SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 936
Ensuring Security in Cloud Computing Cryptography using
Cryptography
Dr. Amit Singhal¹, Rishabh Agarwal2, Shivi Shandilya3, Amandeep4
1,2,3,4 BBDIT, Ghaziabad, India
------------------------------------------------------------------------***-------------------------------------------------------------------
Abstract: Cloud computing is an Internet-based computing
model which provides several resources throughCloudService
Providers (CSP) to Cloud Users (CU) on demand basis without
buying the underlying infrastructure and follows pay-per-use
basis. It supports virtualization of physical resources in order
to improve efficiency and accomplishment of multiple tasksat
the same time. Cloud Computing Environment (CCE) provides
several deployment models to represent several categories of
cloud owned by organization or institutes. However, CCE
provide resources to Cloud Users through several services like
PaaS, SaaS, IaaS. Cloud Computing is a notion based on the
concept of summing up physical resources and displaying
them as an unacknowledged resource. It is a model for
producing resources, for sorting out applications, and for
manifesto-independent user access to services.Cloudcancome
in different types, and the services and the applications that
possibly run on clouds may or may not be provided by a cloud
service provider. There are two unique group of models
namely deployment models and service models.Servicemodels
consists of IaaS , SaaS, PaaS . The Deployment or deployment
model consists of Public Cloud, Private Cloud, Hybrid Cloud,
Community Cloud .Cloud Computing has lots of distinct
properties that make it very important. privacy seemstobean
unique concern in cloud .Various types of service modelsunder
cloud computing facilitate various levels of privacy services.
We will get the minimum security in IaaS (Infastructure as a
Service) and most with a SaaS provider. In this paper, we will
focus upon the reviewing and understanding cloud security
issues by proposing crypto algorithms and effective measures
so as to ensure the data security in cloud. Along with this, we
will elucidate a bit more about some security aspects of
cryptography by showcasing some privacy issues of current
cloud computing surroundings.
Keywords: Cloud Computing, Cryptography, Security
Issues Privacy, Security Algorithms, Encryption,
Decryption.
1. INTRODUCTION
Cloud computing is one of the popular topics of the current
world. Internet has started driving all these new
technologies. Internet was designed firstly to be strong, but
not completely safe. Distributed applications like these is
much prone to attacks. Cloud Computing has all the
feebleness associated with these internet utilization andthe
extra threats arise from the combined, Virtualized and
redistributed resources. There are many data privacy
concerns in cloud computing. Incorrect revelation of a data
used in businesses in cloud to third parties is one of the
major issues that has been found. [4]Encryption should be
properly used and the crypto algorithms include AES, RSA,
DES and 3 DES .In this paper, we describe about usingcrypto
algorithmsso asto increase security concern. CloudSecurity
can be ensured by data integrity, Secured data transfer and
by Cryptography. There are varieties of cryptographic
algorithms which can be implemented so as to ensure
security in the cloud. The two types of algorithms are
Symmetric and Asymmetric encryption key algorithms.
Symmetric contains algorithms like DES, AES, 3 DES and
Blowfish algorithm. Asymmetric contains algorithms like
RSA, Diffie- Hellman Key Exchange. Symmetric key and
asymmetric key algorithms is used to encrypt and decrypt
the data in cloud.
2. RELATED WORK
a. In the paper [1] the authors deal with the problem of
security of data during data transmission. The main
thing to fear about this paper is the encryptionofdataso
that confidentiality and privacy can be easily achieved.
The algorithm used here is Rijndael Encryption
Algorithm along with EAP-CHAP.
b. This paper[2] presents a protocol or set of
instructions that uses the services of a third party
auditor or checker not only to verify and authenticate
the integrity of data stored at remote servers but also in
retrieving and getting the data back as soon as possible
in intact form. The main advantage of this scheme is the
use of digital signature to assure the integrity of local
data. However, the overall process is quite problematic
and complex asthe keys and data are alsoencryptedand
decrypted respectively.
