A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS



Similar documents
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Data Integrity by Aes Algorithm ISSN

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Savitribai Phule Pune University

(C) Global Journal of Engineering Science and Research Management

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

SFWR ENG 4C03 - Computer Networks & Computer Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

An Efficient data storage security algorithm using RSA Algorithm

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Data Security in Cloud Using Elliptic Curve Crytography

A Layered Signcryption Model for Secure Cloud System Communication

Client Server Registration Protocol

Homomorphic Encryption Method Applied to Cloud Computing

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

SECURITY IN NETWORKS

Computer System Management: Hosting Servers, Miscellaneous

ADVANCE SECURITY TO CLOUD DATA STORAGE

Network Security. HIT Shimrit Tzur-David

CRYPTOGRAPHY IN NETWORK SECURITY

CSE/EE 461 Lecture 23

Is your data safe out there? -A white Paper on Online Security

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Monitoring Data Integrity while using TPA in Cloud Environment

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Network Security Technology Network Management

Enhance data security of private cloud using encryption scheme with RBAC

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Software Tool for Implementing RSA Algorithm

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Cornerstones of Security

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Identifying Data Integrity in the Cloud Storage

Overview. SSL Cryptography Overview CHAPTER 1

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Privacy Patterns in Public Clouds

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security: Focus of Control. Authentication

CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Public Key Cryptography of Digital Signatures

International Journal of Advanced Research in Computer Science and Software Engineering

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Practice Questions. CS161 Computer Security, Fall 2008

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Chapter 10. Network Security

Chapter 7: Network security

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Module 7 Security CS655! 7-1!

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Improving data integrity on cloud storage services

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Principles of Network Security

Secure cloud access system using JAR ABSTRACT:

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Associate Prof. Dr. Victor Onomza Waziri

Sync Security and Privacy Brief

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Cryptographic Data Security over Cloud

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Capture Resilient ElGamal Signature Protocols

Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem

Information Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

VoteID 2011 Internet Voting System with Cast as Intended Verification

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Single Sign-On Secure Authentication Password Mechanism

Transcription:

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore Institute of Engineering and Tech, Coimbatore ABSTRACT Cloud computing is a new computational paradigm that offers an innovative business model for an organization to adopt IT without upfront investments. It provides enormous storage for data and computing to customers over the internet. Cloud Computing gained great responsiveness from the industry but still there are many issues that are hampering the growth of the cloud. Security of data in cloud is one of the major issue which is more complication in the implementation of cloud computing. These security issues are avoided by various encryption s. This work presents a review on various encryption s to enhance the data security in cloud computing. Keywords: Cloud Computing,Data Security, RSA, AES. INTRODUCTION Cloud computing is a model which allows the user to use the services by the service provider on pay per use basis. Cloud computing is a concept of using remote services through a network using various resources. According to NIST Cloud computing is a model for enabling, convenient, on demand network access to a shared pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. The great flexibility and economic saving of cloud computing are monitoring all kinds of users such as customers, enterprise and even government organizations to adopt cloud.the cloud computing model has three functional units. They are: i)cloud service provider, ii)client/owner, iii) User Cloud Service Models: The major cloud computing service models are known as Software as a service, Platform as a Service and Infrastructure as a Service. 1

