryption and decryption. Hence the key is kept secret. Symmetric algorithms have the advantage of not consuming too much of computing power and it works with high speed in encryption. Symmetric-key algorithms are divided into two types: Block cipher and Stream cipher. In block cipher input is taken as a block of plaintext of fixed size depending on the type of a symmetric encryption algorithm, key of fixed size is applied on to block of plain text and then the output block of the same size as the block of plaintext is obtained. In Case of stream cipher one bit at a time is encrypted. Some popular Symmetric-key algorithms used in cloud computing includes: Data Encryption Standard (DES), Triple-DES, and Advanced Encryption Standard (AES) AES Algorithms: Advanced Encryption Standard is a symmetric- key block cipher published as FIPS-197 in the Federal Register in December 2001 by the National Institute of Standards and Technology (NIST). AES is anon-feistel cipher. AES encrypts data with block size of 128-bits. It uses 10, 12, or fourteen rounds. Depending on the number of rounds, the key size may be 128, 192, or 256 bits. AES operates on a 4 4 column-major order matrix of bytes, known as the state Blowfish Algorithm: Blowfish is a symmetric block cipher algorithm. It uses the same secret key to both encryption and decryption of messages. The block size for Blowfish is 64 bits; messages that aren't a multiple of 64-bits in size have to be padded. It uses a variable length key, from 32 bits to 448 bits. It is appropriate for applications where the key is not changed frequently. It is considerably faster than most encryption algorithms when executed in 32-bit microprocessors with huge data caches. Data encryption happens via a 16-roundFeistel network. 3.4 CLOUD COMPUTING ENCRYPTION METHODOLOGIES Cloud security is built around encryption methodologies. These are of three kinds: hashing encryption, symmetric cryptography, and asymmetric cryptography. Hashing: This method uses a unique, fixed length signature to encrypt a data set. The hash is created using a hash function or an algorithm and each hash is compared with other hash sets to verify uniqueness of the data set. Since a small change in the data will result in the generation of a new hash, the data owner will be alerted to any security breaches that may have occurred. 46 P age August 2014, Volume- 1, Issue- 1
5 Symmetric Encryption: Up to this point in the discussion, every method of encryption requires a special secret key to be previously and securely established. This is the nature of symmetric key encryption. A symmetric key, sometimes called private-key, encryption cipher is any algorithm in which the key for encryption is trivially related to the key used for decryption. An analogy of this is a typical mechanical lock. The same key that engages the lock can disengage it. To protect anything valuable behind the lock, the key must be given to each member securely. If an unintended person obtains access to the key, he or she will have full access to what is being secured by the lock. Asymmetric encryption: The digital era of the 1970's caused a need for an encryption system that would rely on a predetermined key. Cryptographers of this era realized that in order to send a message securely without previously meeting with the recipient, they would need a system that uses a different key for encryption than it does for decryption. In comparison with symmetric key encryption, this system would compare to a lock that has one key for engaging the lock and a different key for disengaging the lock. 4. THREATS AND BENEFITS 4.1 THREATS Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. The Cloud Security Alliance (Cloud Computing Alliance, 2010) did a research on the threats facing cloud computing and it identified the following seven major threats: 1. Abuse and Nefarious Use of Cloud Computing 2. Insecure Application Programming Interfaces 3. Malicious Insiders 4. Shared Technology Vulnerabilities 5. Data Loss/Leakage 6. Account, Service & Traffic Hijacking 7. Unknown Risk Profile 4.2 BENEFITS Cloud computing is no doubt a fantastic technology and continues to grow in popularity and more and more companies are investing in a cloud for their company. Cloud computing present s business organizations with a fundamentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Cloud providers specialize in particular applications and services, and this expertise allows them to efficiently manage upgrades and maintenance, backups, disaster recovery, and failover functions. As a result, consumers of cloud services may see increased reliability, even as costs decline due to economies of scale and other production factors. Other advantages include reduced costs as resources are shared and re-used within the cloud. Reduced Cost: Cloud technology is paid incrementally, saving organizations money. Increased Storage: Organizations can store more data than on private computer systems. Highly Automated: No longer do IT personnel need to worry about keeping software up to date. Flexibility: Cloud computing offers much more flexibility than past computing methods. More Mobility: Employees can access information wherever they are, rather than having to remain at their desks. Allows IT to Shift Focus: No longer having to worry about constant server updates and other computing issues, government Organizations will be free to concentrate on innovation. 5. PROPOSED WORK The aim of the research is to establish a strong trust between all the parties involved and provide the ultimate comfort level to host the applications at the cloud service providers premises. A trust based protocol is proposed to be developed to address the three primary security requirements of cloud computing models, namely, confidentiality, integrity and availability. The key barricades to the firm adaption of cloud computing are the security and privacy issues. Though a broadly acknowledged nomenclature of cloud computing has been recommended by NIST (National Institute of Standards and Technology), cloud is an eventual accretion of virtualization. The intention, enactment and placement of virtualization know-hows up to the cloud have unwrapped novel extortions and security issues. The endto-end solitude, assertion and trust in cloud centered designs need to be addressed effectively. It is targeted to analyze the top cloud computing threats and their proposed solutions and to propose models for reputation guided protection for cloud computing environments. 6. CONCLUSION Although Cloud computing can be seen as a new phenomenon which is set to revolutionize the way we use the Internet, there is much to be cautious about. There are many new technologies emerging at a rapid rate, each with technological advancements and with the potential of 47 P age August 2014, Volume- 1, Issue- 1
