With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However to protect the privacy of data, many users encrypt it before storing in CS. This method affects the deduplication process because encryption methods have varying characteristics. Convergent encryption (CE) scheme is widely used for secure data deduplication, but it destroys the message equality. Although, DupLESS provides strong privacy by enhancing CE, but it is also found insufficient. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This paper addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However to protect the privacy of data, many users encrypt it before storing in CS. This method affects the deduplication process because encryption methods have varying characteristics. Convergent encryption (CE) scheme is widely used for secure data deduplication, but it destroys the message equality. Although, DupLESS provides strong privacy by enhancing CE, but it is also found insufficient. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This paper addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Abstract: Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. The cloud computing, users have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. On solving the classification problem over encrypted data. A secure k-NN classifier over encrypted data in the cloud. The k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies.
This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud provider must
verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will
present in an unauthorized place (e.g., on the internet or someone’s laptop). In this paper, we propose Division
and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively
approaches the security and performance issues. In DROPS methodology, we have to select the file and then
store the particular file in the cloud account. In order to provide security we are going to implement DROPS
concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments
are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate
each fragments for one time in cloud.
Abstract: Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. The cloud computing, users have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. On solving the classification problem over encrypted data. A secure k-NN classifier over encrypted data in the cloud. The k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies.
This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud provider must
verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will
present in an unauthorized place (e.g., on the internet or someone’s laptop). In this paper, we propose Division
and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively
approaches the security and performance issues. In DROPS methodology, we have to select the file and then
store the particular file in the cloud account. In order to provide security we are going to implement DROPS
concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments
are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate
each fragments for one time in cloud.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
Today, the growth of digitalization has made the ease for livelihood for all the organizations. Cloud computing the storage provider for all the computer resources has made it easy for accessing the data from anywhere anytime. But at the same time the security for cloud data storage is the major drawback which is provided by various cryptographic algorithms. These algorithms convert the data into unreadable format, known as cipher text, Rivest, Shamir and Adleman (RSA) one of the most popularly used asymmetric algorithm. This paper gives detailed review about such different cryptographic algorithms used for the cloud data security. The comparison study is also made for the size of data and to analyze the encryption time and decryption time, which concludes that to enhance the cloud data security some addon techniques are to be used along with these cryptographic algorithms. To increase the security level and to increase the transmission speed of plaintext, integrated method will be proposed by encoding the plaintext to intermediate plaintext and then intermediate plaintext will be compressed using any one of the compression techniques to increase the compression ratio, lastly the compressed file is encrypted to further enhance the security level.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
Cloud computing is a very growing field in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
Privacy protection domain-user integra tag deduplication in cloud data serverIJECEIAES
The cloud with strong storage management has recently developed in the big data world which can confirm the data integrity and keep just a single data duplicate. Many cloud auditing storage techniques have been developed to overcome the data deduplication (DD) problem, but they are vulnerable and can't resist brute force attacks (BFA). There is some privacy leakage problem that occurred in the present method. In this article, an original strategy called domain-user integra tag (DUIT) has been presented which comprises inter and intra deduplication with file tag and symmetric encryption key. The DUIT has two phases, the first one is random tag generation for Intra deduplication and the other is random ciphertext (CT) generation for encryption. The benefit of the DUIT is the security of individual user’s files would not reveal to people in general, hence we proved that the DUIT is protected from the BFA. Finally, an experiment has conducted in Linux processor and C program software. The outcome of DUIT demonstrates that our method has reduced the computation cost (CC) by 27% and 35% and searching complexity (SC) by 10% and 26% related with the previous methods. It is decided that the DUIT achieves the low CC and SC.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Similar to Data Partitioning In Cloud Storage Using DESD Crypto Technique (20)
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Data Partitioning In Cloud Storage Using DESD Crypto Technique
1. Data Partitioning In Cloud Storage Using
DESD Crypto Technique
B.Muthulakshmi1*
, M.Venkatesulu2
1*
Department of Computer Applications, Kalasalingam University, Krishnankoil, Tamil Nadu, India.
