An Efficient data storage security algorithm using RSA Algorithm



Similar documents

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

The NIST Definition of Cloud Computing (Draft)

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

AN OVERVIEW ABOUT CLOUD COMPUTING

Fully homomorphic encryption equating to cloud security: An approach

Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

The NIST Definition of Cloud Computing

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Chapter 23. Database Security. Security Issues. Database Security

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

The Mathematics of the RSA Public-Key Cryptosystem

IS PRIVATE CLOUD A UNICORN?

CRYPTOGRAPHY IN NETWORK SECURITY

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Symmetric Key cryptosystem

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Security Considerations for Public Mobile Cloud Computing

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Data Security in Cloud Computing using Elliptical Curve Cryptography

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

Data Integrity Check using Hash Functions in Cloud environment

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Chapter 1: Introduction

Cryptography and Network Security Chapter 9

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

White Paper on CLOUD COMPUTING

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Monitoring Data Integrity while using TPA in Cloud Environment

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Keyword: Cloud computing, service model, deployment model, network layer security.

Chapter 23. Database Security. Security Issues. Database Security

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Savitribai Phule Pune University

Security Model for VM in Cloud

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Analysis of Security Algorithms in Cloud Computing

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Lukasz Pater CMMS Administrator and Developer

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Secure File Transfer Using USB

Security Issues In Cloud Computing and Countermeasures

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Chapter 7: Network security

Lecture 6 - Cryptography

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Private Cloud 201 How to Build a Private Cloud

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Cloud Computing; What is it, How long has it been here, and Where is it going?

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem

Software Tool for Implementing RSA Algorithm

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Security Analysis of Cloud Computing: A Survey

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Managing Cloud Computing Risk

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

CSCE 465 Computer & Network Security

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Security Issues in Cloud Computing

7! Cryptographic Techniques! A Brief Introduction

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Enhance data security of private cloud using encryption scheme with RBAC

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS

Cloud Security Introduction and Overview

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Security & Trust in the Cloud

Cloud Computing. What is Cloud Computing?

CLOUD COMPUTING SECURITY CONCERNS

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Transcription:

An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, INDIA 2 Assistant Professor, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab, INDIA ABSTRACT This paper gives a brief introduction about cloud computing by giving its definition, characteristics of cloud computing, components, types, categorization of cloud services which described Platform as a Service, Infrastructure as a Service and Software as a Service. By having a look at this paper, an individual surely will have a clear idea about the basics of cloud computing. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This paper explores various security methods such as Access Control, Telecommunications and Network Security, Information security governance and risk management, Application Security, Security Architecture and Design. An RSA system generally belongs to the category of PKCS. RSA encryption is one of the public-key methods that have been popular in last decade. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The performance characteristics of RSA are observed by implementing the algorithms for computation. In this paper, RSA was implemented through an encryption and decryption procedures over different key sizes. Keywords: Cloud Computing, Private Cloud, Public Cloud, Software as a service (or SaaS), Platform as a service (or PaaS), Infrastructure as a service (or IaaS). RSA, Pubic Key, Private Key, Encryption, Decryption. 1. INTRODUCTION 1.1 Definition Cloud computing provides a computer user access to Information Technology (IT) services i.e., applications, servers, data storage, without requiring an understanding of the technology or even ownership of the infrastructure. The cloud is defined as the Internet surrounding every part of our daily lives, similar to the clouds in the sky [1]. However many new enterprise related buzzwords have evolved from the original computing in the cloud concept; Software-as-a- Service, Software + Services which has evolved as a more Microsoft related term, and social-media which is a cornerstone in social networking and development [2].In today s economic environment, organizations are focused on reducing costs and doing more with less while still trying to remain competitive. This means that IT departments are facing greater scrutiny to ensure that they match key business needs and deliver intended results in the most efficient and cost-effective manner. To meet these challenges, IT organizations are increasingly moving away from devicecentric views of IT, to one that is focused on applications, information, and people and more towards the new paradigm of Cloud Computing [4]. In the first section of the paper we analysis the characteristics of cloud computing and types of clouds. In the second section of the paper we analysis the categorization of cloud services. In the third section we are discussed security methods of cloud computing. In the fourth section we propose a novel technique OVERVIEW OF RSA CRYPTOSYSTEM. Finally we present the Conclusion & future works with the references. Figure 1: Cloud Computing Model Volume 2, Issue 3, March 2013 Page 536