6 making human s lives easier. However one must be very careful to understand the limitations and security risks posed in utilizing these technologies. Cloud computing is no exception. In this paper, an extensive review had been done on cloud architecture, cloud computing services, types of clouds, encryption algorithms used in clouds, encryption technologies and methodologies for cloud computing, cloud computing threats and security benefits. This would assist the organizations to make an informed decision before moving into cloud technologies. REFERENCES [1] /security/news/ /cloud-sprivileged-identity-gapintensifies-insider-threats.html. [2] State of Virtualization Security Survey, Prism Microsystems, Apr. 2010; documents/virtualizationsecuritysurvey2010.pdf. [3] /insecure-api-implementations-threatencloud.html [4]. Armbrust M, Fox A, Griffith R, Joseph D A, Katz H R, Konwinski A, Lee Gunho, Patterson A D, Rabkin A, Stoica A, Zaharia M, (2009),Above the clouds: A Berkeley view of Cloud Computing, UC BerkeleyEECS, Feb 2010 [5]. Balachandra R K, Ramakrishna P V, Dr. Rakshit A, Cloud Security Issues, 2009 IEEE International Conference on Services Computing, pp [6]. CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in [7]. Cloud Security Alliance Web site, [8]. Gartner "User Survey Analysis: Impact of Mobile devices on Network and Data Center Infrastructure".2012 [9]. Gens F, 2009, New IDC IT Cloud Services Survey: Top Benefits and Challenges,IDCeXchange, from < [10]. Global NetoptexIncorporated, 2009, Demystifying the cloud. Important opportunities, crucial choices, pp [11]. [12]. [13]. computing/cloud-use-grows-so-will-rateof-ddos-attacks [14]. [15]. Infoworld.com TechWatch Blog [16]. InfoWorld/CSA, Ted Samson,"Data breaches and cloud service abuse rank among the greatest cloud security threats, according to Cloud Security Alliance" [17]. Leavitt N, 2009, Is Cloud Computing Really Ready for Prime Time?, Computer, Vol. 42, pp , [18]. Mell P. and Grance T., The NIST Definition of Cloud Computing, ver. 15, US Nat l Inst. of Standards and Technology, 7 Oct. 2009; SNS/cloud-computing/cloud-def-v15.doc. [19]. Neepa Shah and Chetna Patel CONSIDERING THE CLOUD COMPUTING TECHNOLOGY"INCON13-IT [20]. Securstore blogs [21]. Weinhardt C, Anandasivam A, Blau B, and Stosser J, Business Models in the Service World, IT Professional, vol. 11, pp , AUTHOR Subramanian Anbazhagan has more than twenty years of professional experience in the IT industry. He did his Bachelor of Computer Science and Engineering from College of Engineering, Guindy, Anna University, India and completed his Masters in Software Engineering from National University of Singapore. He also holds an MBA degree in Finance. As an IT consultant, he had provided consultancy services to various companies in the manufacturing, health care and cosmetics, government services, private and public sector industries like SPIC Ltd, Procter & Gamble (Singapore), Enameled Wire & Cable (Singapore), Singapore Computer Systems, Singapore Police Force and Singapore Civil Defense Force. Dr.K.Somasundaram, Research Guide (Karpagam University), is a Professor with the Department of Computer Science and Engineering, Jaya Engineering College, Thiruvallur, Tamilnadu. 48 P age August 2014, Volume- 1, Issue- 1
Cloud Security through Key Agreement
Cloud Security through Key Agreement Subramanian Anbazhagan, K.Somasundaram Abstract Cloud computing refers to applications and services that run on a distributed network using virtualized and accessed
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Data Security in Cloud Computing using Elliptical Curve Cryptography
Data Security in Cloud Computing using Elliptical Curve Cryptography Mr. Pragnesh G. Patel #1, Mr. S.M.Shah *2 # M.E.C.S.E, Government Engineering College Sector-28, Gandhinagar, Gujarat, India 1 [email protected]
NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
The Management of Security in Cloud Computing
The Management of Security in Cloud Computing Ramgovind S, Eloff MM, Smith E School of Computing, University of South Africa, Pretoria, South Africa [email protected]; {eloff, smithe}@unisa.ac.za
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam ([email protected]) Omidreza Karimi ([email protected]) Dr. Ma en T. Alrashdan ([email protected])
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier
Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication.
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem Vyas S Department Of Computer Science and Engineering Panimalar Engineering College Chennai, India
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
Cloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) [email protected] / @tukkajukka 30.10.2013 1 e arrival
CS3235 - Computer Security Third topic: Crypto Support Sys
Systems used with cryptography CS3235 - Computer Security Third topic: Crypto Support Systems National University of Singapore School of Computing (Some slides drawn from Lawrie Brown s, with permission)
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Privacy-Preserving Public Auditing for Secure Cloud Storage
Privacy-Preserving Public Auditing for Secure Cloud Storage Prof. N.L. Chourasiya, Dayanand Lature, Arun Kumavat, Vipul Kalaskar, Sanket Thaware. [email protected] Contact no: 9970131164 Abstract The
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
