SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
DOI : 10.5121/ijccsa.2015.5102 11
A CLOUD SECURITY APPROACH FOR DATA AT REST
USING FPE
Nilekh Chaudhari1
1
Cloud Research and Development, Syntel Ltd., Mumbai, India
ABSTRACT
In a cloud scenario, biggest concern is around security of the data. “Both data in transit and at rest must
be secure” is a primary goal of any organization. Data in transit can be made secure using TLS level
security like SSL certificates. But data at rest is not quite secure, as database servers in public cloud
domain are more prone to vulnerabilities. Not all cloud providers give out of box encryption with their
offerings. Also implementing traditional encryption techniques will cause lot of changes in application as
well as at database level. This paper provides efficient approach to encrypt data using Format Preserving
Encryption technique. FPE focuses mainly on encrypting data without changing format so that it’s easy to
develop and migrate legacy application to cloud. It is capable of performing format preserving encryption
on numeric, string and the combination of both. This literature states various features and advantages of
same.
KEYWORDS
Cloud Security, FPE, Encryption, Database, Feistal Ciphers
1. INTRODUCTION
Format preserving encryption provides vital solution for encryption problems in cloud scenario.
“Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a cipher
text of identical format — for example, encrypting a valid credit-card number into a valid credit
card number”.
Using FPE we can implement the partial encryption which will eventually help us in performing
effective searching operations over the set of encrypted credit card numbers.
2. FPE
2.1. WHAT IS FPE?
Encrypting Personally Identifiable Information (PII) in large databases has historically been
difficult, because encrypting information typically implies expanding data and changing its
format. Previous attempts to encrypt PII data like credit card numbers and Social Security
Numbers without changing their format have used questionable cryptographic constructions.
Format-Preserving Encryption (FPE) is a fundamentally new approach to encrypting structured
data, such as credit card or Social Security numbers. It uses a published encryption method with
an existing, proven algorithm to encrypt data in a way that does not alter the data format.
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
12
2.2. HOW FPE WORKS?
FPE solution is realised in Microsoft Azure using Type-1 Feistel network. Type-1 Feistel
networks use the round function to preserve format. The round function in practice can be build
using the block ciphers like AES.
For each round of Feistel network we provide output of AES encryption as a key to that round.
Iterating in similar fashion for nth
times, we can achieve the format preserving.
2.3. CHALLENGES FACED
Any numbers say 6 digits were encrypted using FPE and represented as an integer between 0 to
999999, which falls under the range from 219
to 220
. What if the final output exceeds this range?
There are chances that the output becomes 7 or 6 digit, as 220
= 1048576 which is too long for 6
digits. So the chance of getting such variance is: (220
– 106
) / 220
= 4.6%. Hence format
preservation is not 100% ensured using FPE. Here where we had to implement Cycle Walking
over FPE.
2.3. CYCLE WALKING
Through Cycle Walking, we can encipher the same value again if we do not get the output as
expected i.e. in a particular format. For Example, if we need to encrypt a cypher C in a particular
range (N) then:
Figure 1. Encryption Condition
Hence while decrypting; we will follow the same process to validate if the decrypted value is in
the expected format, if it is not then again decrypt the same. The cycle-walking technique is then
used to insure that the cipher text is in the appropriate range. Hence more accurate and more
secured.
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
13
Figure 2. Cycle Walking
The circle is the set of all valid output: say all numbers between 0 and N. The input i when
encrypted results in the number c1 which is greater than N and so we repeat. The result c2 =E (k,
C1) is still greater than N, so we repeat again. Finally, c 3 ≤N is valid and so we output this as the
encrypted value. This process is reversible. So, to decrypt with input (c3 ,k) , we just reverse the
procedure, decrypting at each step with D(k,⋅) and finally getting the Output i.
3. ALGORITHM
A scheme for format-preserving encryption (FPE) is a function E : K×N×T×X → X∪⊥{ } where
the sets K, N, T, and X are called the key space, format space, tweak space, and domain,
respectively. All of these sets are nonempty and ⊥∉ X. We write E
NT
