Securing Storage Data in Cloud Using RC5 Algorithm



Similar documents
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

A Security Integrated Data Storage Model for Cloud Environment

A SURVEY ON DATA SECURITY IN CLOUD COMPUTING: ISSUES AND MITIGATION TECHNIQUES

Comprehensive Study on Data Security in Cloud Data Store

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Cryptographic Data Security over Cloud

A Survey on Cloud Security Issues and Techniques

Parametric Analysis of Various Cloud Computing Security Models

Security Analysis of Cloud Computing: A Survey

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Chapter 1: Introduction

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Manjrasoft Market Oriented Cloud Computing Platform

How To Ensure Correctness Of Data In The Cloud

Cloud based Conceptual Framework of Service Level Agreement for University

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Permanent Link:

Preparation Guide. EXIN Cloud Computing Foundation

Cloud Computing Overview with Load Balancing Techniques

CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION

The allocation algorithm for data centers in cloud computing architecture from security perspective

Research Paper on Data Integrity Checking In Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing

Scientific Journal Impact Factor (SJIF): 1.711

CHAPTER 8 CLOUD COMPUTING

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Securing Data in the Cloud

Privacy preserving technique to secure cloud

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Cloud Courses Description

Cloud Computing. What is Cloud Computing?

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Cloud Courses Description

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Manjrasoft Market Oriented Cloud Computing Platform

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing: An Analysis of Its Challenges & Security Issues

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

CLOUD COMPUTING SECURITY CONCERNS

The Private Cloud Your Controlled Access Infrastructure

Virtualization Impact on Compliance and Audit

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Analytical Survey Model on Consumption of Cloud Service Models

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Enhance data security of private cloud using encryption scheme with RBAC

Data Integrity Check using Hash Functions in Cloud environment

Ensuring Data Storage Security in Cloud Crop

Secure Cloud Computing through IT Auditing

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Security in Data Storage and Transmission in Cloud Computing

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Research on Storage Techniques in Cloud Computing

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

How To Compare Resource Allocation In Cloud Computing

The Cloud. IIA Seminar, York April 30 th

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

Enhancing Security of Cloud Computing using Elliptic Curve Cryptography

AEIJST - June Vol 3 - Issue 6 ISSN Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

The Application and Development of Software Testing in Cloud Computing Environment

Mutual Authentication Cloud Computing Platform based on TPM

How to Turn the Promise of the Cloud into an Operational Reality

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Public Cloud Computing vs. Private Cloud Computing: How Security Matters. Public Cloud Computing vs. Private Cloud Computing: How Security Matters

Applying Encryption Algorithm to Enhance Data Security in Cloud Storage

Transcription:

Securing Storage Data in Cloud Using RC5 Algorithm Jay Singh 1, Brajesh Kumar 2, Asha Khatri 3 CDSE Indore 1,2, MITM, Indore 3 Abstract Cloud Computing is technology for next generation Information and Software enabled work that is capable of changing the software working environment. It is interconnecting the large-scale computing resources to effectively integrate, and to computing resources as a service to users. Cloud computing allows users to use applications without installation any application and access their personal files and application at any computer with internet or intranet access. Cloud computing effectively the actual separation of physical and virtual services, a variety of business services reduced costs, improved utilization of network resources. Cloud computing is a technology that uses the internet or intranet and central remote servers to maintain the data and applications. This technology allows for efficient computing by centralizing storage, memory, processing and bandwidth. Here Work is focuses on RC5 Encryption Algorithm for stored data in cloud. Resulted encrypted method is secure and easy to use; it is fulfilling the needs of cloud users and providers. Keywords Cloud computing, security, Encryption, storage 1. Introduction Cloud Computing is innovation that uses advanced computational power and improved storage capabilities. Cloud computing is a new processing scheme in which computer processing is performed in the network. This means that users need not concern themselves with the processing details. Although Cloud computing enables flexible and agile computing which is impossible with existing systems. 2. Basic service Models According to service model, cloud computing can be categorized (as shown in Figure 1) into three main categories: i. Infrastructure-as-a-Service (IaaS) ii. Platform-as-a-Service (PaaS) 93 iii. Software-as-a-Service (SaaS) Figure 1: cloud model 3. Layers in Cloud The Internet functions through a series of network protocols that form a stack of layers, as shown in the figure 2. Once an Internet connection is established among several computers, it is possible to share services within any one of the following layers [Pana11]. CLIENT APPLICATION PLATFORM INFRASTRUCTURE SERVER Software (SaaS) Plateform (PaaS) Infrastructure (IaaS) Figure 2: Cloud layer 4. Security as Major Issues To preventing the system from outside world, so that no one can damage or change the system and system can serve its services continuously. The most damaging aspect is the loss of data and software. There is different types of source are there, they can damage like computer viruses, computer hacking and denial of service attacks have become more common. There are multiple security issues for cloud computing and it encompasses many technologies including networks, databases, operating systems,

