SlideShare a Scribd company logo
1 of 4
Download to read offline
Cloud Computing and A New Approach in Data
Encryption Technique
Rahman, Mahmuda
13-22990-1,B
mahmuda.anika@gmail.com
American International University-Bangladesh
Abstract. Cloud computing is a very growing eld in this passing year.
We can discuss about how to secure the data. We can discuss about the
algorithm and how the algorithm is working. Then we propose some new
technique to secure the data in cloud. There is no 100 percent secure
system. So we want to discuss in this paper how to make the system
much better and more essential. The goal of this paper is to secure the
data system in cloud computing.
Keywords: Cloud computing, encryption algorithms, Multiple encryptions, Data
storage method, Biometric security
1 Introduction
Security system in cloud for storing data is not safe enough[9]. When data is
valuable specially in the cloud computing, it's security considered to be the key
requirement. Also it is get more important when it is hard to make it safe. It
becomes hard to keep data safe due to lack of strong data encryption system
[8]. Cloud possesses the security problem [4] in Data segregation, Data theft,
unauthorized access, Uncleared Owner and responsibility of Data Protection,
Data Loss conditions. Discussing some encryption algorithm we want to propose
some extra function to add the algorithm and make them better.
2 Related Work
Nelson et.al [2] want to develop new mechanisms that provide the required se-
curity level by isolating virtual machines and the associated resources. Among
other requirements, such solutions should employ virtual machine identication,
provide an adequate separation of dedicated resources combined with a constant
observation of shared ones, and examine any attempt of exploiting cross-VM
and data leakage.
A shared authority based privacy preserving protocol [1] which enables shared
access authority to cloud users by using anonymous access request matching
mechanism. Attribute based access control is used which enables user to access
2
only its own data elds. Proxy re-encryption scheme is used by cloud server to
facilitate data sharing between multiple users.
Randeep Kaur[5] Discuss in his paper some algorithm to encryption the data.
Using this technique we can make the cloud storage system is more essential.
Data Redundancy is one of the major problem that the cloud computing is
facing. It is known that many storage nodes are lled with the replication of data
in cloud computing, more and more data intensive applications are developed
in this computing environment. The data-intensive applications devote most of
their execution time in disk Input and output for processing a large volume of
data [6]. So the Complexity of Time and Space are important to improve the
performance of the Cloud storage.
Cloud service providers should fortify both application and network level
security in order to protect the privacy of the users and the intellectual property
of them as these services collect and compile an increasing amount of sensitive
information [3]. By this way, the service providers may increase security and
privacy perceptions of the users.
3 Methodology
Now a days there are many security (encryption) algorithms which are suc-
cessfully implement in data storages. There are 2 types are algorithm one is
symmetric algorithm another is asymmetric. There is some algorithm like DES,
RC5, AES, 3DES as symmetric algorithm. And as asymmetric, RSA, DES, EI
Gamal. The main deference between symmetric and asymmetric is symmetric
use one key which is use to encrypt and decrypt the data. But asymmetric al-
gorithm use two key one is for encrypt and another is for decrypt the data. We
are discuses abut only 2 algorithm one is from symmetric (AES)[5] one is from
asymmetric(RSA)[3].
AES:
AES (Advanced Encryption Standard) is used for prevent Brute force attack.
S algorithm performs a number Nr of cryptographic rounds depending on the
actual key length. It has variable key length of 128, 192, or 256 bits[3]. It is a
byte substitution. Each round consists of four byte-oriented cryptographic trans-
formations. There are for type of Bite Shifting. There are SubBytes, ShiftRows,