K (X) = E (K, N, T, X) for
the encryption of X with respect to key K, format N, and tweak T.
3.1. ENCRYPTION ALGORITHM
3.1.1 Factorized modulus into ‘a’ and ‘b’ in such a way that they are as close together as
possible.
3.1.2 Copy plain text in X.
3.1.3 Iterate from 0 to rth
round as follows
for i = 1, . . . , r(N) do
Divide the input plain text in left ‘L’ and right ‘R’ part
L ← X / b
R ← X % b
Update the encrypted stream in previous round with the encrypted text in
current round.
W ← (L + FK(N, T, i, R)) % a
Generate the encrypted text by
X ← a * R + W
End For
3.1.4 Return encrypted text X.
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
14
3.2. DECRYPTION ALGORITHM
3.2.1 Factorized modulus into ‘a’ and ‘b’ in such a way that they are as close together as
possible.
3.2.2 Copy encrypted text in Y.
3.2.3 Iterate from rth
round to 0 as follows
for i = r(N), . . . , 1 do
Divide the input plain text in intermediate W and right ‘R’ part
W ← Y % a
R ← Y / a
Update the encrypted stream in previous round with the encrypted text in
current round.
L ← (W − FK(N, T, i, R)) % a
Decrypt the text by
Y ← b * L + R
End For
3.2.4 Return plain text Y.
4. CONSIDERATIONS
While designing and implementing the solution following aspects are considered:
4.1. IV (INITIALIZATION VECTOR)
An initialization vector (IV) is an arbitrary number that can be used along with a secret key for
data encryption (AES in our case). This number, also called a nonce, is employed only one time
in any session. We have used 128 bit IV along with the key that is used for AES encryption. We
used RNGCryptoServiceProvider to generate the random 128 bit IV.
4.2. KEY
Like IV we have generated the 256 bit key using the RNGCryptoServiceProvider. After
generating the key we have pushed it to the azure blobs then application retrieved it to actually
perform encryption or decryption.
5. IMPLEMENTATION
In an end to end solution the Key Generation Utility will first generated the random KEY and IV.
The IV will be directly used in code as private variable. By doing so it is made more secure for
scenarios like reverse engineering using reflection or introspection. The key will be pushed into
Azure blobs. Code will access this key from the blob using Shared Access Signature. Once the
key is accessed then we encrypt credit card numbers and store it in SQLAzure database. Similarly
the decryption is also performed.
The below High-Level Architecture diagram explains the same.
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
15
Figure 3. FPE Solution Architecture
6. ADVANTAGES
6.1 FPE allows storing data in same format and hence there is no need to change the structure
of database table.
6.2 Using FPE we can implement the partial encryption which will eventually help us in
performing effective searching operations over the set of encrypted credit card numbers.
6.3 Every number is encrypted into a unique value; hence it can be used as a primary key in
your database table.
7. CONCLUSIONS
Using FPE we can enable a simpler migration path when encryption is added to legacy systems
and databases, as required, for example, by the payment-card industry’s data security standard
(PCI DSS). Use of FPE enables upgrading database security in a way transparent to many
applications and minimally invasive to others. Also it helps in performing the search operations
over large set of encrypted credit card numbers.
ACKNOWLEDGEMENTS
I would like to thank my guide and mentor Yusuf Rangwala for his constant support. Also want
to extend my regards for my employer Syntel Ltd. for offering me an opportunity to research and
development on cloud computing.
International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015
16
REFERENCES
[1] Format-preserving_encryption. [Online] Available: http://en.wikipedia.org/wiki/Format-
preserving_encryption
[2] Format-preserving_encryption. [Online] Available:https://eprint.iacr.org/2009/251.pdf
[3] A Few Thoughts on Cryptographic Engineering: Format Preserving Encryption [Online] Available:
http://blog.cryptographyengineering.com/2011/11/format-preserving-encryption-or-how-to.html
[4] Botan - Format-preserving_encryption. [Online] Available:
http://botan.randombit.net/manual/fpe.html
[5] Feistal Cipher. [Online] Available:http://en.wikipedia.org/wiki/Feistel_cipher
[6] On Generalized Feistel Networks. [Online] Available: https://eprint.iacr.org/2010/301.pdf
AUTHORS
Nilekh Chaudhari studies B.E. (Computer Engineering) from Mumbai University, Mumbai, India. I have 3
years of experience in IT industry and research field. I was formerly member of Computer Society of India.
Currently working on Cloud Research and Development with Syntel Ltd. My major areaof focus is
Microsoft Azure cloud platform.