3. CRYPTOGRAPHY: SECURITY PRINCIPLES AND
ALGORITHMS
Cryptography can help dawning integration of Cloud
Computing by increased number of privacy related
companies. The primary level of privacy where
cryptography can help Cloud computing is safe and secure
storage. Cryptography is the science of storing messages
securely by converting the raw data into formswhich isnot
readable [7]. In today’s world, Research Article Volume 7
Issue No.5 International Journal of EngineeringScienceand
Computing, May 2017 11819 http://ijesc.org/
cryptography is considered as a collection of three
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 937
algorithms. These algorithms are Symmetric-key
algorithms, Asymmetrickey algorithms and Hashing [6]. In
Cloud computing, the main problemsarerelatedtoproblem
in data security, backup data, network traffic, file storage
system, and security of host, and cryptography alone can
solve these issues to extents. For a safe and secure
communication between the guest domain and the host
domain, or from hosts to management systems, encryption
technologies, such as Secure HTTP, encrypted VPNs, TLS,
Secure Shell, and so on should be used. Encryptionwillhelp
us prevent such exploits like man-in-themiddle, spoofed
attacks, and session hijacking. Cloud computing provides
clients with a computing facilities or infrastructure on top
of which they can store data and run applications.Whilethe
advantages of cloud computing are pretty clear, it
introduces new security challenges as cloud operators are
supposed to manipulate data for clientswithoutnecessarily
being fully trusted. We will be trying to design
cryptographic primitives and protocols which are tailored
to the setting of cloud computing, attempting to strike a
balance between security, efficiency and functionality.
Cloud data storage enhances the risk of leakage of data and
does not give access to unauthorized users. Cloud data
management cannot be fully trusted by data owners. Cloud
data process and computation could expose the privacy of
users, owning the data or related entities to parities which
does not have unauthorized access. For overcoming the
above problems, cryptography has been widely applied to
ensure data security, privacy and trust in cloud computing.
3.1 Symmetric key algorithms
Symmetric uses single key, which worksfor bothencryption
and decryption. The symmetric systems provide a two
channel system to their users. It ensures authentication and
authorization. Symmetric-key algorithms are those
algorithms which uses only one and only key for both. The
key is kept as secret. Symmetric algorithms have the
advantage of not taking in too much of computation power
and it works with very high speed in encryption. Symmetric-
key algorithms are divided into two types: Block cipher and
Stream cipher. In bock cipher input is taken as a block of
plaintext of fixed size depending on the type of symmetric
encryption algorithm, key of fixed size is applied on to block
of plain text and then the output block of the same sizeasthe
block of plaintext is obtained. In Case of stream cipher one
bit is encrypted at a particular time. Some popular
Symmetric-key algorithmsusedincloudcomputingincludes:
Data Encryption Standard (DES), TripleDES, and Advanced
Encryption Standard (AES).
Figure 1
A. Advanced Encryption Standard (AES)
In cryptography, the Advanced Encryption Standard [3] is
type of symmetric-key encryption algorithm . Each of the
ciphers has a 128-bit block size and having key sizes of 128,
192 and 256 bits, respectively. AES algorithm assures that
the hash code is encrypted in a secure manner. AES has a
block size of 128 bits . Its algorithm is as follows: Key
Expansion, Initial Round - Round Keys are added. Rounds,
Sub Bytes—a non-uniform substitutionstepwhereeachbyte
is substituted with another according to a table. Rows are
shifted—a transposition step where each row of the state is
shifted cyclically a certain number of steps. Columns are
mixed—a mixing operation which operates on the columns
of the state, combining the four bytes in each column 8. Add
Round Key— each byte of that particular state is combined
with the round key; each round key is derivedfromthegiven
cipher key using a key schedule. Final Round,SubBytes,Shift
Rows, Add Round Key. The DES algorithm wasfinallybroken
in 1998 using a system that costs about $250,000.TripleDES
turned out to be too slow for efficiency as the DES algorithm
was developed for mid-1970’s hardware and did not
produce efficient and effective software code. TripleDEShas
three times as many rounds as DES and is correspondingly
slower
Figure 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 938
B. Data Encryption Standard (DES)
The Data Encryption Standard (DES) is a block cipher and
comesunder symmetric key cryptography. found in January
1977 by the National Institute of Standardsand Technology,
named as NIST. At the encryption site, DES simply takes a
64-bit plaintext and creates a 64-bit cipher text, at the
decryption process, it takesa 64-bit cipher text andcreatesa
64-bit plaintext, and same 56 bit cipher key is used for both
encryption and decryption. The encryption process is made
using two permutations (P-boxes), which we call initial and
final permutation, and sixteen Fiestel rounds. Each round
uses a different sort of 48-bit round key which is generated
from the cipher key according to a predefined algorithm.