2
Department of Information Technology, Kalasalingam University, Krishnankoil, Tamil Nadu, India.
*Corresponding Author: selvamayil2010@gmail.com
Abstract
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Key words: Cloud computing, cloud service
provider, DESD crypto technique, Invertible Non-
linear Function, AES and Triple DES.
1. Introduction
In recent years, this fast growing innovative
technology offers users with several paperless
services which are available online, for example, e-
banking, e-billing, e-mail, e-shopping and e-
transaction etc. These paperless services need data
exchange through online. This data might be any
personal or sensitive information such as credit or
debit card details, business secrete information,
banking transactions and so on. These kinds of
information need more security as disclosure of such
personal data to any illegitimate user can produce
extremely hazardous consequences. There is a high
necessity for user’s security while exchanging their
personal information through un trusted networks.
Thus, it is necessary to develop a security mechanism
for converting user’s personal or sensitive
information to some other unreadable format. While
sending such information it is essential to build it
harder for intruders to collect some observed
information. Cryptography is one of the techniques to
achieve it.
In cloud computing ,user’s data (i.e. data owner) is
stored at some untrusted third party that needs
extreme protection as data owner does not possess
any physical access on the information. Data privacy
and security of user or owner are consistently a vital
issue in cloud computing (Dai Yuefa et al (2009),
Mohit Marwahe and Rajeev Bedi (2013)). There are
several advantages such as low cost and easy access
on data provided by the cloud but privacy and
security problems is of concern while storing user’s
personal and sensitive data to cloud storage (M.
Mohamed et al (2013)). Data in cloud storage might
be attacked in two manners such as inside or outside
attack (L. Arockiam and S. Monikandan (2013)). If
an attacker attempts to access the cloud data while in
transition or at rest which is not legitimized, then it is
known as outside attack. An attack from the cloud
administrator side is defined as inside attack. When
compared to the outside attack, the inside attack is
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
21 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. really hard to identify and the data owner or user
must be very careful while storing and retrieving
their personal data to or from the cloud storage.
Moreover the retrieved data by the authorized user
from the cloud should not be in actual format as there
is high possibility of outside attack. Therefore all the
data must be converted into unreadable format by
encrypting before storing it in cloud; then its actual
format is revert back by decryption. This should be
possible with the aid of cryptography.
Cryptography is classified into two techniques
namely “code making” and “code breaking”. The
code making involves to covert a message or data
into other incomprehensible/unreadable format to
secure it from any malicious activity of malicious
users whereas the code breaking provides the solution
known as cryptanalysis (Chris Christensen (2006)).
The major objective of cryptography is preventing
intruders from obtaining the actual data and permits
only legitimate users to obtain the correct information
without any modification. Utilization of
cryptographic strategies guarantees the user’s
personal information remains secure from any
changes and illegitimate users. These illegitimate
users cannot break encrypted code of original
information while legitimate users only have the
authority to revert back the translated information
into actual format (Sinkov A (1996)). The entire
process of conversion of original data and reversing
back the exact data is called as encryption and
decryption respectively.
This paper proposed a novel Double Encryption with
Single Decryption (DESD) crypto technique to
protect cloud data. Data of large volume is split into
number of small fragments by data partitioning
process. Then each partition is subjected to
encryption and here double encryption is done. The
first encryption is accomplished with prime numbers.
For that the prime numbers are generated randomly
and the number of generated prime numbers equal to
twice the number of partitioned data when the data
owner wants to produce four encrypted forms. Based
on the interest of data owner he/she can produce 8 or
16 or 32 encrypted forms for a single data part. Then
complements of all primes are computed. So each
partition is encrypted with a prime and its
complement. After the first encryption a large integer
is generated and is divided into number of small
integers which is equal to the number of data
partitions. Each small integer is added with each
encrypted data. Each resultant cipher is then
subjected to another encryption using invertible non-
linear function (INF) which has two random integers.