More Related Content

What's hot

RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable EncryptionNagendra Posani
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 

What's hot (19)

RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
C0281010016
C0281010016C0281010016
C0281010016
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 

Viewers also liked

Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Vasanth Ganesan
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners Suman Singh
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsVR Talsaniya
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptshibamughal
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (13)

Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Origins of cloud computing
Origins of cloud computingOrigins of cloud computing
Origins of cloud computing
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing Models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to A cloud security approach for data at rest

Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudIRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paperIOSR Journals
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On CryptographyHaley Johnson
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 

Similar to A cloud security approach for data at rest (20)

Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

A cloud security approach for data at rest

  • 1. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 DOI : 10.5121/ijccsa.2015.5102 11 A CLOUD SECURITY APPROACH FOR DATA AT REST USING FPE Nilekh Chaudhari1 1 Cloud Research and Development, Syntel Ltd., Mumbai, India ABSTRACT In a cloud scenario, biggest concern is around security of the data. “Both data in transit and at rest must be secure” is a primary goal of any organization. Data in transit can be made secure using TLS level security like SSL certificates. But data at rest is not quite secure, as database servers in public cloud domain are more prone to vulnerabilities. Not all cloud providers give out of box encryption with their offerings. Also implementing traditional encryption techniques will cause lot of changes in application as well as at database level. This paper provides efficient approach to encrypt data using Format Preserving Encryption technique. FPE focuses mainly on encrypting data without changing format so that it’s easy to develop and migrate legacy application to cloud. It is capable of performing format preserving encryption on numeric, string and the combination of both. This literature states various features and advantages of same. KEYWORDS Cloud Security, FPE, Encryption, Database, Feistal Ciphers 1. INTRODUCTION Format preserving encryption provides vital solution for encryption problems in cloud scenario. “Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a cipher text of identical format — for example, encrypting a valid credit-card number into a valid credit card number”. Using FPE we can implement the partial encryption which will eventually help us in performing effective searching operations over the set of encrypted credit card numbers. 2. FPE 2.1. WHAT IS FPE? Encrypting Personally Identifiable Information (PII) in large databases has historically been difficult, because encrypting information typically implies expanding data and changing its format. Previous attempts to encrypt PII data like credit card numbers and Social Security Numbers without changing their format have used questionable cryptographic constructions. Format-Preserving Encryption (FPE) is a fundamentally new approach to encrypting structured data, such as credit card or Social Security numbers. It uses a published encryption method with an existing, proven algorithm to encrypt data in a way that does not alter the data format.
  • 2. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 12 2.2. HOW FPE WORKS? FPE solution is realised in Microsoft Azure using Type-1 Feistel network. Type-1 Feistel networks use the round function to preserve format. The round function in practice can be build using the block ciphers like AES. For each round of Feistel network we provide output of AES encryption as a key to that round. Iterating in similar fashion for nth times, we can achieve the format preserving. 2.3. CHALLENGES FACED Any numbers say 6 digits were encrypted using FPE and represented as an integer between 0 to 999999, which falls under the range from 219 to 220 . What if the final output exceeds this range? There are chances that the output becomes 7 or 6 digit, as 220 = 1048576 which is too long for 6 digits. So the chance of getting such variance is: (220 – 106 ) / 220 = 4.6%. Hence format preservation is not 100% ensured using FPE. Here where we had to implement Cycle Walking over FPE. 2.3. CYCLE WALKING Through Cycle Walking, we can encipher the same value again if we do not get the output as expected i.e. in a particular format. For Example, if we need to encrypt a cypher C in a particular range (N) then: Figure 1. Encryption Condition Hence while decrypting; we will follow the same process to validate if the decrypted value is in the expected format, if it is not then again decrypt the same. The cycle-walking technique is then used to insure that the cipher text is in the appropriate range. Hence more accurate and more secured.
