Cloud computing is a very growing field in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Cloud computing and a new approach in data encryption technique
1. Cloud Computing and A New Approach in Data
Encryption Technique
Rahman, Mahmuda
13-22990-1,B
mahmuda.anika@gmail.com
American International University-Bangladesh
Abstract. Cloud computing is a very growing eld in this passing year.
We can discuss about how to secure the data. We can discuss about the
algorithm and how the algorithm is working. Then we propose some new
technique to secure the data in cloud. There is no 100 percent secure
system. So we want to discuss in this paper how to make the system
much better and more essential. The goal of this paper is to secure the
data system in cloud computing.
Keywords: Cloud computing, encryption algorithms, Multiple encryptions, Data
storage method, Biometric security
1 Introduction
Security system in cloud for storing data is not safe enough[9]. When data is
valuable specially in the cloud computing, it's security considered to be the key
requirement. Also it is get more important when it is hard to make it safe. It
becomes hard to keep data safe due to lack of strong data encryption system
[8]. Cloud possesses the security problem [4] in Data segregation, Data theft,
unauthorized access, Uncleared Owner and responsibility of Data Protection,
Data Loss conditions. Discussing some encryption algorithm we want to propose
some extra function to add the algorithm and make them better.
2 Related Work
Nelson et.al [2] want to develop new mechanisms that provide the required se-
curity level by isolating virtual machines and the associated resources. Among
other requirements, such solutions should employ virtual machine identication,
provide an adequate separation of dedicated resources combined with a constant
observation of shared ones, and examine any attempt of exploiting cross-VM
and data leakage.
A shared authority based privacy preserving protocol [1] which enables shared
access authority to cloud users by using anonymous access request matching
mechanism. Attribute based access control is used which enables user to access
2. 2
only its own data elds. Proxy re-encryption scheme is used by cloud server to
facilitate data sharing between multiple users.
Randeep Kaur[5] Discuss in his paper some algorithm to encryption the data.
Using this technique we can make the cloud storage system is more essential.
Data Redundancy is one of the major problem that the cloud computing is
facing. It is known that many storage nodes are lled with the replication of data
in cloud computing, more and more data intensive applications are developed
in this computing environment. The data-intensive applications devote most of
their execution time in disk Input and output for processing a large volume of
data [6]. So the Complexity of Time and Space are important to improve the
performance of the Cloud storage.
Cloud service providers should fortify both application and network level
security in order to protect the privacy of the users and the intellectual property
of them as these services collect and compile an increasing amount of sensitive
information [3]. By this way, the service providers may increase security and
privacy perceptions of the users.
3 Methodology
Now a days there are many security (encryption) algorithms which are suc-
cessfully implement in data storages. There are 2 types are algorithm one is
symmetric algorithm another is asymmetric. There is some algorithm like DES,
RC5, AES, 3DES as symmetric algorithm. And as asymmetric, RSA, DES, EI
Gamal. The main deference between symmetric and asymmetric is symmetric
use one key which is use to encrypt and decrypt the data. But asymmetric al-
gorithm use two key one is for encrypt and another is for decrypt the data. We
are discuses abut only 2 algorithm one is from symmetric (AES)[5] one is from
asymmetric(RSA)[3].
AES:
AES (Advanced Encryption Standard) is used for prevent Brute force attack.
S algorithm performs a number Nr of cryptographic rounds depending on the
actual key length. It has variable key length of 128, 192, or 256 bits[3]. It is a
byte substitution. Each round consists of four byte-oriented cryptographic trans-
formations. There are for type of Bite Shifting. There are SubBytes, ShiftRows,
MixColumns, AddRoundKey. After shifting the byte Round key addition to the
state array[7]. The pseudo code is,
Cipher(byte[] input, byte[] output)
{
byte[4,4] State;
copy input[] into State[] AddRoundKey
for (round = 1; round Nr-1; ++round)
{
SubBytes, ShiftRows, MixColumns, AddRoundKey
}
3. 3
SubBytes ShiftRows AddRoundKey
opy State[] to output[]
}
RSA:
Key Generation Algorithm. Which is mainly use for Internet encryption and au-
thentication system. It is developed in 1977 by Ron Rivest[5], Adi Shamir, and
Leonard Adleman. The RSA algorithm is the most commonly used encryption.
