SlideShare a Scribd company logo
Presented By:
1. Rafiq, Fatema Binta (13-23447-1)
2. Rahman, Mahmuda (13-22990-1)
3. Rabbi, Md. Fazla (13-23679-1)
4. Ali, Nafis (13-24925-3)
5. Hossain, F.M. Tanvir (13-23513-1)
Analysis of Security
Algorithms in Cloud
Computing
Instructor:
Shahrin Chowdhury
 INTRODUCTION
 CHALLENGE
 DATA STORAGE & SECURITY IN
CLOUDE COMPUTING
 Data Security Issues in Cloud
Computing
 EXISTING ALGORITHM FOR
SECURITY
 AES
 RSA
 Further development proposal
 CONCLUSION
Index
INRODUCTION
Security system in cloud for storing data
is not safe enough. When data is valuable
specially in the cloud computing, it's
security considered to be the key
requirement. Also it is get more
important when it is hard to make it
safe. It becomes hard to keep data safe
due to lack of strong data encryption
system. Cloud possesses the security
problem in Data segregation, Data theft,
unauthorized access, Uncleaned Owner
and responsibility of Data Protection,
Data Loss conditions.
Tuesday, October 11,
2016
3
CHALLENGE
The following are some of the
notable challenges associated with
cloud computing, and although
some of these may cause a
slowdown when delivering more
services in the cloud, most also can
provide opportunities, if resolved
with due care and attention in the
planning stages.
• Security and Privacy
• Lack of Standards
• Continuously Evolving
Tuesday, October 11,
2016
4
Data Storage & Security in Cloud Computing
Cloud storage services may be accessed through a web service
application programming interface (API), a cloud storage
gateway or through a Web-based user interface. Cloud storage
is:
 made up of many distributed resources, but still acts as one
 highly fault tolerant through redundancy and distribution of
data
 highly durable through the creation of versioned copies
 typically eventually consistent with regard to data replicas.
Tuesday, October 11,
2016
5
Data Security Issues in Cloud Computing
 Transmit and store user’s information as little as possible. After
systemic analysis, the cloud computing applications will collect and
store the most necessary information only.
 Security measures will be adopted to prevent unauthorized access,
copying, using or modifying personal information.
 Achieve user’s control to the greatest degree. Firstly, it is necessary to
allow the user to control the most critical and important personal
information. Secondly, it is available to manage personal information
by a trusted third party.
Tuesday, October 11,
2016
6
Data Security Issues in Cloud Computing
 Allow users to make choice. Users have the right to select the use of
personal information. Besides, they can join or leave freely.
 Make clear and limit the purpose of use of data. Personal information
must be used and handled by the person with specific identification
for specific purpose and owner of information should be notified
before using.
 Establish feedback mechanism to ensure that safety tips and detailed
measures of the service will be provided to the user timely.
 It can maximize the security of user’s data after introducing principles
above
Tuesday, October 11,
2016
7
Pseudo code of AES Algorithm
 The AES algorithm performs a number
Nr of cryptographic rounds depending
on the actual key length. It has
variable key length of 128, 192, or
256 bits.
 Each round consists of four byte-
oriented cryptographic
transformations
 Byte Substitution
 Shifting rows of state array
 Mixing data within a column of the
state array
 Round key addition to the state array
Cipher(byte[] input, byte[] output)
{
byte[4,4] State;
copy input[] into State[] AddRoundKey
for (round = 1; round < Nr-1; ++round)
{
SubBytes ShiftRows MixColumns
AddRoundKey
}
SubBytes ShiftRows AddRoundKey
copy State[] to output[]
}
Tuesday, October 11,
2016 8
Activity Diagram of AES Algorithm
Tuesday, October 11,
2016
9
Advantage:
Extremely Secure
When it uses a secure algorithm,
symmetric key encryption can be
extremely secure. When you use
it with its most secure 256-bit key
length, it would take about a