  • 3. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 13 Figure 2. Cycle Walking The circle is the set of all valid output: say all numbers between 0 and N. The input i when encrypted results in the number c1 which is greater than N and so we repeat. The result c2 =E (k, C1) is still greater than N, so we repeat again. Finally, c 3 ≤N is valid and so we output this as the encrypted value. This process is reversible. So, to decrypt with input (c3 ,k) , we just reverse the procedure, decrypting at each step with D(k,⋅) and finally getting the Output i. 3. ALGORITHM A scheme for format-preserving encryption (FPE) is a function E : K×N×T×X → X∪⊥{ } where the sets K, N, T, and X are called the key space, format space, tweak space, and domain, respectively. All of these sets are nonempty and ⊥∉ X. We write E NT K (X) = E (K, N, T, X) for the encryption of X with respect to key K, format N, and tweak T. 3.1. ENCRYPTION ALGORITHM 3.1.1 Factorized modulus into ‘a’ and ‘b’ in such a way that they are as close together as possible. 3.1.2 Copy plain text in X. 3.1.3 Iterate from 0 to rth round as follows for i = 1, . . . , r(N) do Divide the input plain text in left ‘L’ and right ‘R’ part L ← X / b R ← X % b Update the encrypted stream in previous round with the encrypted text in current round. W ← (L + FK(N, T, i, R)) % a Generate the encrypted text by X ← a * R + W End For 3.1.4 Return encrypted text X.
  • 4. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 14 3.2. DECRYPTION ALGORITHM 3.2.1 Factorized modulus into ‘a’ and ‘b’ in such a way that they are as close together as possible. 3.2.2 Copy encrypted text in Y. 3.2.3 Iterate from rth round to 0 as follows for i = r(N), . . . , 1 do Divide the input plain text in intermediate W and right ‘R’ part W ← Y % a R ← Y / a Update the encrypted stream in previous round with the encrypted text in current round. L ← (W − FK(N, T, i, R)) % a Decrypt the text by Y ← b * L + R End For 3.2.4 Return plain text Y. 4. CONSIDERATIONS While designing and implementing the solution following aspects are considered: 4.1. IV (INITIALIZATION VECTOR) An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption (AES in our case). This number, also called a nonce, is employed only one time in any session. We have used 128 bit IV along with the key that is used for AES encryption. We used RNGCryptoServiceProvider to generate the random 128 bit IV. 4.2. KEY Like IV we have generated the 256 bit key using the RNGCryptoServiceProvider. After generating the key we have pushed it to the azure blobs then application retrieved it to actually perform encryption or decryption. 5. IMPLEMENTATION In an end to end solution the Key Generation Utility will first generated the random KEY and IV. The IV will be directly used in code as private variable. By doing so it is made more secure for scenarios like reverse engineering using reflection or introspection. The key will be pushed into Azure blobs. Code will access this key from the blob using Shared Access Signature. Once the key is accessed then we encrypt credit card numbers and store it in SQLAzure database. Similarly the decryption is also performed. The below High-Level Architecture diagram explains the same.
  • 5. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 15 Figure 3. FPE Solution Architecture 6. ADVANTAGES 6.1 FPE allows storing data in same format and hence there is no need to change the structure of database table. 6.2 Using FPE we can implement the partial encryption which will eventually help us in performing effective searching operations over the set of encrypted credit card numbers. 6.3 Every number is encrypted into a unique value; hence it can be used as a primary key in your database table. 7. CONCLUSIONS Using FPE we can enable a simpler migration path when encryption is added to legacy systems and databases, as required, for example, by the payment-card industry’s data security standard (PCI DSS). Use of FPE enables upgrading database security in a way transparent to many applications and minimally invasive to others. Also it helps in performing the search operations over large set of encrypted credit card numbers. ACKNOWLEDGEMENTS I would like to thank my guide and mentor Yusuf Rangwala for his constant support. Also want to extend my regards for my employer Syntel Ltd. for offering me an opportunity to research and development on cloud computing.
  • 6. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 1, February 2015 16 REFERENCES [1] Format-preserving_encryption. [Online] Available: http://en.wikipedia.org/wiki/Format- preserving_encryption [2] Format-preserving_encryption. [Online] Available:https://eprint.iacr.org/2009/251.pdf [3] A Few Thoughts on Cryptographic Engineering: Format Preserving Encryption [Online] Available: http://blog.cryptographyengineering.com/2011/11/format-preserving-encryption-or-how-to.html [4] Botan - Format-preserving_encryption. [Online] Available: http://botan.randombit.net/manual/fpe.html [5] Feistal Cipher. [Online] Available:http://en.wikipedia.org/wiki/Feistel_cipher [6] On Generalized Feistel Networks. [Online] Available: https://eprint.iacr.org/2010/301.pdf AUTHORS Nilekh Chaudhari studies B.E. (Computer Engineering) from Mumbai University, Mumbai, India. I have 3 years of experience in IT industry and research field. I was formerly member of Computer Society of India. Currently working on Cloud Research and Development with Syntel Ltd. My major areaof focus is Microsoft Azure cloud platform.