MixColumns, AddRoundKey. After shifting the byte Round key addition to the
state array[7]. The pseudo code is,
Cipher(byte[] input, byte[] output)
{
byte[4,4] State;
copy input[] into State[] AddRoundKey
for (round = 1; round  Nr-1; ++round)
{
SubBytes, ShiftRows, MixColumns, AddRoundKey
}
3
SubBytes ShiftRows AddRoundKey
opy State[] to output[]
}
RSA:
Key Generation Algorithm. Which is mainly use for Internet encryption and au-
thentication system. It is developed in 1977 by Ron Rivest[5], Adi Shamir, and
Leonard Adleman. The RSA algorithm is the most commonly used encryption.
Till now it is the only algorithm used for private and public key generation and
encryption. It is a fast encryption. There are four step in the algorithm.
1. Choose two very large random prime integers:
p and q
2. Compute n and φ(n):
n = pq and φ(n) = (p-1)(q-1)
3. Choose an integer e,1  e  φ(n) such that:
gcd(e, φ(n)) = 1(where gcd means greatest common denominator)
4. Compute d, 1  d  φ(n) such that:
ed = 1 (mod φ(n))
Where are,
 The public key is (n, e) and the private key is (n, d)
 The values of p, q and φ(n) are private
 e is the public or encryption exponent
 d is the private or decryption exponent
Encryption : The cyphertext C is found by the equation 'C = Me mod n'
where M is the original message.
Decryption : The message M can be found form the cyphertext C by the
equation 'M = Cd mod n'.
4 Further Research and Proposal
Now we have three new types of propose in encryption technique.
Multiple encryptions: Where we can use two type of encryption. We can use
one technique to encrypt the data. And again encrypt the key which is generated
in that algorithm. This is a good way to encrypt. This is time cost now to hack
the data in cloud.
Data storage method: This is method we propose another technique. We can
segment the data at least 3 part. Then we can generate 3 key is link the 3 part
when we decrypted the data. If hacker hack one of the data they never hack the
other 2 part. On the other hand if one le is hacked, user can know about it and
he can do something better to secure his data.
Biometric security: In this system we can generate the key using his biometric
system. We can use eye scan to secure his data. But only one user’s eye can
open the data. Using it is very good process and more secure.
4
5 CONCLUSION
We can discuss about secure the data in cloud computing. Now a days cloud
computing is one of the growing eld. We can use cloud everywhere. It can
change the world. And give a new path in computer science and business eld.
I suggest some system by which we can secure our data and give them more
security. We do not implement the system. I just propose it to secure our data
in cloud. If we can implement it we can secure our data.
References
1. Ibrahim Arpaci, Kerem Kilicer, and Salih Bardakci. Eects of security and privacy
concerns on educational use of cloud services. Computers in Human Behavior,
45(0):9398, 2015.
2. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Car-
valho, Mats Näslund, and Makan Pourzandi. A quantitative analysis of current
security concerns and solutions for cloud computing. Journal of Cloud Computing:
Advances, Systems and Applications, 1(1):11, 2012.
3. Randeep Kaur and Supriya Kinger. Analysis of Security Algorithms in Cloud Com-
puting. 3(3):171176, 2014.
4. Okal Christopher Otieno. Cloud-Aware Web Service Security. 13(8):120124, 2015.
5. Ms Soumya N S and R Prabha. Cloud Computing : Data Security Using RSA.
IV(X):5759, 2015.
6. Diaa Salama, Abdul Elminaam, Hatem M Abdul Kader, and Mohie M Hadhoud.
Performance Evaluation of Symmetric Encryption Algorithms on Power Consump-
tion for Wireless Devices. International Journal, 1(4):343351, 2009.
7. Gurpreet Singh and Supriya Kinger. Integrating AES, DES, and 3-DES Encryption
Algorithms for Enhanced Data Security. 4(7):20582062, 2013.
8. Information Technology and Ogun State. A Privacy Preserving Access Control
Model for Personal Health Record System. pages 49, 2015.
9. Manoj S Tore and S K Sonkar. A CLOUD STORAGE SYSTEM FOR SHARING
DATA SECURELY WITH PRIVACY PRESERVATION AND FRAUD DETEC-
TION. pages 23192322, 2015.