billion years for a 10 petaflop
computer to guess the key
through a brute-force attack.
Relatively Fast
Encrypting and decrypting
symmetric key data is relatively
easy to do, giving you very good
reading and writing performance.
Disadvantage:
Sharing the Key
The biggest problem with symmetric
key encryption is that you need to
have a way to get the key to the party
with whom you are sharing data.
Encryption keys aren't simple strings
of text like passwords.
More Damage if Compromised
When someone gets their hands on a
symmetric key, they can decrypt
everything encrypted with that key.
When you're using symmetric
encryption for two-way
communications, this means that both
sides of the conversation get
compromised.
Tuesday, October 11,
2016
10
Pseudo Code for RSA Algorithm
 Key Generation Algorithm
1. Choose two very large random
prime integers:
p and q
2. Compute n and φ(n):
n = pq and φ(n) = (p-1)(q-1)
3. Choose an integer e,
1 < e < φ(n) such that:
gcd(e, φ(n)) = 1(where gcd means
greatest common denominator)
4. Compute d, 1 < d < φ(n) such
that:
ed ≡ 1 (mod φ(n))
 the public key is (n, e) and the private
key is (n, d)
 the values of p, q and φ(n) are private
 e is the public or encryption exponent
 d is the private or decryption exponent
 Encryption
The cyphertext C is found by the
equation 'C = Me mod n' where M is
the original message.
 Decryption
The message M can be found form the
cyphertext C by the equation 'M = Cd
mod n'.
Tuesday, October 11,
2016 11
Activity Diagram of RSA Algorithm
Encryption
Public Key
Private Key Decryption
Sender Receiver
Generate Key
To the public
Cipher text
Transmission
Medium
Plain text
Plain text
Tuesday, October 11,
2016 12
Advantage:
Increased security and convenience
Private keys never need to be
transmitted or revealed to anyone.
Digital signatures that cannot be
repudiated
Authentication via secret-key systems
requires the sharing of some secret
and sometimes requires trust of a
third party as well. As a result, a
sender can repudiate a previously
authenticated message by claiming
the shared secret was somehow
compromised) by one of the parties
sharing the secret.
Disadvantage:
Encryption speed Slow
For encryption, the best solution is to
combine public- and secret-key systems in
order to get both the security advantages
of public-key systems and the speed
advantages of secret-key systems. Such a
protocol is called a digital envelope.
Vulnerability risk
A successful attack on a certification
authority will allow an adversary to
impersonate whomever he or she chooses
by using a public-key certificate from the
compromised authority to bind a key of
the adversary's choice to the name of
another user.
Tuesday, October 11,
2016
13
Further development proposal
 Multiple encryption
 Data storage method
 Biometric security
Tuesday, October 11,
2016
14
Conclusion
Cloud computing is changing the way IT departments buy IT.
Businesses have a range of paths to the cloud, including
infrastructure, platforms and applications that are available
from cloud providers as online services. Security is a major
requirement in cloud computing while we talk about data
storage. There are number of existing techniques used to
implement security in cloud. We discussed one symmetric and
asymmetric algorithm. Our future will be considering some
problems related to existing security algorithms and
implement a better version of AES & RSA.
Tuesday, October 11,
2016
15
Left the world…
Trapped me to answer the
question of unknown
Answers…
Left silently *sigh*..
Don’t Ask Questions
Please.
Tuesday, October 11,
2016 16
References
 Randeep Kaur ,Supriya Kinger, “Analysis of Security
Algorithms in Cloud Computing“, International Journal
of Application or Innovation in Engineering &
Management (IJAIEM), Volume 3, Issue 3, March 2014 .
 http://www.emc.com/emc-plus/rsa-labs/standards-
initiatives/advantages-and-disadvantages.htm
 http://science.opposingviews.com/advantages-
disadvantages-symmetric-key-encryption-2609.html
Tuesday, October 11,
2016 17