1.2 CHARACTERISTICS OF CLOUD COMPUTING KEY CHALLENGES The key characteristics of cloud computing includes the following: On-demand self-service Unilateral provisioning of such computing resources as server time, storage or network bandwidth, without requiring human interaction with service providers. Ubiquitous network access Access to systems ardless of user location or device (PC, mobile phone, tablet, etc.). Resource pooling Multi-tenancy that enables sharing of pooled resources and costs across a number of users, with different physical and virtual resources dynamically assigned and reassigned according to user demand. Rapid elasticity Quick scale up or scale down of resources through elastic provisioning or the release of capabilities in near real time. Pay per use Capabilities that are charged using a metered, fee-for-service or advertising-based billing model to promote optimization of resource use. One pays only for the time when the resource is used. 1.3 TYPES OF CLOUDS The various types of clouds are: 1. Public Cloud: The cloud infrastructure is made available to the general public or a large industry group and owned by an organization selling cloud services. The organization using public cloud does not control how those cloud services are operated, accessed or secured. 2. Private Cloud: The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or a third party and may exist on or off-premises. While the organization does not need to physically own or operate all the assets, the key is that a shared pool of computing resources can be rapidly provisioned, dynamically allocated and operated for the benefit of a single organization. 3. Community Cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations). It may be managed by the organizations or a third party and may exist on premises or off-premises. 4. Hybrid Cloud: The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). 2. CATEGORIZATION OF CLOUD SERVICES Cloud computing into three parts: 1. Platform as a Service (PaaS):- Cloud computing has evolved to include platforms for building and running custom applications, a concept known as Platform-as-a-Service. To develop software, you once had to buy databases, servers, networks, and a host of development tools. And then you needed the staff to install, optimize, and maintain it all. With PaaS, you can avoid those investments and focus on developing applications instead. Key characteristics of PaaS are Services to develop, test, deploy, host and maintain applications in the same integrated development environment, Web based user interface creation tools, Multi-tenant architecture, Integration with web services and databases, Support for development team collaboration, Utility-grade instrumentation. 2. Infrastructure as a Service (IaaS):- Infrastructure as a Service (IaaS) is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. Key characteristics of IaaS are Utility computing service and billing model, Automation of administrative tasks, dynamic scaling, Desktop virtualization, and Policy-based services. 3. Software as a Service (SaaS):- Software as a service (or SaaS) is a way of delivering applications over the Internet as a service. Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management. SaaS applications are sometimes called Web-based software, on-demand software, or hosted software. Key characteristics of SaaS are Scalability, Multi-tenant efficient, Configurable. 3. SECURITY METHODS OF CLOUD COMPUTING The various security methods used in the are discussed below. 3.1 Access Control Access controls are security features that control how users and systems communicate and interact. When a user is prompted for a user ID and password, this is considered an access control. Threats to access control in cloud computing include frictionless registration processes, account hijacking, generic authentication attacks, and insecure identity and access management. 3.2 Telecommunications and Network Security This domain discusses threats such as exploitation via cloud hacking, denial of service, and manipulation of vulnerabilities within a virtual machine, followed by countermeasures to mitigate these threats. Next, attacks and Volume 2, Issue 3, March 2013 Page 537

