Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms



Similar documents
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.


Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Data Integrity Check using Hash Functions in Cloud environment

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

International Journal of Advanced Research in Computer Science and Software Engineering

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

An Approach to Load Balancing In Cloud Computing

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

Cloud Computing. Cloud computing:

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Cloud Computing. Karan Saxena * & Kritika Agarwal**

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment

Survey on software testing techniques in cloud computing

Fundamentals of Cloud Computing

Mobile Hybrid Cloud Computing Issues and Solutions

An Efficient data storage security algorithm using RSA Algorithm

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Data Storage Security in Cloud Computing

Implementing Cloud Data Security by Encryption using Rijndael Algorithm

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study

Security Analysis of Cloud Computing: A Survey

International Journal of Advanced Research in Computer Science and Software Engineering

Keyword: Cloud computing, service model, deployment model, network layer security.

Cloud Computing Terms:

20 th Year of Publication. A monthly publication from South Indian Bank.

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

In a dynamic economic environment, your company s survival

Cloud Computing Architecture: A Survey

Introduction to Cloud Computing

Performance Gathering and Implementing Portability on Cloud Storage Data

CHAPTER 8 CLOUD COMPUTING

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

An Introduction to Cloud Computing Concepts

Rapid Application Development

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm

Verifying Correctness of Trusted data in Clouds

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

Multilevel Communication Aware Approach for Load Balancing

Cluster, Grid, Cloud Concepts

A Comparative Study of cloud and mcloud Computing

White Paper on CLOUD COMPUTING

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

A Review on Cloud Computing Vulnerabilities

CLOUD COMPUTING An Overview

Security Issues In Cloud Computing and Countermeasures

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

CLOUD COMPUTING. When It's smarter to rent than to buy

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Cloud Courses Description

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Analysis and Strategy for the Performance Testing in Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing Security Issues And Methods to Overcome

IS PRIVATE CLOUD A UNICORN?

Webpage: Volume 3, Issue XI, Nov ISSN

EDA385 Embedded Systems Design. Advanced Course

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Courses Description

Permanent Link:

Cloud Computing Services and its Application

Data Security in Cloud Computing using Elliptical Curve Cryptography

(C) Global Journal of Engineering Science and Research Management

Everything You Need To Know About Cloud Computing

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

A Study of Infrastructure Clouds

A Middleware Strategy to Survive Compute Peak Loads in Cloud

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

How To Understand Cloud Computing

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Cloud Computing and Software Agents: Towards Cloud Intelligent Services

Investigation of Cloud Computing: Applications and Challenges

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CloudFTP: A free Storage Cloud

Monitoring Data Integrity while using TPA in Cloud Environment

Data Integrity by Aes Algorithm ISSN

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Cloud Computing Technology

Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

Transcription:

RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College, Punjab-160062) 2 (ssociate professor, epartment of Information Technology, Chandigarh Engineering College, Punjab-160062) BSTRCT Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data centers, where the data management may not be trustworthy. This paper analyze the performance of security algorithms, namely, ES, ES, BLWFISH, RS and M5 on single system and cloud network for different inputs. These algorithms are compared based on two parameters, namely, Mean time and Speed-up ratio. Keywords - ES, ES, BLWFISH, Cloud computing, Google app engine, M5, RS. I. INTRUCTIN Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers to handle applications [8]. Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network. Cloud computing refers to computing with a pool of virtualized computer resources. cloud can host different workloads, allows workloads to be deployed/scaled-out on-demand by rapid provisioning of virtual or physical machines, supports redundant, self-recovering, highly-scalable programming models and allows workloads to recover from hardware/software failures and rebalance allocations. The idea is to move desktop computing to a serviceoriented platform using server clusters and huge databases at datacenters. Let's say you're working in a company. You have the duty to make sure that all the other employees have sufficient hardware and software they need to do their jobs. When a new recruitment takes place you have to buy new hardware as well as new software for the hired person. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night [9]. Later, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing, and it could change the entire computer industry. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest [9]. Cloud computing has four essential characteristics: elasticity, scalability, provisioning, standardization, and pay-as-you-go. This paper analysis data security model for cloud computing. We propose a data security model based on studying of cloud computing architecture. We implement software to select the suitable and highest security encryption algorithm. This software makes evaluation form five modern encryption techniques namely ES, ES, BLWFISH, RS, M5.Section II states Cloud computing architecture. In section III outlines cloud computing environment. Section IV, Methodology. Section V results and section VI has conclusion. 782 P a g e