Figure 3
C. Blowfish Algorithm
Blowfish also comes under symmetric block cipher that can
be used as a substitute for DES. It takesa variable-lengthkey,
starting from from 32 bitsto 448 bits, makingitconsiderably
better for both domestic and exportable use. Blowfish was
designed in 1993 by Bruce Schneier as a free, fast substiute
to existing encryption algorithms. Since then it has been
verified considerably, and it is gradually gaining popularity
as a strong encryption algorithm.
3.2 Asymmetric Key Algorithms
It is relatively a new concept unlike symmetric
cryptosystem. Different keys are used for encryption and
decryption. This is a property which set this scheme
different than symmetric encryption scheme. Each receiver
possesses a decryption key of its own, generally referred to
as his private key. Receiver needs to generate an encryption
key, referred to as his public key. Generally, this type of
cryptosystem involves trusted third party which officially
declares that a particular public key belongs to a specific
person or entity only.
Figure 4
a) RSA Cryptosystem
This cryptosystem is one the initial systems and oldest of
asymmetric cryptosystem. It remains most employed and
used cryptosystem even now. The system was invented by
three scholars named Ron Rivest, Adi Shamir, and Len
International Journal of Engineering ScienceandComputing,
May 2017 11820 http://ijesc.org/ Adleman and hence, it is
termed as RSA cryptosystem. This algorithm is used for
public-key cryptography and not private key crptofra. It is
the first and still most commonly used asymmetric
algorithm. It involves two keys namely a public key and a
private key. The public key is used for encrypting messages
and is known to everyone. Messages encrypted with the use
of public key can be decrypted only by using the private key.
In this verification process, the serverimplementspublickey
authentication by signing a unique message with its private
key, which is called asdigital signature. The signatureisthen
returned to the client. Then it verifies using the server’s
known public key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 939
Figure 5
b) Diffie-Hellman Key Exchange
Whitfield Diffie and Martin Hellman introduced a key
exchange protocol with the help of the discrete logarithm
problem in 1976. In this key exchange protocol sender and
receiver will manage to set up a secret key to their
symmetric key system, using an unsafe channel. To set up a
key Alice chooses a random integer aE[1; n] computes ga,
similarly Bob computes gb for random bE[1; n] and sends it
to Alice. The secret key is gab, which Alice computes by
computing (gb)a and Bob by computing(ga)b.Theimportant
concepts on which the security of the Diffie-Hellman
Protocols defend upon DDH, DHP, DLP like etc
Figure 6
3.3 Hashing Algorithms
a. MD5- (Message-Digest algorithm 5)
A widely used hash function algorithm in cryptographywith
a 128-bit hash value and possesses a variable length
message into a fixed-length outputof 128bits.Firsttheinput
message is divides up into lump of 512- bit blocks then the
message is padded so that itstotal length is divisible by 512.
The sender of the data uses the public key to encrypt the
message and the receiver uses its private key to decrypt the
message.