Till now it is the only algorithm used for private and public key generation and
encryption. It is a fast encryption. There are four step in the algorithm.
1. Choose two very large random prime integers:
p and q
2. Compute n and φ(n):
n = pq and φ(n) = (p-1)(q-1)
3. Choose an integer e,1 e φ(n) such that:
gcd(e, φ(n)) = 1(where gcd means greatest common denominator)
4. Compute d, 1 d φ(n) such that:
ed = 1 (mod φ(n))
Where are,
The public key is (n, e) and the private key is (n, d)
The values of p, q and φ(n) are private
e is the public or encryption exponent
d is the private or decryption exponent
Encryption : The cyphertext C is found by the equation 'C = Me mod n'
where M is the original message.
Decryption : The message M can be found form the cyphertext C by the
equation 'M = Cd mod n'.
4 Further Research and Proposal
Now we have three new types of propose in encryption technique.
Multiple encryptions: Where we can use two type of encryption. We can use
one technique to encrypt the data. And again encrypt the key which is generated
in that algorithm. This is a good way to encrypt. This is time cost now to hack
the data in cloud.
Data storage method: This is method we propose another technique. We can
segment the data at least 3 part. Then we can generate 3 key is link the 3 part
when we decrypted the data. If hacker hack one of the data they never hack the
other 2 part. On the other hand if one le is hacked, user can know about it and
he can do something better to secure his data.
Biometric security: In this system we can generate the key using his biometric
system. We can use eye scan to secure his data. But only one user’s eye can
open the data. Using it is very good process and more secure.
4. 4
5 CONCLUSION
We can discuss about secure the data in cloud computing. Now a days cloud
computing is one of the growing eld. We can use cloud everywhere. It can
change the world. And give a new path in computer science and business eld.
I suggest some system by which we can secure our data and give them more
security. We do not implement the system. I just propose it to secure our data
in cloud. If we can implement it we can secure our data.
References
1. Ibrahim Arpaci, Kerem Kilicer, and Salih Bardakci. Eects of security and privacy
concerns on educational use of cloud services. Computers in Human Behavior,
45(0):9398, 2015.
2. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Car-
valho, Mats Näslund, and Makan Pourzandi. A quantitative analysis of current
security concerns and solutions for cloud computing. Journal of Cloud Computing:
Advances, Systems and Applications, 1(1):11, 2012.
3. Randeep Kaur and Supriya Kinger. Analysis of Security Algorithms in Cloud Com-
puting. 3(3):171176, 2014.
4. Okal Christopher Otieno. Cloud-Aware Web Service Security. 13(8):120124, 2015.
5. Ms Soumya N S and R Prabha. Cloud Computing : Data Security Using RSA.
IV(X):5759, 2015.
6. Diaa Salama, Abdul Elminaam, Hatem M Abdul Kader, and Mohie M Hadhoud.
Performance Evaluation of Symmetric Encryption Algorithms on Power Consump-
tion for Wireless Devices. International Journal, 1(4):343351, 2009.
7. Gurpreet Singh and Supriya Kinger. Integrating AES, DES, and 3-DES Encryption
Algorithms for Enhanced Data Security. 4(7):20582062, 2013.
8. Information Technology and Ogun State. A Privacy Preserving Access Control
Model for Personal Health Record System. pages 49, 2015.
9. Manoj S Tore and S K Sonkar. A CLOUD STORAGE SYSTEM FOR SHARING
DATA SECURELY WITH PRIVACY PRESERVATION AND FRAUD DETEC-
TION. pages 23192322, 2015.