Software as a Service(SaaS): It is a software distribution model in which applications are hosted by vendor. Platform as a Service (PaaS):It is a program paradigm for delivering operating systems over internet. Infrastructure as a Service (IaaS):It involves outsourcing the equipment used to support operations, including hardware servers and networking components. Securing data is always a vital significance, because the cloud computing lugs a large amount of complex data. Therefore data privacy and security are issues that need to be resolved [7].The foremost security issues in cloud computing are, i) Privacy and Confidentiality,ii) Security and Data Integrity.Once the clients farm out the data to the cloud, there must be some declaration that data is reachable to only authorized user. The cloud user guaranteed the data stored on the cloud will be confidential.data security can be provided using innumerable encryption and decryption techniques. With providing the security of the data, cloud service provider should also implement mechanism to monitors integrity of the data at the cloud. There are various attacks incloud computing, they are: i) Tampering, ii) Repudiation, iii) Eavesdropping information disclosure, iv) Identity Spoofing. Tampering occurs when an attacker may alter the information either stored in local files or database is showed over public network. Repudiation occurs when sender tries repudiating the validity of a statement which is sent by him/her. Eavesdropping information disclosure occurs when attacker gain access in the data path and gains access to monitor and read the messages Identity spoofing occurs when an attacker impersonates the users as the originator of the message in order to gain access on a network. LITERATURE REVIEW A. Ensure Data Communication Using RSA, AES in Cloud Computing: Nirosha andk.suma Latha [3] proposed RSA, AES encryption s are used with the erasure coding for secure data forwarding. Constructing a cloud storage system for secure data forwarding using encryption and decryption techniques. For encryption, use the proxy re-encryption scheme integrating with RSA. The encryption scheme supports encoding operations over encrypted messages and forwarding operations over encrypted and encoded messages. A secure distributed storage system is formulated by partitioning the data and performing encryption key at user and regenerating it at key servers on demand for partial decryption. In this work, the cryptographic schemes are used; RSA is used for encryption at first time. AES is used for re-encryption, (i.e.) RSA is used for key generation and encryption of data blocks. AES is used for re-encryption of cipher blocks.the goal of proxy reencryption is to securely enable the re-encryption of cipher texts from one secret key to another without relying on trusted parties.erasure coding is k blocks of secure data are encoded to n blocks 2

of encoded data, such that the source data can be reconstructed from any subset of k encoded blocks. Each block is operated by arithmetic operations. Fig. 1 shows the data is divided into blocks of user A and encrypts the block and send the cipher blocks to storage servers. User performs re-encryption when data blocks are needed to be forwarded. When user B wants the data queries the key servers. Key servers retrieve the data from storage servers after decoding process is performed and the partial decryption is done by key servers after generating the re-encryption key on demand for partial decryption. Fig.1 A General Architecture For Secure Data Forwarding. B.An Improved RSA Encryption Algorithm for Two Key Generation Algorithm (2KGA): Shubhra saagar and Datta [5] proposed the cryptography concepts to upturn the security of encrypted cloud data in cloud servers with minimum consumption of cost and time at both encryption and decryption processes. Dual encryption processes has been applied to avoid common attacks against RSA s.two Key Generation Algorithm is used based on the strengths of efficient RSA and RSA small-e. In this, the number of exponents will be increased to three. The Two Key Generation Encryption Algorithm has the following steps: A. Key Generation Algorithm: a. Randomly and secretly choose two large primes: p, q and compute n=p.q b. Compute α n=p-1 q-1. c. Compute β n, h=ph-p0 ph-p1.ph-ph-1+qh-q0 qh-q1.qh-qh-1. d. Select Random Integer: r such as 1<r<n and gcd r,α=1 and gcd r,β=1(r should be small integer) e. Compute e such as r.e mod α n and 1<e<α n. 3

f. Compute d such as r.d mod β n and 1<d<β n. g. Public Key: e, n h. Private Key: r,d,n B. Encryption Processes: a. Entity A needs to send message m to Entity B b. Entity B should send his public key to Entity A c. Entity A will encrypt m as: c= ((m e mod n)e mod n) d.after that Entity A will send c to Entity B C. Decryption Processes: a.entity B will decrypt the message as m= ((cr mod n)d mod n).in this r is used as a third exponent defined according to RSA small-e.in proposed, dual encryption process is applied to increase the security level of the comparison of original RSA. C. Enhance Data Security Using RSA and MD5: Sudhansu and Biswaranjan [6] proposed a work for increase the confidentiality and authentication of data by using RSA and MD5 s. Two s are implemented; one is for encryption and decryption. The other is for authentication purpose. For the secure communication, user send the request to provider that requests are encrypted by using system s public key by RSA. When the user gets the file, after that the user s browser decrypts using the system s private key. After gets connected with the system the user can upload or download files from the server. When the user wants to upload a file, encrypts using system s public key. For each request of user the system randomly generated different keys for both encryption and decryption. After receiving the encryption key, user encrypts the file.md5 is used for preventing from unauthorized access for the key. For authentication, using MD5 user generates the message digest. After receiving the digital signature, from the user, the same MD5 used for verification. Once the verification is done, the encrypted file is stored on the storage server in the user name. In this model, intruders cannot easily access or upload the file because the s are executed in different servers at different locations. Let s assume two organizations A and B. Organization B wants a secure data from A s cloud. So send the secure data by using digital signature along with RSA encryption diagrammatically described in fig 2. Using the RSA encryption Organization A will encrypt the message by using B s public key. Then the file will be processed large volume of data into fixed few lines by using MD5 to generate message digest. 4

