An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm



Similar documents
Advanced Cryptography

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Fully homomorphic encryption equating to cloud security: An approach

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

An Efficient data storage security algorithm using RSA Algorithm

Homomorphic Encryption Method Applied to Cloud Computing

Software Tool for Implementing RSA Algorithm

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptography and Network Security Chapter 9

A SOFTWARE COMPARISON OF RSA AND ECC

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS

EDA385 Embedded Systems Design. Advanced Course

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CIS 5371 Cryptography. 8. Encryption --

Simple Encryption/Decryption Application

Cloud Computing Security and Encryption

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Chapter 10. Network Security

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Lecture 6 - Cryptography

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Symmetric Key cryptosystem

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Security Sensor Network. Biswajit panja

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Notes on Network Security Prof. Hemant K. Soni

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Data Grid Privacy and Secure Storage Service in Cloud Computing

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

The application of prime numbers to RSA encryption

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Journal of Electronic Banking Systems

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Cryptography and Network Security

Lukasz Pater CMMS Administrator and Developer

Associate Prof. Dr. Victor Onomza Waziri

Public Key Cryptography: RSA and Lots of Number Theory

(C) Global Journal of Engineering Science and Research Management

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cryptography and Network Security

Network Security Technology Network Management

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Public Key (asymmetric) Cryptography

Security in Distributed Systems. Network Security

Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing


CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

The Mathematics of the RSA Public-Key Cryptosystem

7! Cryptographic Techniques! A Brief Introduction

CS 758: Cryptography / Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Overview of Public-Key Cryptography

Secure Data Storage in Cloud Service using RC5 Algorithm

Message Authentication Codes

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Network Security. Outline of the Tutorial

CSCE 465 Computer & Network Security

Network Security. Omer Rana

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Introduction to the RSA Encryption Method

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

CRYPTOGRAPHY IN NETWORK SECURITY

Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem

Savitribai Phule Pune University

Lecture 3: One-Way Encryption, RSA Example

Basic Algorithms In Computer Algebra

Network Security: Cryptography CS/SS G513 S.K. Sahay

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Review of methods for secret sharing in cloud computing

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services

Enhance data security of private cloud using encryption scheme with RBAC

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

Elements of Applied Cryptography Public key encryption

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Secure File Transfer Using USB

TELE 301 Network Management. Lecture 18: Network Security

SFWR ENG 4C03 - Computer Networks & Computer Security

Secure Network Communication Based on Text-to-Image Encryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Waspmote Encryption Libraries. Programming guide

Transcription:

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering Saveetha University, Chennai, Tamil Nadu, India 1,2 ABSTRACT: Nowadays cloud computing is emerging technology which gives open resources on the internet. It is offering large amount of data to the users and distributed data over the network. But the main issue is it does not have any security in distributing data. It becomes the main obstacle in cloud computing environment. So to enhance the security, we proposed an algorithm called RSA algorithm. It is a new approach and it met the requirements of publickey systems. By using this algorithm it will increase the security in data and consumes less time and less cost. KEYWORDS:cloud computing, distributed data, security, RSA algorithm I. INTRODUCTION Cloud computing denotes sharing of resources rather than having local servers to handle applications. It provides services to servers, storage and applications over the internet. And this cloud computing environment is used by all small and large company users. It also developed an application called GOOGLE CLOUD. And there are also many factors supporting cloud computing like virtualization process, distributed storage, fast and inexpensive server, broadband internet access etc. But the major drawback is security in providing data over the internet. Each and every cloud searcher is raising a question to cloud provider that whether it contains security policies and procedures before hosting their applications. Due to poor security, there exists poor API s, data loss, hijacking, traffic etc. so to protect the data, we proposed RSA algorithm. Fig 1: cloud computing architecture RSA algorithm is most widely a general purpose approach to public-key encryption. It is an encryption-decryption technique. It consists of plaintext and cipher text in the form of integers between 0 to n-1. This plain text is encrypted in blocks; each and every block has a binary value which should be less than n. Copyright to IJIRSET DOI: 10.15680/IJIRSET.2015.0403089 1441