The second encryption is achieved by multiplying
each data partition with the first integer and added
with the second integer. At user end a single
decryption is enough to decrypt the data and the key
is subtracted to retrieve original data where the key is
a large integer value. An important thing is that the
data user must have the knowledge of the inverse
invertible non-linear function for decryption.
The rest of the paper is organized as follows: Section
2 presents the related works on cryptographic
techniques and section 3 presents the problem
definition. In section 4, the proposed method is
presented in detail. Section 5 deals with the
experimental results and in section 6 the paper is
concluded with scope for future work.
2. Related work
V.Masthanamma, G.Lakshmi Preya (2015) examine
about the usage of cryptography schemes, to enhance
the security of encrypted data that is sent by the cloud
users to cloud server. The fundamental goal is to
perform encryption and decryption of data in a
secured way with consumption of very less time and
low cost for both encoding and decoding process.
Various amounts of keys are produced and repeated
attacks are observed. Thus by repeating the strategy it
assists the data to remain safe against the attacks to
extend the security of decoded data that is sent by the
cloud users to cloud server.
H.Y. Lin and W.G. Tzeng (2012) presented a
threshold proxy re-encryption scheme in which data
security is accomplished using decentralized erasure
code. This makes the system stronger and privacy
issues of cloud service provider (CSP) are solved.
Here the data is stored in a cloud storage server in
encrypted format and when a user requests the data,
the data holder sends the re-encryption key to the
server that again encrypt the same data for requested
user. The authors consider that the cloud storage
comprises of storage and key servers where in
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
22 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. storage server the data storing operation are
performed. In order to decrypt the encoded and
encrypted data with n codeword symbols, each key
server has to independently perform partial
decryption alone.
Pancholi et al (2016) have presented the method of
using diverse parts by the ciphers and its converse for
all purposes eliminates the keys in AES that is the
drawback of DES. In AES, the likelihood of
proportionate keys is taken out for nonlinearity of the
key extension for all purposes. For several
microcontrollers an implementation correlation
among AES, DES and Triple DES exhibits that AES
and Triple DES require a PC expense of the same
request. Another execution evaluation reveals that
AES has great status over estimations 3DES, DES
and RC2 to the extent of execution time with
different package size and throughput for encoding
and furthermore decoding. Similarly changing data
order, for instance, image instead of content, it has
been discovered that AES possess a benefit over
Blowfish, RC2 and RC6 with respect to time usage.
K. Nasrin, et. al. (2014) dealt with cloud storage
framework which is the most important research area
in cloud computing in which security is considered as
one of the vital concerns. The authors combined the
asymmetric and symmetric key approaches utilizing
AES and RSA algorithms and derived a novel
mechanism. AES is useful for key sharing and less
overhead cryptographic technique and complex
phenomena is created by RSA to provide security
from attackers. The main attention of the attackers
was on demonstrating secure data communication
from defenseless or vulnerable networks.
Jayant, D. et al. (2015) presented a novel mechanism
called role base access control by applying AES and
RSA algorithm for providing a secure
communication environment for open cloud
environments. The authors used RSA and AES
algorithms for the purpose of encryption and
decryption where access control is achieved using
RBAC mechanism. According to the model of RBAC
the uploading rights and several rights to several
users were given.
In this paper, a novel DESD crypto technique is
proposed to provide privacy and security for
confidential and sensitive data stored in cloud server.
It requires less computation time with low cost. It
also provides better protection against intruders and
malicious activities with faster operations.
3. Objective and issues
The main objective of this paper is to design an
efficient cryptographic technique which is simple and
consumes less time to perform encryption and
decryption operations on data stored in cloud. The
encrypted data should require limited space for
storage. Some of the following privacy and security
issues are rectified.
Access control: Failure of CSP may happen
at some situation on cloud environment that
leads the chances of intruders and malicious
activities.
Lack of user control: In cloud user data is
stored at some remote location and its
complete control is taken by CSP i.e. the
user has no control on its data.