Figure 7
4. SECURITY PROBLEMS FACED BY CLOUD
COMPUTING
When it comes to privacy and security, cloud is greatly
affected by the threat of that. The people such asthevendors
must make sure that the people using cloud does not face
any problem such as data loss or theft of data. There is a
chance where a malicious user or hacker can get into the
cloud by impersonating a legitimate user, there by affecting
the entire cloud thus affecting many people who are using
the infected or affected cloud. Some of the problem which is
faced by the Cloud computing are:
i. Data theft
ii. Integrity of data
iii. Privacy problems
iv. Loss of data
v. Infected Applications
vi. Exact location of data
vii. Vendor level Security
viii.User level Security
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 940
The current generation of cloud computingfacilitiesdoesnot
provide any privacy against untrusted cloud operators and
hence they are not supposed to store important information
such as medical records, financial records or high impact
business data. To address this we are pursuing various
research projects that range from theory to practice. The
main use of encryption is to provide privacy through
abstraction of all useful information about the plaintext.
Encryption modifies data useless in the sense that one does
not get to access it. We will be making algorithms for
cryptosystems that will help to perform a variety of
computations on encrypted raw data, starting from normal
purpose of computation to the specialpurposecomputations
in order to eradicate this problem. Research on
homomorphic cryptography includes work on fully-
homomorphic encryption, searchableencryption,structured
encryption, functional encryption.
a. Proofs of storage. A client can verify whether the
cloud operator has tampered with its data using
proof of storage. Particularly, this is done without
the client storing a copy of the data and without it
having to store back any of the data. In fact, the
work for the client is negligible no matterhowlarge
the data is.
b. Secure Storage system. We are trying to design
cloud storage systems that provide privacy,
security, integrity of client data againstanmalicious
cloud provider. Systems will provide privacy
without any lossof efficiency and betterfunctioning
will have to be taken care of by making use of new
cryptographic encryption techniques like
homomorphic encryption, searchable encryption,
verifiable computation and proofs of storage and
many others.
5. CONCLUSION AND FUTURE SCOPE
Cloud computing is growing as a new thing and it is the new
trend indeed and many of the organizations and big
companies are moving toward the cloud but lagging behind
because of some security problems. Cloud security is an
ultimate concept which will crush the drawbacks the
acceptance of the cloud by the big MNCs, companies and
organizations. There are a lot of security algorithms which
may be implemented to the cloud. DES, Triple-DES, AES,and
Blowfish etc are some symmetric algorithms. DES and AES
are mostly used symmetric algorithmsasthey are relatively
more secure. DES is quite simple to implement than AES.
RSA and Diffie-Hellman Key Exchange is the asymmetric
algorithm. RSA and DiffieHellman Key Exchange is used to
generate encryption keysfor symmetric algorithmsincloud.
But the security algorithms which allow linear searching on
decrypted data are required for cloud computing,whichwill
take care about the safety of the data. There is a large scope
of improvement in this field of research. [5]We can use
cryptography in numerousplacesin order security in cloud.
For example, Cryptography can be used for maintaining
cloud data access control, cloud data trust management,
verifiable computing, cloud data authorization and
authentication and secure data storage. Apart fromallthese,
Lattice based Cryptography and ID based Cryptography are
the two important sectors which is ensuring cloud data
security in present world. Still there is a lot of research to be
done in this field.
6. REFERENCES
[1] Sanjoli Singla, Jasmeet Singh ,”Cloud computing security
using encryption technique”, IJARCET, vol.2, ISSUE 7.
[2] R. Bala Chandar, M. S. Kavitha , K. Seenivasan,” A
proficient model for high end security in cloud computing”,
International Journal of Emerging Research in Management
&Technology, Vol.5, Issue 10.
[3] Bokefode Jayant.D, Ubale Swapnaja A,PingaleSubhashV.,
Karane Kailash J. , Apate Sulabha S. ,”Developing Secure
Cloud Storage System by Applying AES and RSA
Cryptography Algorithms with Role bases Access Control
Model”, International Journal of Computer Applications,
Volume 118-No.12, May2015
[4] Karun Handa, Uma Singh,” Data Security in Cloud
Computing using Encryption and Steganography”,
International Journal of Computer Science and Mobile
Computing”, Vol.4 Issue.5, May-2015, pg.786-791
[5] M.Vijayapriya,”security algorithm in cloud computing:
overview”, International Journal of Computer Science &
Engineering Technology (IJCSET), Vol.4, ISSN: 2229-3345.