More Related Content

What's hot

Web Hacking
Web HackingWeb Hacking
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
Sou Jana
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
Stephane Potier
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
Sam Bowne
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
shraddha mane
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
social engineering
 social engineering social engineering
social engineering
Ravi Patel
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 

What's hot (20)

Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Phishing
PhishingPhishing
Phishing
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
IP Security
IP SecurityIP Security
IP Security
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
social engineering
 social engineering social engineering
social engineering
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 

Viewers also liked

Cryptography
CryptographyCryptography
Cryptography
Techprahlad
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
vmshimavm
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
Krishnalal Kj
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
I3E Technologies
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
Shakas Technologies
 
Cloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud servicesCloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud services
ieeepondy
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
Shakas Technologies
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
imran shaikh
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
Mphasis
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
Akash Kamble
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
 
Cloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud servicesCloud armor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud services
 
Cloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud servicesCloudarmor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 

Similar to Analysis of-security-algorithms-in-cloud-computing [autosaved]

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
Prancer Io
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
Luisa Francisco
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
security issue
security issuesecurity issue
security issue
JAINIK PATEL
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
Ruban Deventhiran
 
Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
MajedahAlkharji
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 

Similar to Analysis of-security-algorithms-in-cloud-computing [autosaved] (20)

Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
security issue
security issuesecurity issue
security issue
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 

Analysis of-security-algorithms-in-cloud-computing [autosaved]

