SlideShare a Scribd company logo
Attaining Data Security in
Cloud Computing
Submitted by
M.Gopinath
(1074305)
VLSI DESIGN

Under the Guidelines of
Dr.V.Sumathy
Objective
• To address the security problems such as
insider attacks and identity theft.

• To store the data across network-distributed
systems in a secure way.
Challenging Security Threats
• Loss of control over data in cloud storage
• Traditional integrity menace
Due to dynamic data update
Due to storing data redundantly in various
physical location

• Insider attack
Literature Survey
• Great amount of data widely spread over the
network require adequate management, to
ensure authorization, confidentiality and
integrity.

• Based on the cryptography and the nature of the
cloud, information security has to be achieved.
Cloud Computing
• Computing on multiple server via a digital
network
• A model for enabling convenient, ondemand network access to a shared pool
of configurable computing resources
• Technique which moves the application
software and databases to the large data
centers
Cloud Computing contd..
• Provides computation, software, data
access, and storage services

• Does not require end-user’s knowledge of
the physical location and configuration of
the system that delivers the services
Technologies in Cloud
•
•
•
•
•

Grid computing
Virtualization
Infrastructure-as-a-Service
Software-as-a-Service
Utility Computing
Cloud Storage
• A model of networked online storage where data

•
•

is stored on multiple virtual servers, generally
hosted by third parties, rather than being hosted
on dedicated servers.
Companies do not need to install physical
storage devices in their own datacenter or
offices, which reduces IT and hosting costs.
Companies need to pay only for the storage they
actually use.
Benefits of Cloud
•
•
•
•

Highly scalable
Highly available
Dynamically allocated resources
Pay only for resources that you use
System Model
Users (consists of both consumers and
organizations), who have data to be stored in the
cloud
Cloud Service Provider(CSP), who has
resources and expertise in building and
managing distributed cloud storage servers
Third Party Auditor(TPA), who has expertise
and capabilities that users may not have, to
assess and expose risk of cloud storage
Adversary model
• It tries to compromise a number of cloud
data storage servers and is able to modify
or delete users’ data.
• Two types of adversary with different
levels of capability
Weak adversary
Strong adversary
Data Storage Security
• Encryption – the process of transforming
plaintext into ciphertext using cipher
• Decryption – the reverse process of
encryption
• Digital Signature
Cipher Types
• Symmetric cryptography
• Asymmetric or Public Key cryptography
Symmetric Cipher
DES
The Data Encryption Standard (DES) is a
symmetric-key block cipher published by
the National Institute of Standards and
Technology (NIST).
General Structure of DES
DES uses 16 rounds. Each round of DES is a
Feistel cipher.
Key Generation
Properties of DES

• Avalanche effect
• completeness
Design Criteria

• S-boxes
• P-boxes
• Number of rounds
Public Key Cipher
RSA Algorithm
• An algorithm for public-key (asymmetric)
•
•
•
•

cryptography.
Based on the presumed difficulty of factoring
large integers, the factoring problem.
RSA involves a public key and private key.
Anyone can use the public key to encrypt a
message.
If the public key is large enough, only someone
with knowledge of the prime factors can feasibly
decode the message.
Key Generation
•
•
•
•
•
•

Choose two distinct prime numbers p and q.
Compute n = pq.
Compute φ(n) = (p – 1)(q – 1), where φ is
Euler's totient function.
Choose an integer e such that 1 < e < φ(n)
and gcd(e,φ(n)) = 1, i.e. e and φ(n) are
coprime.
Determine d = e–1 mod φ(n); i.e. d is the
multiplicative inverse of e mod φ(n).
The public key pair is {e,n} and the private key
pair is {d,n}.
ENCRYPTION
For sending message to B:
• Obtains the recipient B's public key (n,
e).
• Represents the plaintext message as a
positive integer m, 1 < m < n.
• Computes the ciphertext C = me mod n.
• Sends the ciphertext C to B.
DECRYPTION
Sender decrypts the message as follows:
• Uses his private key (n, d) to compute m
= Cd mod n.
• Extracts the plaintext from the message
representative m.
Features of RSA
• Secrecy and Privacy
• Integrity
• Authentication
• Non-repudiation
Proposed Algorithm
• Public-Key encryption

•
•

– increased security
– Convenience
Secret-Key encryption
– Speed
Best solution is to combine public- and secret-key
cryptography to get both security and speed
Proposed Algorithm contd.
• User logins must be used to provide
authorization.

• The symmetric Data Key K is used for data
encryption.

• Then the symmetric key K is encrypted through
the user public key KPUB, and it is written in the
distributed storage system.
Simulation Tools
• Dot Net framework
• Gladinet Cloud Desktop
• Amazon Cloud Drive
• Box.net and OpenBox platform
Reference
• Gary C.Kessler, 1998, “An Overview of Cryptography”,
•
•
•
•
•
•

Chapter 3.
William Stallings, “Cryptography and Network Security”,
Fourth Edition, Chapters 3, 5, 9 and 13.
http://en.wikipedia.org/wiki/Cloud_Computing
http://www.box.net/
Amazon.com, “Amazon Web Services (AWS),” Online at
http://aws.amazon.com, 2008.
http://www.msdn.microsoft.com/enus/library/system.security.cryptography.aspx
http://www.gladinet.com/
Thank you

More Related Content

What's hot

Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
Ratheesh Kumar R
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan Holt
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 

What's hot (20)

Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 

Viewers also liked

CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Pavlos Stefanis
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

Viewers also liked (8)

Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
 
Dissertation on MF
Dissertation on MFDissertation on MF
Dissertation on MF
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similar to Attaining data security in cloud computing

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
SruthiReddy112
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 

Similar to Attaining data security in cloud computing (20)

Ch9
Ch9Ch9
Ch9
 
Using RSA Algorithm in Web Services
Using RSA Algorithm in Web ServicesUsing RSA Algorithm in Web Services
Using RSA Algorithm in Web Services
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 
262 265
262 265262 265
262 265
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Image Security
Image SecurityImage Security
Image Security
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Attaining data security in cloud computing

  • 1. Attaining Data Security in Cloud Computing Submitted by M.Gopinath (1074305) VLSI DESIGN Under the Guidelines of Dr.V.Sumathy
  • 2. Objective • To address the security problems such as insider attacks and identity theft. • To store the data across network-distributed systems in a secure way.
  • 3. Challenging Security Threats • Loss of control over data in cloud storage • Traditional integrity menace Due to dynamic data update Due to storing data redundantly in various physical location • Insider attack
  • 4. Literature Survey • Great amount of data widely spread over the network require adequate management, to ensure authorization, confidentiality and integrity. • Based on the cryptography and the nature of the cloud, information security has to be achieved.
  • 5. Cloud Computing • Computing on multiple server via a digital network • A model for enabling convenient, ondemand network access to a shared pool of configurable computing resources • Technique which moves the application software and databases to the large data centers
  • 6. Cloud Computing contd.. • Provides computation, software, data access, and storage services • Does not require end-user’s knowledge of the physical location and configuration of the system that delivers the services
  • 7. Technologies in Cloud • • • • • Grid computing Virtualization Infrastructure-as-a-Service Software-as-a-Service Utility Computing
  • 8. Cloud Storage • A model of networked online storage where data • • is stored on multiple virtual servers, generally hosted by third parties, rather than being hosted on dedicated servers. Companies do not need to install physical storage devices in their own datacenter or offices, which reduces IT and hosting costs. Companies need to pay only for the storage they actually use.
  • 9. Benefits of Cloud • • • • Highly scalable Highly available Dynamically allocated resources Pay only for resources that you use
  • 10. System Model Users (consists of both consumers and organizations), who have data to be stored in the cloud Cloud Service Provider(CSP), who has resources and expertise in building and managing distributed cloud storage servers Third Party Auditor(TPA), who has expertise and capabilities that users may not have, to assess and expose risk of cloud storage
  • 11.
  • 12. Adversary model • It tries to compromise a number of cloud data storage servers and is able to modify or delete users’ data. • Two types of adversary with different levels of capability Weak adversary Strong adversary
  • 13. Data Storage Security • Encryption – the process of transforming plaintext into ciphertext using cipher • Decryption – the reverse process of encryption • Digital Signature
  • 14. Cipher Types • Symmetric cryptography • Asymmetric or Public Key cryptography
  • 16. DES The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).
  • 18. DES uses 16 rounds. Each round of DES is a Feistel cipher.
  • 20. Properties of DES • Avalanche effect • completeness Design Criteria • S-boxes • P-boxes • Number of rounds
  • 22. RSA Algorithm • An algorithm for public-key (asymmetric) • • • • cryptography. Based on the presumed difficulty of factoring large integers, the factoring problem. RSA involves a public key and private key. Anyone can use the public key to encrypt a message. If the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
  • 23. Key Generation • • • • • • Choose two distinct prime numbers p and q. Compute n = pq. Compute φ(n) = (p – 1)(q – 1), where φ is Euler's totient function. Choose an integer e such that 1 < e < φ(n) and gcd(e,φ(n)) = 1, i.e. e and φ(n) are coprime. Determine d = e–1 mod φ(n); i.e. d is the multiplicative inverse of e mod φ(n). The public key pair is {e,n} and the private key pair is {d,n}.
  • 24. ENCRYPTION For sending message to B: • Obtains the recipient B's public key (n, e). • Represents the plaintext message as a positive integer m, 1 < m < n. • Computes the ciphertext C = me mod n. • Sends the ciphertext C to B.
  • 25. DECRYPTION Sender decrypts the message as follows: • Uses his private key (n, d) to compute m = Cd mod n. • Extracts the plaintext from the message representative m.
  • 26. Features of RSA • Secrecy and Privacy • Integrity • Authentication • Non-repudiation
  • 27. Proposed Algorithm • Public-Key encryption • • – increased security – Convenience Secret-Key encryption – Speed Best solution is to combine public- and secret-key cryptography to get both security and speed
  • 28. Proposed Algorithm contd. • User logins must be used to provide authorization. • The symmetric Data Key K is used for data encryption. • Then the symmetric key K is encrypted through the user public key KPUB, and it is written in the distributed storage system.
  • 29. Simulation Tools • Dot Net framework • Gladinet Cloud Desktop • Amazon Cloud Drive • Box.net and OpenBox platform
  • 30. Reference • Gary C.Kessler, 1998, “An Overview of Cryptography”, • • • • • • Chapter 3. William Stallings, “Cryptography and Network Security”, Fourth Edition, Chapters 3, 5, 9 and 13. http://en.wikipedia.org/wiki/Cloud_Computing http://www.box.net/ Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008. http://www.msdn.microsoft.com/enus/library/system.security.cryptography.aspx http://www.gladinet.com/