Control policy: The CSP may have self-
interest on user’s data at some network
conditions. Thus it is necessary to
implement security mechanism for CSP to
provide control policy in the cloud
environment.
4. Proposed Methodology
4.1. System Model
The proposed system model comprises of
four entities such as data owner, cloud
service provider (CSP), cloud storage and
data user. Figure 1 illustrates the system
model of the proposed work and its flow of
operation is also explained.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
23 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. Figure 1: Proposed system model
The operation of data owner is to collect data in any
form like image, text, audio and video which will
then be building a document index which is
partitioned into several numbers of small fragments.
Each fragment is encrypted multiple times and
outsourced to the cloud storage. The cloud service
provider (CSP) is responsible to allocate available
space for outsourced data at different storage location
of a single cloud or different clouds. The CSP has the
complete control on the cloud storage i.e. once the
data is stored in the cloud its complete control is
taken by the CSP. Here ‘N’ number of clouds is taken
to store the user’s data. In cloud storage, the ciphers
are stored in allocated storage space. If the data user
wants to access data in cloud he/she must be verified
by the CSP to verify his/her authorization. If he/she is
an authorized user then it allows sending data access
request to the data owner. The data owner responds
the request by sending authentication certificate with
a decryption key. By verifying the gathered
authentication certificate the CSP command the
storage to provide data. Finally the decryption is done
by the collected key from the data owner.
4.2. Detailed contribution
The detailed contribution of the proposed work is
explained through the block diagram demonstrated in
Figure 2. This block diagram comprises of three
major blocks such as data owner, CSP and data user.
Each of its operations is explained below in a detailed
manner.
Figure 2: Block diagram
The data owner comprises the data in the form of
plaintext which is large size. So it is partitioned into
multiple small fragments. There are several
advantages in data partitioning such as: 1) Processing
of large volume of data makes the operation complex.
2) Uploading and downloading of these small
fragments requires relatively very less time. 3) These
are very easy to access. Then each partitioned
fragment is encrypted with prime numbers and its
complements for multiple times. With the help of
Inverse Non-linear Function (INF) second encryption
is accomplished which produces ciphers with
unreadable format. These are outsourced to the
different locations at same cloud storage and different
Data Owner
Create partitioning of data &
Encrypt using Double-encrypt
Cloud Service Provider
(CSP)
Assign available space for
each cipher
Cloud Storage
Store the given ciphers in
different locations
End Users
Perform Decryption using
obtained key
1. Send Encrypted data
2. Store Encrypted data in
cloud
3. Send Data Access Request
4. Provide key & Certificate
5. Send Access Request &
Certificate
6. Command to provide
Encrypted data
Cloud Storage
M
Plaintext
Data partitioning
First encryption
with primes and
complements
Second encryption
with INF
Cloud 1
Cloud 2
Cloud 3
Cloud N
Merge all
encrypted data
Perform inverse
INF
Subtract the
obtained Key
Plaintext
Data Owner Cloud Service Provider Data User
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
24 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. cloud storage. For that the CSP has to process these
data to allocate available space for storage. After all
verification process the CSP command the cloud to
provide the data stored at different locations. The
data user merges all the collected encrypted data and
performs inverse INF. Finally to get the plaintext the
key is subtracted from the previous results.
Symbol Description
iX Plaintext
i Number of split or partitioned data
ni ,,2,1 L=
NP Number of generated primes
ii QP, Set of prime numbers
c
i
c
i QP , Prime complements
p Bit of the prime. Here 32=p
iD Random Integer
nd Number of split of random integer
if Generated ciphers
iS Sum of encrypted form
4.3. Encryption
The large volume of data is to be stored in the
cloud effectively. So the large volume of data is
partitioned into number of small partitions or
fragments at the first step of encryption. Here
double encryption algorithm is proposed to encrypt
each partition. The first encryption is done with the
prime numbers and its complements. The pseudo
plaintexts or cipher texts are obtained by the
second encryption with Invertible Non-linear
Function (INF) and its general form is given
as,
baxxg +=)(
where a and b are integers and y denotes
cipher texts obtained through the first
encryption. Each cipher part is multiplied with
a and then added with b. These ciphers are
stored at different locations of a single cloud
or multiple clouds.