countermeasures on virtual machines vulnerabilities are discussed, followed by generic countermeasures to telecommunications and network security in the cloud. 3.3 Information security governance and risk management The focus of analysis within this domain will center on information security policy as well as risk management/assessment, both of which are administrative security controls. Fragmented and incomplete security guidance of cloud computing implementation might result in exploited vulnerabilities. 3.4 Application Security When dealing with application security, the DoD must consider the three levels of cloud computing, PaaS, SaaS and IaaS. This security issues with insecure interfaces, and then specific security issues within each of the three cloud levels, followed by countermeasures and recommendations. Exploitation of insecure interfaces and application programming interfaces (APIs). CSA lists insecure or weak interfaces and APIs as a top threat to cloud security. Interfaces for access control, encryption, and activity monitoring must encompass secure designs to prevent malicious and accidental circumventions of security policy. 3.5 Security Architecture and Design In order to closely monitor resources for unauthorized activities or accesses, cloud customers should verify that proper security coding practices are utilized in cloud architecture designs. This summarizes potential problem areas within cloud to include: shared technologies, failures in design, and authorization. 4. RSA Algorithm RSA is a public key algorithm based on difficulty of prime factorization. Similar to most public keys password features, RSA password is block encrypted, but different from block encryption used in a secret key algorithm such as DES (Data Encryption Standard) in the sense that a length of a plain text and a key is variable; in other words, a relatively long length of a key can be used in consideration of the secure and reliable system, and a relatively short length of a key can be used for efficient system. In an RSA algorithm, receiver's public key is used to encrypt messages, and the receiver decrypts encrypted messages with its own private key. In an RSA-based signature algorithm, a sender signs messages with its own private key, and a receiver verifies the signed message with sender's public key; this is how an authentication service is guaranteed through an RSA-based signature algorithm. In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS. RSA encryption is one of the public-key methods that have been popular in last decade. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The performance characteristics of RSA are observed by implementing the algorithms for computation. In this paper, RSA was implemented through an encryption and decryption procedures over different key sizes. Because of wide uses of networks during the last decade and growing security requirements in communication, public-key cryptosystems have been regarded highly. The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption [8]. A key distribution under symmetric encryption requires either (1) that two communicants already share a key, which somehow has been distributed to them; or (2) the use of a key distribution center. The Rivest- Shamir- Adelman (RSA) cryptosystem is a well known public-key encryption method that is applied to many systems for encryption and decryption [9]. RSA is one of the oldest and most widely used public key cryptographic systems. It was the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography [8]. RSA is still widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys. The RSA method is mainly based on integer and factoring as a one way function [8]. Asymmetric cryptography: Unlike the symmetric cryptography, asymmetric cryptography uses a pair of keys to encrypt and decrypt message. One of these two keys is known as public key as it is distributed to others and the other is called private key which is kept secret [11]. Normally public key is used to encrypt any message which can only be decrypted by the corresponding private key. There are essential properties that must be satisfied by the asymmetric cryptography [12]. (i) The key generation process should be computationally efficient. (ii) Sender should be able to compute the cipher text by using the public key of the receiver for any message. (iii) The receiver should be able to decrypt the cipher easily to plain text by using his own private key. (iv) It is impossible or at least impractical to compute the private key from the corresponding public key. (v) It is computationally infeasible to compute the plain text form the public key and cipher text. RSA is the most widely used asymmetric encryption system or a public key encryption standard, the private key is kept secret but the public key is revealed to everybody in RSA [8]. Volume 2, Issue 3, March 2013 Page 538