More Related Content

What's hot

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption SystemsChristopher Frenz
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 

What's hot (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
C017421624
C017421624C017421624
C017421624
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
Report dna
Report dnaReport dna
Report dna
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
262 265
262 265262 265
262 265
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 

Similar to Cloud computing and a new approach in data encryption technique

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 

Similar to Cloud computing and a new approach in data encryption technique (20)

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 

More from Mahmuda Rahman

Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its ComponentsMahmuda Rahman
 
Desktop-operating-system
Desktop-operating-systemDesktop-operating-system
Desktop-operating-systemMahmuda Rahman
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
A New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesA New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesMahmuda Rahman
 

More from Mahmuda Rahman (6)

Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
eng 2
eng 2eng 2
eng 2
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 
Desktop-operating-system
Desktop-operating-systemDesktop-operating-system
Desktop-operating-system
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
A New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing ServicesA New Mode to Ensure Security in Cloud Computing Services
A New Mode to Ensure Security in Cloud Computing Services
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cloud computing and a new approach in data encryption technique

  • 1. Cloud Computing and A New Approach in Data Encryption Technique Rahman, Mahmuda 13-22990-1,B mahmuda.anika@gmail.com American International University-Bangladesh Abstract. Cloud computing is a very growing eld in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing. Keywords: Cloud computing, encryption algorithms, Multiple encryptions, Data storage method, Biometric security 1 Introduction Security system in cloud for storing data is not safe enough[9]. When data is valuable specially in the cloud computing, it's security considered to be the key requirement. Also it is get more important when it is hard to make it safe. It becomes hard to keep data safe due to lack of strong data encryption system [8]. Cloud possesses the security problem [4] in Data segregation, Data theft, unauthorized access, Uncleared Owner and responsibility of Data Protection, Data Loss conditions. Discussing some encryption algorithm we want to propose some extra function to add the algorithm and make them better. 2 Related Work Nelson et.al [2] want to develop new mechanisms that provide the required se- curity level by isolating virtual machines and the associated resources. Among other requirements, such solutions should employ virtual machine identication, provide an adequate separation of dedicated resources combined with a constant observation of shared ones, and examine any attempt of exploiting cross-VM and data leakage. A shared authority based privacy preserving protocol [1] which enables shared access authority to cloud users by using anonymous access request matching mechanism. Attribute based access control is used which enables user to access
  • 2. 2 only its own data elds. Proxy re-encryption scheme is used by cloud server to facilitate data sharing between multiple users. Randeep Kaur[5] Discuss in his paper some algorithm to encryption the data. Using this technique we can make the cloud storage system is more essential. Data Redundancy is one of the major problem that the cloud computing is facing. It is known that many storage nodes are lled with the replication of data in cloud computing, more and more data intensive applications are developed in this computing environment. The data-intensive applications devote most of their execution time in disk Input and output for processing a large volume of data [6]. So the Complexity of Time and Space are important to improve the performance of the Cloud storage. Cloud service providers should fortify both application and network level security in order to protect the privacy of the users and the intellectual property of them as these services collect and compile an increasing amount of sensitive information [3]. By this way, the service providers may increase security and privacy perceptions of the users. 