have to do is connect and use it. SaaS Examples include customer relationship management as a service. Cloud computing eployment models 1). Public cloud: sold to the public, very large infrastructure 2). Private cloud: wned by enterprise The main attributes of cloud computing is illustrated as follows:- 1).Elasticity and scalability: Elasticity of the cloud means that the as per resource allocation demand the cloud can be bigger or smaller. Elasticity enables scalability, which means that the cloud can scale upward for peak demand and downward for lighter demand. Scalability also means that an application can scale when adding users and when application requirements change [7]. 2).Self-service provisioning: Cloud customers can have an access to cloud without having a lengthy process. You request an amount of computing, storage, software, process, or more from the service provider [7]. 3).Standardization: For the communication between the services there must be standardized PI s. standardized interface lets the customer more easily link cloud services together [7]. 4) Pay-as-you-go: Customer have pay some amount for what resources he has used.. This pay-as-you-go model means you have to pay for what you have used. II. U CMPUTING RCHTECHTURE Cloud computing service models Infrastructure as a Service (IaaS): The IaaS layer offers storage and compute resources that developers and IT organizations can use to deliver business solutions. Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations [14]. Figure 1: eployment model 3).Hybrid cloud: two or more clouds composition. 4).Community cloud: shared infrastructure for specified community -Cloud computing benefits More storage, efficient Backup and isaster Recovery, high Mobility, Cost Efficiency, Less maintenance required, Continuous availability, more scalability. -- Cloud computing disadvantages Less control, unreliable, unpredicted Costs for customer, more contracts and Lock-Ins, Less Security in the Cloud. III. LGRITHMS IMPLEMENTE The cryptographic algorithms used are Symmetric key algorithms, symmetric key, algorithms and Combination key algorithms.. Encryption will make the data more secure on single system as well as on the cloud network. The algorithms will run on single system as well as on cloud network. 1).ES: In cryptography, the dvanced Encryption Standard (ES) is a symmetric-key encryption standard. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively [16] 2).M5: a widely used cryptographic hash function with a 128-bit hash value processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks; the message is padded so that its length is divisible by 512 [16]. In this sender use the public key of the receiver to encrypt the message and receiver use its private key to decrypt the message [16] Software as a Service (SaaS): In the SaaS layer, the service provider hosts the software so you don t need to install it, manage it, or buy hardware for it. ll you 783 P a g e

Table1: Keys and Key size Key Name Key Size ES 256 ES 64 RS 80 M5 128 4).ES:- The ES (ata Encryption Standard) algorithm is the most widely used encryption algorithm in the world. For many years, and among many people, secret code making and ES have been synonymous meaning it operates on plaintext blocks of a given size (64-bits) and returns cipher text blocks of the same size. 5).RS:- RS is an algorithm for public-key cryptography, involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. It protected user data include encryption prior to storage, user authentication procedures prior to storage or retrieval, and building secure channels for data transmission [16]. IV. PERFRMNCE NLYSIS PRMETERS The data will be encrypted using the algorithms such as, ES, ES, BLWFISH, RS, Blowfish and M5.By using these algorithms, the speed-up ratio and the mean processing time for different inputs are calculated. 4.1. Speed-Up ratio is defined as the difference between the mean processing time of single system and the cloud network. Speed-up ratio will provide tell us how fast the data have been encrypted. It will give us the idea about speed of encryption. 4.2. Mean processing time is the difference between the starting time taken to encrypt the data and the ending time. It is also evaluated both on single system and on cloud network. It is the difference between the time taken to encrypt the data. s the size of input increases the time taken to encrypt the data will increase and with the increase in time speed-up ratio decreases. is referred to as Platform as a Service (PaaS). In this category, ne example is Google s pp Engine, it provides a runtime environment and set of PI s [16]. For interaction with Google s cloud runtime, applications are run on sandboxed environment. s the request increases for an application, pp engine offers automatic scaling for web application. Google app handles languages such as python and java. Google pp is free up to certain level of consumed resources, charges applied for the additional storage and bandwidth [16, 4]. Experimental evaluation is done on eclipse-sk and Google pp engine. The evaluation is done for different input sizes: 10KB, 13KB, 39 KB, and 56 KB. For the data security, we have used five encryption algorithms: ES, ES, BLWFISH, RS and M5.These five algorithms are implemented in the sandboxed environment using Eclipse.Eclipse is an integrated development environment which is used to build and run the applications. Using java on eclipse the algorithms are run on local as well as on Google app engine. VI. RESULTS Comparing Speed-up ratio and Mean time are used to select the highest security algorithm. Five encryption algorithms are being used namely ES, ES, BLWFISH, RS and M5 Table 2: Comparison of Mean processing time of the algorithms on local system as well as on cloud network In pu t ES ES C L U E S E S U BL WF ISH BL WF ISH U RS RS U 10 kb 11.5 1. 5 7.5 2 4 2 238 274.25 13 14 2 10 2.5 4.7 2 328 331 kb.7.25.5 39 21 3 31. 6.5 8.2 2.7 358 351 kb 5 5 5.5.7 56 24 3. 50. 9.2 15. 3 496 415 kb.5 75 25 5 7.25.25 Mean processing time is calculated in milliseconds. M 5 M 5 U 1 0.5 V. METHLGY The users implement their application for deploying them on the cloud. Cloud software environment provider supplies the developers with programming-level-environment with well defined set of PI s. The service commonly provided by this layer 784 P a g e