a. Double Encryption Algorithm
Input : iX
Method:
i. Random partitioning
},,{ 321 ni xxxxX L=
ii. Generate NP and iN XP 2=
iii. Take ii QP,
iv. Compute c
i
c
i QP ,
]2[ 1
i
pc
i KK −= +
Q
v. Generate iD and split it into
small integers
ni dddD ,,, 21 L=
vi. nn xd = (Here, we take 4=n )
vii. First encrypted data
111 )**( dQPxy +=
212 )**( dQPxy c
+=
313 )**( dQPxy c
+=
414 )**( dQPxy cc
+=
viii. Second encrypted with INF
bayyg += 11)(
bayyg += 22 )(
bayyg += 33 )(
bayyg += 44 )(
ix. Apply the above steps on each
data part (up to nx ) and store the
obtained multiple ciphers in
different locations of a single
cloud storage or different cloud
storages.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
25 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Partitioning
First data
part
Encrypt
with primes
QP*
Encrypt
with prime
&
Complement
c
QP*
Encrypt
with
Complement
& prime
QPc
*
Encrypt
with primes
QP*
Add 1d Add 2d Add 3d Add 4d
First encrypted data
111 )**( dQPxy +=
Second Encrypted
with INF
bayyg += 11)(
Second Encrypted
with INF
bayyg += 22 )(
Second Encrypted
with INF
bayyg += 33 )(
Second Encrypted
with INF
bayyg += 44 )(
Cloud A Cloud B Cloud C Cloud D
First encrypted data
212 )**( dQPxy c
+=
First encrypted data
313 )**( dQPxy c
+=
First encrypted data
414 )**( dQPxy cc
+=
Plaintext
)( iX
Data
Parts
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
26 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. Figure 3: Flow diagram of encryption
algorithm
4.4. Decryption
In most of the cryptographic techniques,
decryption keys are included in the encrypted
data stored in cloud storage. But in our proposed
crypto technique the data owner has the
decryption keys which are given to the
requesting authorized data users by the data
owner with an authentication certificate. After
verifying this certificate the CSP command the
storage to provide cipher text or encrypted data.
With the knowledge of inverse INF and using
decryption key the user decrypt the encrypted
data. The general form of inverse INF is as
follows,
a
bx
xg
−
=−
)(1
where a and b are integers and x is the cipher
text.
a. Decryption Algorithm
Step 1: Apply inverse form of INF
a
by
ygG i
ii
−
== −
)(1
Step 2: Add all first encrypted ciphers
4321 ffffSi +++= ∑
Step 3: Subtract large integer
iii DSZ −= ( iZ with padded zeros )
Step 3: Delete the padded zeros
Step 4: Perform the above steps on all the four
encrypted data parts(up to nx ) and sum all of
them.
∑=
=
n
i
ii xR
1
Step 4: Convert into byte array
Step 5: Merge all Byte arrays
Step 6: Get original plaintext )( iX
Figure 4: Flow diagram of decryption
algorithm
5. Performance Analysis
In this section, the performance of the proposed
DESD crypto technique is analyzed and
compared with existing techniques in a detailed
manner. As we know that the privacy and
security are the most important concerns in
cloud computing. All existing cryptographic
techniques tried to provide privacy and security
to the cloud storage at its level best. There are
thousands of cryptographic techniques proposed
previously and we cannot take all of them for
comparison. So we take two standard
Cloud A
ygf == 11 )(
Cloud B
ygf == 22 )(
Cloud C
ygf == 33 )(
Cloud D
ygf == 44 )(
Apply
ygG ii = −
)(1
Perform
∑=
=
n
i
ii xR
1
Convert into byte
array
Merge all Byte
arraysPlain Text )( iX
Data Merge
43
21
ff
ffSi
++
+= ∑
Subtract large
integer
iii DSZ −=
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
27 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. cryptographic techniques among them for
comparison such as AES and Triple DES.