Enc(E,M) Compares using MD5 Dec(D,c) Msg(M) Cipher text( C ) Msg(m) MD5 MsgDigest( H) Sig(D,H) Signature(S ) Versig (E,S) Msg digest SENDER A SENDER B Fig.2 Working of Digital Signature with RSA Encryption Algorithm A then encrypt the message digest using its own private key to digital signature. B will decrypt the message using his own private key and finally the signature is verified using A s public key. D.Enhancing Data Security Using AES: Abha and Mohit [1] proposed a work for simple data protection model to encrypt the data using Advanced Encryption Standard(AES), that ensuring the data confidentiality and security. CSP cannot provide encryption granularity to each user at each level. So need encryption solution between user applications and database servers in the cloud initiated by the user. Choose symmetric cryptosystem as solution as it has the speed and computational efficiency to handle large volume of data. In this model the user decides to use the cloud services and transfer the data on cloud. User submits service requirements with CSP s and chooses provider offering best specified services. Whenever an application uploads any data on cloud, the data is encrypted and then sent. The encryption process is done using AES. Once the data is encrypted, then it can upload on to the cloud. Any requests to read the data will happen after it is decrypted on the user end. And then the plain text can be read by the requesting application. AES provides greater security to cloud users as encrypted data and prevents the cloud users from many attacks. Thus AES provides security to cloud users as encrypted data in the cloud is safe from several attacks. 5

COMPARISON In the below table a comparative study of RSA, AES encryption s in cloud computing founded on the reviews based on the various parameters.[4]. Table1: Comparison between RSA, AES s Name of Title Ensure Data Communication Using RSA, AES in Cloud Computing An Improved RSA Encryption Algorithm for Two Key Generation Algorithm (2KGA) Enhance Data Security Using RSA and MD5 Enhancing Data Security Using AES Algorith m Used AES, RSA Block Size 128,Mi n 512 Key Size 128,1 92,25 6,> 1024 RSA 128 2048 RSA,MD 5 128,512 >1024, AES 128 128 Parameters Algorithm Security Ciphering and Decipheri ng Key Symmetric, Asymmetr ic Asymmetr ic Asymmetr ic, Hash Symmetric Secured Different, Same Cipherin g and Decipher ing Algorith m Different,Same Secured Same Same Secured Same Same Secured Different Different 6

CONCLUSION Cloud computing allows user to store their data in cloud storage when user required. So cloud is on internet, various security issues are encountered like confidentiality, privacy, authentication. Various cryptographic s used for both encryption and decryption of cloud data to improve the security. Security of cloud depends on trusted computing and cryptography. This paper presents a review on RSA, AES encryption s and using the cryptographic techniques to enhancing a data security in cloud computing. REFERENCES [1] Abha Sachdev, Mohit Bhansali, Enhancing Cloud Computing Security Using AES International Journal of Computer Applications, April 2013. [2] Dhaval Patel, M.B. Chaudhari Data Security in Cloud Computing using Digital Signature, International Journal for Technological Research in Engineering. [3] Nirosha, K. Suma Latha, A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment, International Journal of Advanced Research in Computer Science and Software Engineering, July 2013. [4] Prerna Mahajan, Abhishek Sachdeva, A Study of Encryption Algorithms AES, DES, and RSA for Security, Global Journal of Computer Science and Technology Network, Web& Security. [5]Shubhra Saggar, R.K.Datta, An Improved RSA Encryption Algorithm for Cloud Environments: Two Key Generation Encryption(2KGEA) International Journal of Software and Web Services, Aug 2013. [6] Sudhansu Ranjan Lenka, Biswaranjan Nayak, Enhancing a Data Security in Cloud Computing Using RSA Encryption and MD5, International Journal of Computer Science Trends and Technology, June 2014. [7] Sanjoli single, Tasmeet Singh in Cloud Data Security using Authentication and Encryption Techniques, International Journal of Advance Research in Computer Engineering & Technology. 7