[6] Rashmi Nigoti, Manoj Jhuria, Dr. Shailendra Singh, “A
survey of Cryptographic algorithms for cloud computing”,
International Journal of Emerging Technologies in
Computational and Applied Sciences, March 2013, ISSN
(online)-2279-0055.
[7] Douglas R. Stinson,” Cryptography: Theory& Practice”,
Chapman and Hall Publications.

More Related Content

What's hot

Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudSecure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudIRJET Journal
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using SteganographyIRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...IJSRED
 

What's hot (20)

Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Secry poster
Secry posterSecry poster
Secry poster
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudSecure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
 

Similar to IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography

IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET Journal
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 

Similar to IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography (20)

IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES Algorithm
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 936 Ensuring Security in Cloud Computing Cryptography using Cryptography Dr. Amit Singhal¹, Rishabh Agarwal2, Shivi Shandilya3, Amandeep4 1,2,3,4 BBDIT, Ghaziabad, India ------------------------------------------------------------------------***------------------------------------------------------------------- Abstract: Cloud computing is an Internet-based computing model which provides several resources throughCloudService Providers (CSP) to Cloud Users (CU) on demand basis without buying the underlying infrastructure and follows pay-per-use basis. It supports virtualization of physical resources in order to improve efficiency and accomplishment of multiple tasksat the same time. Cloud Computing Environment (CCE) provides several deployment models to represent several categories of cloud owned by organization or institutes. However, CCE provide resources to Cloud Users through several services like PaaS, SaaS, IaaS. Cloud Computing is a notion based on the concept of summing up physical resources and displaying them as an unacknowledged resource. It is a model for producing resources, for sorting out applications, and for manifesto-independent user access to services.Cloudcancome in different types, and the services and the applications that possibly run on clouds may or may not be provided by a cloud service provider. There are two unique group of models namely deployment models and service models.Servicemodels consists of IaaS , SaaS, PaaS . The Deployment or deployment model consists of Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud .Cloud Computing has lots of distinct properties that make it very important. privacy seemstobean unique concern in cloud .Various types of service modelsunder cloud computing facilitate various levels of privacy services. We will get the minimum security in IaaS (Infastructure as a Service) and most with a SaaS provider. In this paper, we will focus upon the reviewing and understanding cloud security issues by proposing crypto algorithms and effective measures so as to ensure the data security in cloud. Along with this, we will elucidate a bit more about some security aspects of cryptography by showcasing some privacy issues of current cloud computing surroundings. Keywords: Cloud Computing, Cryptography, Security Issues Privacy, Security Algorithms, Encryption, Decryption. 1. INTRODUCTION Cloud computing is one of the popular topics of the current world. Internet has started driving all these new technologies. Internet was designed firstly to be strong, but not completely safe. Distributed applications like these is much prone to attacks. Cloud Computing has all the feebleness associated with these internet utilization andthe extra threats arise from the combined, Virtualized and redistributed resources. There are many data privacy concerns in cloud computing. Incorrect revelation of a data used in businesses in cloud to third parties is one of the major issues that has been found. [4]Encryption should be properly used and the crypto algorithms include AES, RSA, DES and 3 DES .In this paper, we describe about usingcrypto algorithmsso asto increase security concern. CloudSecurity can be ensured by data integrity, Secured data transfer and by Cryptography. There are varieties of cryptographic algorithms which can be implemented so as to ensure security in the cloud. The two types of algorithms are Symmetric and Asymmetric encryption key algorithms. Symmetric contains algorithms like DES, AES, 3 DES and Blowfish algorithm. Asymmetric contains algorithms like RSA, Diffie- Hellman Key Exchange. Symmetric key and asymmetric key algorithms is used to encrypt and decrypt the data in cloud. 