Bob s Public Key Ring Plain Text Input Encryption Algorithm Public Key Transmitted Chipertext Private Key Description Algorithm Plain Text Output Figure 2: Public Key Encryption Scheme 4.1 OVERVIEW OF RSA CRYPTOSYSTEM A public-key encryption scheme has six ingredients Figure 2: Plaintext: This is the readable message or data that is fed into the algorithm as input. Encryption algorithm: The encryption algorithm performs various transformations on the plaintext. Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input. Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different cipher texts. Decryption algorithm: This algorithm accepts the ciphertext and the matching key and produces the original plaintext. In RSA, the plaintext and the cipher text are considered as integers between 0 and n-1, where n is the modulus. The typical size of n is 1024 bits. However, the recommended length of n is 2048 bits as 640 bits key is no more secure by now [8]. The RSA algorithm is comprised of three sub algorithms that are described below: 4.1.1 Key Generation Algorithm RSA public and private key pair can be generated by the following procedure. Choose two random prime numbers p and q such that the bit length of p is approximately equal to the bit length of q. The key set is generated by using the following algorithm: 1. Select two large prime numbers p and q such that p q. 2. Compute modulus n = p*q 3. Compute (n) such that (n) = (p 1)* (q 1). 4. Choose a random integer e satisfying 1<e < (n) and gcd (e, (n)) =1 5. Compute the integer d, such that e*d = 1 mod (n). (n, e) is the public key, and (n, d) is the private Key n is known as the modulus. e is known as the public exponent or encryption exponent or just the exponent. d is known as the secret exponent or decryption exponent. 4.1.2 Encryption Encryption refers to algorithmic schemes that encode plain text into non-readable form or cipher text, providing privacy. Encryption is done by using the following steps: 1. Obtain the recipient's public key (n, e). 2. Represent the plaintext message as a positive integer m. 3. Compute the cipher text c = me mod n. 4. Send the cipher text c to receiver. 4.1.3 Decryption Decryption refers to algorithmic schemes that decode cipher text or non-readable text into readable form or pain text. Message is decrypted by using the following steps: 1. Receiver uses his own private key (n, d) to compute m = cd mod n. 2. Extracts the plaintext from the integer representative m. 5. CONCLUSION AND FUTURE SCOPE Cloud computing is changing the way IT departments buy IT. Businesses have a range of paths to the cloud, including infrastructure, platforms and applications that are available from cloud providers as online services. Many people may be confused by the range of offerings and the terminology used to describe them and will be unsure of the risk and Volume 2, Issue 3, March 2013 Page 539

benefits. Future scope should be in RSA cryptography to comparison of another cryptography algorithm such symmetric and asymmetric. Develop another algorithm merge two algorithm which provide more security. The security architecture and design domain dissected several important areas: establishing isolation management within shared technologies; designing architectures for meeting customer demands for service and availability; and certifying and accrediting systems before use, while leveraging federal solutions. The application security domain addressed exploitation and countermeasures to protect insecure interfaces. It provided methods on increasing security for PaaS, SaaS, and IaaS in the realm of message communication, information handling, key management, SDLC, tools and services, metrics, economics, and inter-host communication. This paper presents the implementation of RSA through an encryption and decryption procedures, which are readily available for commercial use. Experiments were conducted on different text sizes. The results obtained in encryption and decryptions of RSA were given in seconds. REFERENCES [1] What Cloud Computing Really Means - infoworld.com. [2] Draft NIST Working Definition of Cloud Computing v15, http://csrc.nist.gov/groups/sns/cloudcomputing/clouddef- v15.doc. [3] Google App Engine http://code.google.com/appengine/. [4] Weiss, A., 2007. Computing in the Clouds, NetWorker, 11(4), pp. 16-25. [5] Microsoft Windows Azure http://www.microsoft.com/windowsazure/. [6] M.Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A.Konwinski, G. Lee, D.A. Patterson, A.Rabkin, I. Stoica, and M.Zaharia, Above the Clouds : A Berkeley View of Cloud Computing, 2009. [7] Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology, 2011. [8] M.Shand and J.Vuillemin, Fast Implementation of RSA Cryptography, Pro c.1 1th IEEE Symp. Computer Arithmetic, E.E.Swartzlander, M.J. [9] RSA Laboratories, High Speed RSA Implementation, RSA Data Security, November 1994. [10] Whitefield Diffie, Martin E Hellman New Directions in Cryptography, IEEE Information Theory, June 23-25, 1975 and IEEE International Symposium on Information Theory, Sweden, June 21-24, 1976. [11] R.L.Rivest, A.Shamir, and L.Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, 21(2), 120-126, February 1978. [12] RSA Data Security, Inc.The RSA Factoring Challenge. http://www.rsa.com/rsalabs/node.asp?id=2092. [13] www.eclipse.org/downloads/moreinfo/jre.php. Volume 2, Issue 3, March 2013 Page 540