  • 1. Presented By: 1. Rafiq, Fatema Binta (13-23447-1) 2. Rahman, Mahmuda (13-22990-1) 3. Rabbi, Md. Fazla (13-23679-1) 4. Ali, Nafis (13-24925-3) 5. Hossain, F.M. Tanvir (13-23513-1) Analysis of Security Algorithms in Cloud Computing Instructor: Shahrin Chowdhury
  • 2.  INTRODUCTION  CHALLENGE  DATA STORAGE & SECURITY IN CLOUDE COMPUTING  Data Security Issues in Cloud Computing  EXISTING ALGORITHM FOR SECURITY  AES  RSA  Further development proposal  CONCLUSION Index
  • 3. INRODUCTION Security system in cloud for storing data is not safe enough. When data is valuable specially in the cloud computing, it's security considered to be the key requirement. Also it is get more important when it is hard to make it safe. It becomes hard to keep data safe due to lack of strong data encryption system. Cloud possesses the security problem in Data segregation, Data theft, unauthorized access, Uncleaned Owner and responsibility of Data Protection, Data Loss conditions. Tuesday, October 11, 2016 3
  • 4. CHALLENGE The following are some of the notable challenges associated with cloud computing, and although some of these may cause a slowdown when delivering more services in the cloud, most also can provide opportunities, if resolved with due care and attention in the planning stages. • Security and Privacy • Lack of Standards • Continuously Evolving Tuesday, October 11, 2016 4
  • 5. Data Storage & Security in Cloud Computing Cloud storage services may be accessed through a web service application programming interface (API), a cloud storage gateway or through a Web-based user interface. Cloud storage is:  made up of many distributed resources, but still acts as one  highly fault tolerant through redundancy and distribution of data  highly durable through the creation of versioned copies  typically eventually consistent with regard to data replicas. Tuesday, October 11, 2016 5
  • 6. Data Security Issues in Cloud Computing  Transmit and store user’s information as little as possible. After systemic analysis, the cloud computing applications will collect and store the most necessary information only.  Security measures will be adopted to prevent unauthorized access, copying, using or modifying personal information.  Achieve user’s control to the greatest degree. Firstly, it is necessary to allow the user to control the most critical and important personal information. Secondly, it is available to manage personal information by a trusted third party. Tuesday, October 11, 2016 6
  • 7. Data Security Issues in Cloud Computing  Allow users to make choice. Users have the right to select the use of personal information. Besides, they can join or leave freely.  Make clear and limit the purpose of use of data. Personal information must be used and handled by the person with specific identification for specific purpose and owner of information should be notified before using.  Establish feedback mechanism to ensure that safety tips and detailed measures of the service will be provided to the user timely.  It can maximize the security of user’s data after introducing principles above Tuesday, October 11, 2016 7
  • 8. Pseudo code of AES Algorithm  The AES algorithm performs a number Nr of cryptographic rounds depending on the actual key length. It has variable key length of 128, 192, or 256 bits.  Each round consists of four byte- oriented cryptographic transformations  Byte Substitution  Shifting rows of state array  Mixing data within a column of the state array  Round key addition to the state array Cipher(byte[] input, byte[] output) { byte[4,4] State; copy input[] into State[] AddRoundKey for (round = 1; round < Nr-1; ++round) { SubBytes ShiftRows MixColumns AddRoundKey } SubBytes ShiftRows AddRoundKey copy State[] to output[] } Tuesday, October 11, 2016 8
  • 9. Activity Diagram of AES Algorithm Tuesday, October 11, 2016 9
  • 10. Advantage: Extremely Secure When it uses a secure algorithm, symmetric key encryption can be extremely secure. When you use it with its most secure 256-bit key length, it would take about a billion years for a 10 petaflop computer to guess the key through a brute-force attack. Relatively Fast Encrypting and decrypting symmetric key data is relatively easy to do, giving you very good reading and writing performance. Disadvantage: Sharing the Key The biggest problem with symmetric key encryption is that you need to have a way to get the key to the party with whom you are sharing data. Encryption keys aren't simple strings of text like passwords. More Damage if Compromised When someone gets their hands on a symmetric key, they can decrypt everything encrypted with that key. When you're using symmetric encryption for two-way communications, this means that both sides of the conversation get compromised. Tuesday, October 11, 2016 10
  • 11. Pseudo Code for RSA Algorithm  Key Generation Algorithm 1. Choose two very large random prime integers: p and q 2. Compute n and φ(n): n = pq and φ(n) = (p-1)(q-1) 3. Choose an integer e, 1 < e < φ(n) such that: gcd(e, φ(n)) = 1(where gcd means greatest common denominator) 4. Compute d, 1 < d < φ(n) such that: ed ≡ 1 (mod φ(n))  the public key is (n, e) and the private key is (n, d)  the values of p, q and φ(n) are private  e is the public or encryption exponent  d is the private or decryption exponent  Encryption The cyphertext C is found by the equation 'C = Me mod n' where M is the original message.  Decryption The message M can be found form the cyphertext C by the equation 'M = Cd mod n'. Tuesday, October 11, 2016 11
  • 12. Activity Diagram of RSA Algorithm Encryption Public Key Private Key Decryption Sender Receiver Generate Key To the public Cipher text Transmission Medium Plain text Plain text Tuesday, October 11, 2016 12
  • 13. Advantage: Increased security and convenience Private keys never need to be transmitted or revealed to anyone. Digital signatures that cannot be repudiated Authentication via secret-key systems requires the sharing of some secret and sometimes requires trust of a third party as well. As a result, a sender can repudiate a previously authenticated message by claiming the shared secret was somehow compromised) by one of the parties sharing the secret. Disadvantage: Encryption speed Slow For encryption, the best solution is to combine public- and secret-key systems in order to get both the security advantages of public-key systems and the speed advantages of secret-key systems. Such a protocol is called a digital envelope. Vulnerability risk A successful attack on a certification authority will allow an adversary to impersonate whomever he or she chooses by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user. Tuesday, October 11, 2016 13
  • 14. Further development proposal  Multiple encryption  Data storage method  Biometric security Tuesday, October 11, 2016 14
  • 15. Conclusion Cloud computing is changing the way IT departments buy IT. Businesses have a range of paths to the cloud, including infrastructure, platforms and applications that are available from cloud providers as online services. Security is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. We discussed one symmetric and asymmetric algorithm. Our future will be considering some problems related to existing security algorithms and implement a better version of AES & RSA. Tuesday, October 11, 2016 15
  • 16. Left the world… Trapped me to answer the question of unknown Answers… Left silently *sigh*.. Don’t Ask Questions Please. Tuesday, October 11, 2016 16
  • 17. References  Randeep Kaur ,Supriya Kinger, “Analysis of Security Algorithms in Cloud Computing“, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 3, March 2014 .  http://www.emc.com/emc-plus/rsa-labs/standards- initiatives/advantages-and-disadvantages.htm  http://science.opposingviews.com/advantages- disadvantages-symmetric-key-encryption-2609.html Tuesday, October 11, 2016 17