2. RELATED WORK a. In the paper [1] the authors deal with the problem of security of data during data transmission. The main thing to fear about this paper is the encryptionofdataso that confidentiality and privacy can be easily achieved. The algorithm used here is Rijndael Encryption Algorithm along with EAP-CHAP. b. This paper[2] presents a protocol or set of instructions that uses the services of a third party auditor or checker not only to verify and authenticate the integrity of data stored at remote servers but also in retrieving and getting the data back as soon as possible in intact form. The main advantage of this scheme is the use of digital signature to assure the integrity of local data. However, the overall process is quite problematic and complex asthe keys and data are alsoencryptedand decrypted respectively. 3. CRYPTOGRAPHY: SECURITY PRINCIPLES AND ALGORITHMS Cryptography can help dawning integration of Cloud Computing by increased number of privacy related companies. The primary level of privacy where cryptography can help Cloud computing is safe and secure storage. Cryptography is the science of storing messages securely by converting the raw data into formswhich isnot readable [7]. In today’s world, Research Article Volume 7 Issue No.5 International Journal of EngineeringScienceand Computing, May 2017 11819 http://ijesc.org/ cryptography is considered as a collection of three
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 937 algorithms. These algorithms are Symmetric-key algorithms, Asymmetrickey algorithms and Hashing [6]. In Cloud computing, the main problemsarerelatedtoproblem in data security, backup data, network traffic, file storage system, and security of host, and cryptography alone can solve these issues to extents. For a safe and secure communication between the guest domain and the host domain, or from hosts to management systems, encryption technologies, such as Secure HTTP, encrypted VPNs, TLS, Secure Shell, and so on should be used. Encryptionwillhelp us prevent such exploits like man-in-themiddle, spoofed attacks, and session hijacking. Cloud computing provides clients with a computing facilities or infrastructure on top of which they can store data and run applications.Whilethe advantages of cloud computing are pretty clear, it introduces new security challenges as cloud operators are supposed to manipulate data for clientswithoutnecessarily being fully trusted. We will be trying to design cryptographic primitives and protocols which are tailored to the setting of cloud computing, attempting to strike a balance between security, efficiency and functionality. Cloud data storage enhances the risk of leakage of data and does not give access to unauthorized users. Cloud data management cannot be fully trusted by data owners. Cloud data process and computation could expose the privacy of users, owning the data or related entities to parities which does not have unauthorized access. For overcoming the above problems, cryptography has been widely applied to ensure data security, privacy and trust in cloud computing. 3.1 Symmetric key algorithms Symmetric uses single key, which worksfor bothencryption and decryption. The symmetric systems provide a two channel system to their users. It ensures authentication and authorization. Symmetric-key algorithms are those algorithms which uses only one and only key for both. The key is kept as secret. Symmetric algorithms have the advantage of not taking in too much of computation power and it works with very high speed in encryption. Symmetric- key algorithms are divided into two types: Block cipher and Stream cipher. In bock cipher input is taken as a block of plaintext of fixed size depending on the type of symmetric encryption algorithm, key of fixed size is applied on to block of plain text and then the output block of the same sizeasthe block of plaintext is obtained. In Case of stream cipher one bit is encrypted at a particular time. Some popular Symmetric-key algorithmsusedincloudcomputingincludes: Data Encryption Standard (DES), TripleDES, and Advanced Encryption Standard (AES). Figure 1 A. Advanced Encryption Standard (AES) In cryptography, the Advanced Encryption Standard [3] is type of symmetric-key encryption algorithm . Each of the ciphers has a 128-bit block size and having key sizes of 128, 192 and 256 bits, respectively. AES algorithm assures that the hash code is encrypted in a secure manner. AES has a block size of 128 bits . Its algorithm is as follows: Key Expansion, Initial Round - Round Keys are added. Rounds, Sub Bytes—a non-uniform substitutionstepwhereeachbyte is substituted with another according to a table. Rows are shifted—a transposition step where each row of the state is shifted cyclically a certain number of steps. Columns are mixed—a mixing operation which operates on the columns of the state, combining the four bytes in each column 8. Add Round Key— each byte of that particular state is combined with the round key; each round key is derivedfromthegiven cipher key using a key schedule. Final Round,SubBytes,Shift Rows, Add Round Key. The DES algorithm wasfinallybroken in 1998 using a system that costs about $250,000.TripleDES turned out to be too slow for efficiency as the DES algorithm was developed for mid-1970’s hardware and did not produce efficient and effective software code. TripleDEShas three times as many rounds as DES and is correspondingly slower Figure 2