600 500 400 300 200 100 0 10 KB13 KB39 KB56 KB ES ES BLWFISH RS M5 Fig 3: Comparison of Local mean time for algorithms with different input sizes. 600 500 400 300 200 100 0 10 KB13 KB39 KB56 KB ES ES BLWFISH RS M5 Fig 4: comparison of Cloud mean time for algorithms with different input sizes. Table 3:Speed-up ratio of the algorithms for different input sizes INPUT ES ES BLWFISH RS M5 10 KB 7.6 3.62 2 0.86 1 13 KB 7.2 4 2.3 0.99 1 39 KB 7 4.8 3 1.0 56 KB 6.6 5.43 5.25 1.19 0.5 Fig 5: Comparison of speed-up ratio of the algorithms for different inputs. From the Tabular results, the following observations can be made, using eclipse run variable input sizes on local as well as on Google pp engine. mong all the algorithms RS-an asymmetric encryption algorithm is average most time consuming and M5 is-hashing algorithm is the least tie consuming. ES-a symmetric encryption algorithm, the speed-up ratio falls sharply with the increase in input size.es algorithm has the highest speed-up ratio and then is ES. In M5and ES algorithm the speed up ratio decreases with the increase in size. Whereas ES, RS and BLWFISH remains almost constant. There is a slight change in the speed-up ratio for ES, RS and BLWFISH. VII. CNUSIN ecade s earlier algorithms are implemented on single processor system, but now encryption and decryption techniques are implemented on cloud network. Simulation for different algorithms will be done on the eclipse. The results will be obtained on basis speed-up ratio and performance parameter. ll the algorithms are applied on both the cloud network and single system. From the above results, when you are interested in performance of algorithm, go for M5, BLWFISH, ES and ES. For the security of data, go for the M5 and ES.M5-hashing encryption algorithm is the highest security algorithm. Finally for less time and more secure algorithm, chose M5 followed by ES. REFERENCES [1] mazon Web Services "verview of Security Processes "http://aws.amazon.com/ ugust 2013 [2] Bruce Schneier. "The Blowfish Encryption lgorithm Retrieved ",ctober 25, 2008 785 P a g e

[3] Center f The Protection f National Infrastructure CPNI by eloitte"information Security Briefing 0112010 Cloud Computing", p.71, Published March 2010 [4] Google pp Engine. http://code.google.com/appengine/, ug 2013 [5] http://en.wikipedia.org/wiki/google_pp _Engine. Cited ug 2013 [6] http://www.dummies.com/how-to/content /what-is-cloud computing.html#glossarycloud_computing, cited on ug 21,2013 [7] http://www.dummies.com/how-to/content/ cloud-computing-cheat-sheet.html.cited on ug 21, 2013 [8] http://www.webopedia.com/term/c/cloud _ computing.htmlcited on ug 21, 2013 [9] https://bluelabelhost.com/whatisthecloud, cited on ug 21,2013 [10] http://en.wikipedia.org/wiki/triple_es,cit ed on ug 21,2013 [11] Jim zierick, elevate cloud security with privilege delegation http://www.ibm.com/ developerworks/cloud/library/cl-datacenter migration, ec 2011 [12] luis m. vaquero1, luis rodero-merino1, juan caceres1, maik lindner2 "a break in the clouds: towards a cloud. [13] Ritika Chehal, Kuldeep Singh Efficiency and Security of ata with Symmetric Encryption lgorithms International Journal of dvanced Research in Computer Science and Software Engineering, Volume 2, Issue 8, ugust 2012 [14] Sherif El-etriby, Eman M. Mohamed, Hatem S. bdul-kader Modern Encryption Techniques for Cloud Computing Randomness and Performance Testing in ICICT,800-805,2012.efinition ", CM SIGCMM Computer Communication Review, Vol. 39, No. 1, 2009 [15] Priyanka rora, run Singh, Himanshu Tyagi nalysis of performance by using security algorithm on cloud network in international conference on Emerging trends in engineering and management (ICETM2012), 23-24 June, 2012 [16] Priyanka rora, run Singh, Himanshu Tyagi Evaluation and Comparison of Security Issues on Cloud Computing Environment in World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 5, 179-183, 2012 786 P a g e