virtualization, resource scheduling, transaction management, load balancing, concurrency control and memory management[akhi11]. 5. Information Security Issue of Cloud Computing There is a critical need to securely store, manage, share and analyze massive amounts of data and to improve the quality of services. Because of the critical nature of the applications, it is important that clouds to be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed [Chang10]. There are different Security Issues shown in figure 3. Figure 3: Security Issues 6. Ensuring Data Security with Encryption One of the best ways to ensure confidential data is protected in the cloud is to utilize encryption for data. Almost all cloud service providers support encryption for data storage, but few offer support for data at rest. The cloud encryption capabilities of the service provider need to match the level of sensitivity of the data being hosted [Jian10]. Encryption plays a big role in fulfilment as many policies require specific data elements to be encrypted. This type of requirement is present in GLBA, PCI DSS and HIPAA. The most important guidance on encryption is publically available from NIST 800-111 and FIPS-140-2. These standards can help you evaluate the encryption capabilities of a cloud provider for compliance with regulations. To protect a user s confidential data in the cloud, encryption is a powerful tool that can be used 94 effectively. Only user can confidently utilize cloud providers knowing that their confidential data is protected by encryption. 7. Problems Definition Cloud Storage system provides the user for safe and consistent place to save valuable data and documents. However, user's files are not encrypted on some open source cloud storage systems, such as Hadoop and Sector. In the past, there is no known way to completely handle encrypted data, unless the cloud data is only used for simple storage [Went12]. The storage service provider can easily access the user's files. This brings a big concern about user's privacy. The user has no supreme control over the software applications including secret data. User has to depend on the provider s action, maintenance and admin it. The user does not have direct access to the software to fix the problems while something goes wrong in any application and its valuable data. Proposed Solution The use of RC5 algorithm for encryption, cloud computing can be applied to the data transmission security. Transmission of data will be encrypted, even if the data is stolen, there is no corresponding key cannot be restored. Only the user knows the key, the clouds do not know the key. Also, because the properties of encryption, the cloud can operate on cipher text, thus avoiding the encrypted data to the traditional efficiency of operation. User's privacy is protected because user's files are encrypted in cloud storage. 8. Deploying RC5 Encryption Algorithm at Manjrasoft Aneka2.0 Cloud Enviroment Aneka is a market oriented Cloud development and management platform with rapid application development and workload distribution capabilities. Aneka is an integrated middleware package which allows you to build and manage an interconnected network in addition to accelerating development, deployment and management of distributed applications using Microsoft.NET frameworks on these networks.

Figure 4: Aneka Container Logging (Real time monitoring and log archives) RC5 Developing Environment Figure 6: Deployment Environment at IP lavel Select the conf.xml file & write as <SchedulerUri Value = tcp://10.10.21.110:9090/aneka (ip address of master container) In place of <SchedulerUri Value = tcp://localhost:9090/aneka Running and Encryption Wizard Figure5: Development at Visual Studio Environment Figure 7: Selection of File for Encryption 95

Figure 8: Original file Text & Encrypted File Text 9. Result Analysis Here we are comparing the actual result with Amazon s3 storage service. Amazon S3 (Simple Storage Service) is an online storage web service which is offered by Amazon Web Services. Amazon S3 provides storage through web services interface REST. Amazon S3 service graph Conclusion of result: In Aneka service graph, getting better performance. 10. Conclusion and Future Scope We believe that data storage security in Cloud Computing is an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. We envision several possible directions for future research on this area. System uses encryption/decryption keys of user s data and stores it on remote server. Each storage server has an encrypted file system which encrypts the client s data and store. Cryptographic techniques are used to provide secure communication between the client and the cloud. The system ensures that the client s data is stored only on trusted storage servers and it cannot be accessed by administrators or intruders. References Aneka 2.0 Service Graph [1] [Akhi11] Akhil Behl, Emerging Security Challenges in Cloud Computing. Congress on Information and Communication Technologies (WICT), 2011 World. [2] [Chang10] Chang-Lung Tsai Uei-Chin Lin Allen Y. Chang Chun-Jung Chen. Information Security Issue of Enterprises Adopting the Application of Cloud Computing. National Science Council and Chinese Culture University of Taiwan, R.O.C. [3] [Jian10] Jianfeng Yang, Zhibin Chen, Cloud Computing Research and Security Issues. 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). 96

[4] Junfeng Tian, Zhijie Wu. A Trusted Control Model of Cloud Storage.2012 International Conference on Computer Distributed Control and Intelligent Enviromental Monitoring. [5] [Pana11] Panagiotis Kalagiakos, Panagiotis Karampelas, Cloud Computing Learning, Application of Information and Communication Technologies (AICT), 2011 5th International Conference. [6] [Thar10] Tharam Dillon, Chen Wu and Elizabeth Chang. Cloud Computing: Issues and Challenges. 2010 24th IEEE International Conference on Advanced Information Networking and Applications. [7] [Went12] Wentao Liu, Research on Cloud Computing Security Problem and Strategy. 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). [8] [Cong12] Cong Wang, Qian Wang. Toward Secure and Dependable Storage Services in Cloud Computing. ieee transactions on services computing, vol. 5, no. 2, april-june 2012. [9] [Eman12] Eman M.Mohamed. Cloud and Mobile Computing Track Randomness Testing of Modem Encryption Techniques in Cloud Environment. The 8th International Conference on INFOrmatics and Systems (INFOS2012). [10] [Eric12] Mohammed A. AlZain, Ben Soh and Eric Pardede AlZain, M.A.; Soh, B.; Pardede, E. A New Approach Using Redundancy Technique to Improve Security in Cloud Computing. International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012. [11] [Guru12] Gurudatt Kulkarni & Jayant Gambhir, A Security Aspects in Cloud computing. 2012 IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS). 97