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 938 B. Data Encryption Standard (DES) The Data Encryption Standard (DES) is a block cipher and comesunder symmetric key cryptography. found in January 1977 by the National Institute of Standardsand Technology, named as NIST. At the encryption site, DES simply takes a 64-bit plaintext and creates a 64-bit cipher text, at the decryption process, it takesa 64-bit cipher text andcreatesa 64-bit plaintext, and same 56 bit cipher key is used for both encryption and decryption. The encryption process is made using two permutations (P-boxes), which we call initial and final permutation, and sixteen Fiestel rounds. Each round uses a different sort of 48-bit round key which is generated from the cipher key according to a predefined algorithm. Figure 3 C. Blowfish Algorithm Blowfish also comes under symmetric block cipher that can be used as a substitute for DES. It takesa variable-lengthkey, starting from from 32 bitsto 448 bits, makingitconsiderably better for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a free, fast substiute to existing encryption algorithms. Since then it has been verified considerably, and it is gradually gaining popularity as a strong encryption algorithm. 3.2 Asymmetric Key Algorithms It is relatively a new concept unlike symmetric cryptosystem. Different keys are used for encryption and decryption. This is a property which set this scheme different than symmetric encryption scheme. Each receiver possesses a decryption key of its own, generally referred to as his private key. Receiver needs to generate an encryption key, referred to as his public key. Generally, this type of cryptosystem involves trusted third party which officially declares that a particular public key belongs to a specific person or entity only. Figure 4 a) RSA Cryptosystem This cryptosystem is one the initial systems and oldest of asymmetric cryptosystem. It remains most employed and used cryptosystem even now. The system was invented by three scholars named Ron Rivest, Adi Shamir, and Len International Journal of Engineering ScienceandComputing, May 2017 11820 http://ijesc.org/ Adleman and hence, it is termed as RSA cryptosystem. This algorithm is used for public-key cryptography and not private key crptofra. It is the first and still most commonly used asymmetric algorithm. It involves two keys namely a public key and a private key. The public key is used for encrypting messages and is known to everyone. Messages encrypted with the use of public key can be decrypted only by using the private key. In this verification process, the serverimplementspublickey authentication by signing a unique message with its private key, which is called asdigital signature. The signatureisthen returned to the client. Then it verifies using the server’s known public key.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 939 Figure 5 b) Diffie-Hellman Key Exchange Whitfield Diffie and Martin Hellman introduced a key exchange protocol with the help of the discrete logarithm problem in 1976. In this key exchange protocol sender and receiver will manage to set up a secret key to their symmetric key system, using an unsafe channel. To set up a key Alice chooses a random integer aE[1; n] computes ga, similarly Bob computes gb for random bE[1; n] and sends it to Alice. The secret key is gab, which Alice computes by computing (gb)a and Bob by computing(ga)b.Theimportant concepts on which the security of the Diffie-Hellman Protocols defend upon DDH, DHP, DLP like etc Figure 6 3.3 Hashing Algorithms a. MD5- (Message-Digest algorithm 5) A widely used hash function algorithm in cryptographywith a 128-bit hash value and possesses a variable length message into a fixed-length outputof 128bits.Firsttheinput message is divides up into lump of 512- bit blocks then the message is padded so that itstotal length is divisible by 512. The sender of the data uses the public key to encrypt the message and the receiver uses its private key to decrypt the message. Figure 7 4. SECURITY PROBLEMS FACED BY CLOUD COMPUTING When it comes to privacy and security, cloud is greatly affected by the threat of that. The people such asthevendors must make sure that the people using cloud does not face any problem such as data loss or theft of data. There is a chance where a malicious user or hacker can get into the cloud by impersonating a legitimate user, there by affecting the entire cloud thus affecting many people who are using the infected or affected cloud. Some of the problem which is faced by the Cloud computing are: i. Data theft ii. Integrity of data iii. Privacy problems iv. Loss of data v. Infected Applications vi. Exact location of data vii. Vendor level Security viii.User level Security