This algorithm is done in three steps: Key generation Encryption Decryption II. RELATED WORK In this paper, degree of uncertainty is justified in cloud computing by using the cipher cloud. It makes the user to make the data in a secured manner on public frameworks. To accomplish this, the encryption process has been carried out (i.e.) user data will be sent to cloud server, and cloud server will send back the data again to the user. The secured data cannot be accessed in the public cloud computing, so to make the data to be private they are using encryption process. [1] Many companies are using the cloud architectures. Cloud data security depends more on the procedures and count measures. So this paper discusses about the data security issues in cloud. Some of the issues like privacy and confidentiality, data integrity, data allocation and reallocation, data availability, storage and backup recovery etc. to overcome all these type of issues, RSA algorithm has been used. The data will be encrypted and sent to the user, when the user wants the data it will be sent in the decrypted format. [2] In this paper they discuss about the use of cryptography concepts, to increase the security of encrypted data which is sent by the user to cloud server. The main goal is to encrypt and decrypt the data in a secured way with depletion of less time and less cost in both the encryption and decryption process. Many numbers of keys will be generated and common attacks will be noted. So by repeating the process it helps you to prevent the attacks. [3] Many of the IT organizations are progressively moving away from device centric views of IT. It is mainly focused on the applications, information, people and all these depend only on the new architecture of cloud computing. In this paper they are discussing about the characteristics of cloud computing and types of clouds, categorization of cloud services, security methods of cloud computing, overview of RSA cryptosystem. [4] Many of the IT organizations are progressively moving away from device centric views of IT. It is mainly focused on the applications, information, people and all these depend only on the new architecture of cloud computing. In this paper they are discussing about the characteristics of cloud computing and types of clouds, categorization of cloud services, security methods of cloud computing, overview of RSA cryptosystem. [5] III. PROPOSED WORK 1. RSA Algorithm Process: RSA algorithm is most widely a general purpose approach to public-key encryption. It is an encryption-decryption technique. It consists of plaintext and cipher text in the form of integers between 0 to n-1. This plain text is encrypted in blocks; each and every block has a binary value which should be less than n. This algorithm is done in three steps: Key generation Encryption Decryption The plain text block is taken as M and cipher text block is taken as C. It uses the formula (i.e.) C=M e mod n. Copyright to IJIRSET DOI: 10.15680/IJIRSET.2015.0403089 1442

2. Key Generation: Fig 2: RSA algorithm structure In key generation consider two prime numbers (i.e.) p and q. it consists of public key and a private key. The public key will be known to everyone. Calculate the value of n. select a random encryption key e calculate the gcd and it should be equal to 1. Then find the decryption key d. finally calculate the public key and private key. 3. Encryption process: Fig 3: steps in key generation In the encryption process represent a plaintext in series of numbers modulo n. the encryption process to obtain ciphertext C from plaintext M is very simple. It is formulated as: C=M e mod n Where C = ciphertext M = message text E = public key D = private key The file will be encrypted by sending an symmetric file encrypted key (FEK) simultaneously asymmetric public key will generated, both will be combined and forms an encrypted FEK with a header file. Copyright to IJIRSET DOI: 10.15680/IJIRSET.2015.0403089 1443

Decryption process: Fig 4: steps in encryption process The reverse process of encryption will be decryption. It can be generated using the formula: m= e d mod n. Where C =ciphertext M=message text E =public key D =private key Fig 5: Decryption process IV. EXPERIMENTAL RESULTS Example for RSA algorithm: Step 1: Select primes: p=17 &q=11 Step 2: Compute n = pq=17 11=187 Step 3: Compute ø(n)=(p 1)(q-1)=16 10=160 Step 4: Select e :gcd(e,160)=1; choose e=7 Step 5: Determine d: de=1 mod 160 and d < 160 Value is d=23 since 23 7=161= 10 160+1 Step 6: Publish public key KU={7,187} Step 7: Keep secret private key KR={23,17,11} V. CONCLUSION RSA algorithm has been implemented and analysed. But the RSA also contains drawback like fake public key algorithm, complexity of key generation, security needs, speed is low. In future work we can use the longer encrypted key with symmetric cipher encryption algorithm key file. It is an excellent method to the symmetric key distribution problem. Copyright to IJIRSET DOI: 10.15680/IJIRSET.2015.0403089 1444

REFERENCES [1]. ManpreetKaur,Rajbir Singh Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing, International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013. [2]. Parsikalpana,Sudhasingaraju Data Security in Cloud Computing using RSA Algorithm International Journal of Research in Computer and Communication technology,ijrcct, ISSN 2278-5841, Vol 1, Issue 4, September 2012. [3]. Anjanachaudhary, ravinder Thakur, manishmann, A review: data security approach in cloud computing by using RSA algorithm, International Journal of Advance Research in Computer Science and Management Studies, volume 1,Issue 7, December 2013 [4]. SwapnilV.Khedkar, A.D.Gawande, Data Partitioning Technique to Improve CloudData Storage Security, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 3347-3350 [5]. Ms.ShubhraSaggar, Dr. R.K. Datta An improved RSA Encryption Algorithm for Cloud Computing Environments: Two key Generation Encryption (2KGEA) ISSN (Online): 2279-0071 Copyright to IJIRSET DOI: 10.15680/IJIRSET.2015.0403089 1445