3 Methodology Now a days there are many security (encryption) algorithms which are suc- cessfully implement in data storages. There are 2 types are algorithm one is symmetric algorithm another is asymmetric. There is some algorithm like DES, RC5, AES, 3DES as symmetric algorithm. And as asymmetric, RSA, DES, EI Gamal. The main deference between symmetric and asymmetric is symmetric use one key which is use to encrypt and decrypt the data. But asymmetric al- gorithm use two key one is for encrypt and another is for decrypt the data. We are discuses abut only 2 algorithm one is from symmetric (AES)[5] one is from asymmetric(RSA)[3]. AES: AES (Advanced Encryption Standard) is used for prevent Brute force attack. S algorithm performs a number Nr of cryptographic rounds depending on the actual key length. It has variable key length of 128, 192, or 256 bits[3]. It is a byte substitution. Each round consists of four byte-oriented cryptographic trans- formations. There are for type of Bite Shifting. There are SubBytes, ShiftRows, MixColumns, AddRoundKey. After shifting the byte Round key addition to the state array[7]. The pseudo code is, Cipher(byte[] input, byte[] output) { byte[4,4] State; copy input[] into State[] AddRoundKey for (round = 1; round Nr-1; ++round) { SubBytes, ShiftRows, MixColumns, AddRoundKey }
  • 3. 3 SubBytes ShiftRows AddRoundKey opy State[] to output[] } RSA: Key Generation Algorithm. Which is mainly use for Internet encryption and au- thentication system. It is developed in 1977 by Ron Rivest[5], Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption. Till now it is the only algorithm used for private and public key generation and encryption. It is a fast encryption. There are four step in the algorithm. 1. Choose two very large random prime integers: p and q 2. Compute n and φ(n): n = pq and φ(n) = (p-1)(q-1) 3. Choose an integer e,1 e φ(n) such that: gcd(e, φ(n)) = 1(where gcd means greatest common denominator) 4. Compute d, 1 d φ(n) such that: ed = 1 (mod φ(n)) Where are, The public key is (n, e) and the private key is (n, d) The values of p, q and φ(n) are private e is the public or encryption exponent d is the private or decryption exponent Encryption : The cyphertext C is found by the equation 'C = Me mod n' where M is the original message. Decryption : The message M can be found form the cyphertext C by the equation 'M = Cd mod n'. 4 Further Research and Proposal Now we have three new types of propose in encryption technique. Multiple encryptions: Where we can use two type of encryption. We can use one technique to encrypt the data. And again encrypt the key which is generated in that algorithm. This is a good way to encrypt. This is time cost now to hack the data in cloud. Data storage method: This is method we propose another technique. We can segment the data at least 3 part. Then we can generate 3 key is link the 3 part when we decrypted the data. If hacker hack one of the data they never hack the other 2 part. On the other hand if one le is hacked, user can know about it and he can do something better to secure his data. Biometric security: In this system we can generate the key using his biometric system. We can use eye scan to secure his data. But only one user’s eye can open the data. Using it is very good process and more secure.
  • 4. 4 5 CONCLUSION We can discuss about secure the data in cloud computing. Now a days cloud computing is one of the growing eld. We can use cloud everywhere. It can change the world. And give a new path in computer science and business eld. I suggest some system by which we can secure our data and give them more security. We do not implement the system. I just propose it to secure our data in cloud. If we can implement it we can secure our data. References 1. Ibrahim Arpaci, Kerem Kilicer, and Salih Bardakci. Eects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45(0):9398, 2015. 2. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Car- valho, Mats Näslund, and Makan Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1):11, 2012. 3. Randeep Kaur and Supriya Kinger. Analysis of Security Algorithms in Cloud Com- puting. 3(3):171176, 2014. 4. Okal Christopher Otieno. Cloud-Aware Web Service Security. 13(8):120124, 2015. 5. Ms Soumya N S and R Prabha. Cloud Computing : Data Security Using RSA. IV(X):5759, 2015. 6. Diaa Salama, Abdul Elminaam, Hatem M Abdul Kader, and Mohie M Hadhoud. Performance Evaluation of Symmetric Encryption Algorithms on Power Consump- tion for Wireless Devices. International Journal, 1(4):343351, 2009. 7. Gurpreet Singh and Supriya Kinger. Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security. 4(7):20582062, 2013. 8. Information Technology and Ogun State. A Privacy Preserving Access Control Model for Personal Health Record System. pages 49, 2015. 9. Manoj S Tore and S K Sonkar. A CLOUD STORAGE SYSTEM FOR SHARING DATA SECURELY WITH PRIVACY PRESERVATION AND FRAUD DETEC- TION. pages 23192322, 2015.