A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments



Similar documents
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

Privacy Preservation and Secure Data Sharing in Cloud Storage

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Privacy-Preserving Public Auditing for Secure Cloud Storage

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Integrity Check using Hash Functions in Cloud environment

An Efficient data storage security algorithm using RSA Algorithm

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

The implementation and performance/cost/power analysis of the network security accelerator on SoC applications

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

White Paper. Enhancing Website Security with Algorithm Agility

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

A Secure Intrusion Avoidance System Using Hybrid Cryptography

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Cloud storage Security Mechanism with Authentication in Public Cloud

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Speeding Up RSA Encryption Using GPU Parallelization

Evaluating The Performance of Symmetric Encryption Algorithms

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

Secure Way of Storing Data in Cloud Using Third Party Auditor

PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Software Tool for Implementing RSA Algorithm

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

CRYPTOGRAPHY IN NETWORK SECURITY

Implementation of Full -Parallelism AES Encryption and Decryption

Dynamic Resource Pricing on Federated Clouds

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

EDA385 Embedded Systems Design. Advanced Course

Fully homomorphic encryption equating to cloud security: An approach

Data management using Virtualization in Cloud Computing

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services

ADVANCE SECURITY TO CLOUD DATA STORAGE

Keywords Web Service, security, DES, cryptography.

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Nessus or Metasploit: Security Assessment of OpenStack Cloud

International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Analysis of Security Algorithms in Cloud Computing

Strengthen RFID Tags Security Using New Data Structure

Enhance data security of private cloud using encryption scheme with RBAC

Analysis of Secure Cloud Data Sharing Within a Group

Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

A Secure Decentralized Access Control Scheme for Data stored in Clouds

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY.

International Journal of Advanced Research in Computer Science and Software Engineering

A Secure Hardware Based Multifarious Component Authentication Technique Using USB for Cloud Environment

Survey Paper on Integrity Auditing of Storage

Security over Cloud Data through Encryption Standards

Transcription:

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my) November 2013

Introduction Cloud Computing Storage Virtualization Connectivity Processing Power Sharing Cloud Computing Models Infrastructure as a Service Platform as a Service Software as a Service (Malathi, 2011)

Unlimited storage. The most cost efficient method to use, maintain and upgrade resources. Easier back up and restore processes. Automatic software integration. Quick deployment. (Viswanathan, 2010)

The Most Challenging Issue Ensuring the Security in Cloud Computing Security Issues Types Service Provider Security Issues Identity and Access Management Privacy Securing Data in Transmission User Identity Audit and Compliance Infrastructure Security Issues Securing Data-Storage Network and Server End User Security Issues Browser Security Authentication Loss of Governance Data Protection (Kulkarni, 2012)

Focus Area Service Providers Security Issues Security in Cloud Servers Security in SaaS Applications Focus Area Problem Background Security of data in servers The most popular existing solution Cryptography in Server Side Asymmetric Keys or Symmetric Keys Cryptography?

DATA ENCRYPTION SERVICE Data encryption service is a client-based service that is proposed for increasing reliability in cloud computing communications by applying realtime encryption in client side. In this model, data and keys are stored in different cloud storage and cryptography processes (i.e. encryption and decryption) are done in client side by requesting keys from Key Cloud Server (KCS) and data from Data Cloud Server (DCS). Moreover, the key generation process is done in KCS Software-as-a-Service (SaaS) application.

DATA ENCRYPTION SERVICE According to the nature of this research that is based on sharing concepts, asymmetric key algorithms are more appropriate for data encryption service by using public and private keys. Symmetric key algorithms such as AES are faster than asymmetric algorithm but have considerable problems in sharing processes. Due to this reason and the importance of applying the most efficient encryption performance in client-side, six of the most popular asymmetric encryption models were reviewed and re-developed in the same situation for investigating the strengths and weaknesses of each model to choose the most secure and efficient model due to the nature of the data encryption service. The chosen models are: Original RSA, RSA Small-e, RSA Small-d, MREA, Efficient RSA, and EAMRSA.

GENERAL OVERVIEW OF CRYPTOGRAPHY MODELS Original RSA RSA Small-e RSA Small-d Modified RSA Encryption Algorithm (MREA) Efficient RSA (E-RSA) Encrypt Assistant Multi-Prime RSA (EAMRSA)

METHODOLOGY According to the aim of this research, all of the described models were redeveloped by Microsoft.net Framework 4.0 in C# programming language for analyzing in the same situation. The simulation were done by using Dropbox co. cloud service provider as data cloud server, and two 2.40 GHz Intel Core i5 CPU PCs with 4.00 GB RAM as keys cloud server and client for implementing data encryption service

KEY GENERATION TIME Effect of Changing the Key Sizes from 512 (bits) to 3072 (bits) on Key Generation Time (ms) in KGA according to RSA, RSA Small-e, RSA Small-d, MREA, EAMRSA, and E- RSA Algorithms Key Size (bits) RSA RSA Small-e RSA Small-d MREA E-RSA EAMRSA 512 1024 2048 3072 417 199 199 641 501 890 612 316 316 916 694 1438 890 714 714 1721 997 2864 1943 1201 1201 2612 2281 3314

ENCRYPTION AND DECRYPTION

SECURITY ANALYSIS Brute Force Attack Mathematical Attack Timing Attack

Conclusion According to the nature of client-based data encryption service, E-RSA is suggested to be used in proposed model because it is more secure and has more acceleration, accuracy in comparison with other algorithms. Furthermore, the compatibility of E-RSA is more specified than other algorithms in limited power devices..

References I. Bojanova, and A. Samba, Analysis of Cloud Computing Delivery Architecture Models, in Proc. IEEE International Conf. on Advanced Information Networking and Applications (WAINA), Biopolis, Singapore, 2011, pp. 453-458. M. Armbrust, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, ACM Trans. On Communications, vol. 53, no. 4, pp. 50-58, April 2010. F.B. Shaikh, and S. Haider, Security Threats in Cloud Computing, in Proc. International Conf. for Internet Technology and Secured Transactions (ICITST), 2011, pp. 214-219. T. Mather, S. Kumaraswamy, S. Latif, Data Security and Storage, in Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, M. Loukides, Sebastopol, CA, O Reilly Media, 2009, ch.4, pp. 61-71. M. Ahmed, Y. Xiang, S. Ali, Above the Trust and Security in Cloud Computing: A Notion towards Innovation, in Proc. IEEE/IFIP 8th International Conf. on Embedded and Ubiquitous Computing (EUC), Hong Kong, 2010, pp. 723-730. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, in Proc. IEEE INFOCOM, San Diego, USA, 2010, pp. 1-9. J. Daemen, and V. Rijmen, The block cipher Rijndael, Smart Card Research and Applications Trans. in Cmoputer Science, Springer-Verlag, vol. 1820, pp. 277-284, Jan 2000 R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, ACM Trans. On Communications, vol. 21, no. 2, pp. 120-126, Feb 1978. H. M. Sun, M. E. Wu, W. C. Ting, and M. J. Hinek, Dual RSA and Its Security Analysis, IEEE Trans. on Information Theory, vol. 53, no. 8, pp. 2922-2933, Aug 2007.

Thank you