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 940 The current generation of cloud computingfacilitiesdoesnot provide any privacy against untrusted cloud operators and hence they are not supposed to store important information such as medical records, financial records or high impact business data. To address this we are pursuing various research projects that range from theory to practice. The main use of encryption is to provide privacy through abstraction of all useful information about the plaintext. Encryption modifies data useless in the sense that one does not get to access it. We will be making algorithms for cryptosystems that will help to perform a variety of computations on encrypted raw data, starting from normal purpose of computation to the specialpurposecomputations in order to eradicate this problem. Research on homomorphic cryptography includes work on fully- homomorphic encryption, searchableencryption,structured encryption, functional encryption. a. Proofs of storage. A client can verify whether the cloud operator has tampered with its data using proof of storage. Particularly, this is done without the client storing a copy of the data and without it having to store back any of the data. In fact, the work for the client is negligible no matterhowlarge the data is. b. Secure Storage system. We are trying to design cloud storage systems that provide privacy, security, integrity of client data againstanmalicious cloud provider. Systems will provide privacy without any lossof efficiency and betterfunctioning will have to be taken care of by making use of new cryptographic encryption techniques like homomorphic encryption, searchable encryption, verifiable computation and proofs of storage and many others. 5. CONCLUSION AND FUTURE SCOPE Cloud computing is growing as a new thing and it is the new trend indeed and many of the organizations and big companies are moving toward the cloud but lagging behind because of some security problems. Cloud security is an ultimate concept which will crush the drawbacks the acceptance of the cloud by the big MNCs, companies and organizations. There are a lot of security algorithms which may be implemented to the cloud. DES, Triple-DES, AES,and Blowfish etc are some symmetric algorithms. DES and AES are mostly used symmetric algorithmsasthey are relatively more secure. DES is quite simple to implement than AES. RSA and Diffie-Hellman Key Exchange is the asymmetric algorithm. RSA and DiffieHellman Key Exchange is used to generate encryption keysfor symmetric algorithmsincloud. But the security algorithms which allow linear searching on decrypted data are required for cloud computing,whichwill take care about the safety of the data. There is a large scope of improvement in this field of research. [5]We can use cryptography in numerousplacesin order security in cloud. For example, Cryptography can be used for maintaining cloud data access control, cloud data trust management, verifiable computing, cloud data authorization and authentication and secure data storage. Apart fromallthese, Lattice based Cryptography and ID based Cryptography are the two important sectors which is ensuring cloud data security in present world. Still there is a lot of research to be done in this field. 6. REFERENCES [1] Sanjoli Singla, Jasmeet Singh ,”Cloud computing security using encryption technique”, IJARCET, vol.2, ISSUE 7. [2] R. Bala Chandar, M. S. Kavitha , K. Seenivasan,” A proficient model for high end security in cloud computing”, International Journal of Emerging Research in Management &Technology, Vol.5, Issue 10. [3] Bokefode Jayant.D, Ubale Swapnaja A,PingaleSubhashV., Karane Kailash J. , Apate Sulabha S. ,”Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role bases Access Control Model”, International Journal of Computer Applications, Volume 118-No.12, May2015 [4] Karun Handa, Uma Singh,” Data Security in Cloud Computing using Encryption and Steganography”, International Journal of Computer Science and Mobile Computing”, Vol.4 Issue.5, May-2015, pg.786-791 [5] M.Vijayapriya,”security algorithm in cloud computing: overview”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol.4, ISSN: 2229-3345. [6] Rashmi Nigoti, Manoj Jhuria, Dr. Shailendra Singh, “A survey of Cryptographic algorithms for cloud computing”, International Journal of Emerging Technologies in Computational and Applied Sciences, March 2013, ISSN (online)-2279-0055. [7] Douglas R. Stinson,” Cryptography: Theory& Practice”, Chapman and Hall Publications.