Consider a situation that an intruder gathers data
from cloud by breaking protection mechanism of
CSP. We compare the performance of existing
and proposed techniques at this situation.
First we take existing AES and Triple DES
techniques which provide complete control on
data to CSP. So the intruder can easily break the
gathered encrypted files since they are encrypted
with decryption keys. Moreover the existing
techniques cannot give cent percentage privacy
assurance where the data encryption is done by
the CSP. If the CSP is self-interested on its data
it can misuse the data without knowing the data
owner.
In our proposed technique, the data owner has
the complete control on data by keeping the
decryption key with him/her and they store
encrypted file only at the cloud storage. Without
the knowledge of inverse INF and decryption
key the intruder cannot decrypt the file and
retrieve the data. Therefore it provides complete
access control on user data. The self-interest of
CSP on data comes under the control policy
which is the most significant issue in cloud
environment. Here the only task of CSP is to
allocate storage space for data and it never
involves in data partitioning and encryption.
Thus this self-interest cannot affect the cloud
data. From this we can summarize that the
proposed DESD crypto technique is much
secure and provide better privacy to cloud users.
6. Result and Discussion
The experiment is conducted using Intel(R)
Core(TM)2 Duo CPU processor with 4 GB
RAM and on Windows 7 platform. The
experiment was implemented using Java
programming. In order to prove the efficiency of
the proposed crypto technique it is compared
with some other existing cryptographic
techniques. The proposed DESD technique is
compared with AES and Triple DES techniques.
In our implementation we employed same size
of input files and examined the performance of
all three techniques. Here the encryption time
and decryption time is compared against file
size.
Figure 5: File size (MB) vs. Encryption Time (sec)
In Figure 5, the encryption time of each file size
is plotted for AES, Triple DES and proposed
DESD technique. Generally the complex
operations required more time to process the
data. But the operations of both encryption
techniques in our proposed crypto technique are
simple and easy to process the data. So the time
to encrypt different file size is reduced when
compared to other techniques. From the graph it
is clearly shows that the proposed DESD
technique possesses less encryption time than
AES and Triple DES.
0
10
20
30
40
50
60
70
2 5 8 10 12 20
EncryptionTime(sec)
File Size (MB)
AES
Triple DES
Proposed DESD
Technique
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
28 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. Figure 6: File size (MB) vs. Decryption Time (sec)
Figure 6 demonstrates the comparison plot of file size
(MB) and decryption time (sec) for proposed and
existing techniques. This uses the same file size that
of encryption. The time required to decrypt the
encrypted data is known as decryption time. As we
mentioned above the proposed technique is simple
i.e. it required simple mathematical operations to
encrypt data files. From that we can know that the
decryption is also a simple process. Moreover a
single decryption is enough to decrypt the encrypted
data which is encrypted for a couple of time. Thus the
decryption requires very less time. From figure 6, it
can be observed that the proposed decryption requires
very less time compared to AES and Triple DES
techniques.
From the above two comparisons it is proved that our
proposed DESD technique is efficient and faster by
its simple operation and it is much secure because it
never enclose the decryption key with the encrypted
data. Also the data user has to possess knowledge on
inverse INF and he/she must communicate to the data
owner to get the decryption key. Hence the data is
protected against intruders, unauthorized users and
self-interest of CSP.
7. Conclusion
Data privacy and security are considered as the most
important issues in cloud data storage. Though cloud
can provide easy and flexible data storage, but there
are possibilities for intruders and malicious activities.
In cloud, the stored data may be confidential which
requires more security concerns. In this paper, we
proposed a novel Double Encryption with Single
Decryption (DESD) crypto technique for secure data
storage in cloud. Data partitioning is done to make
the storage easy and effective which also provides
flexible data access with less storage cost. Then
double encryption is performed on each partitioned
data which includes two encryptions namely
encryption with prime numbers, as well as its
complements and then with an INF encryption. Using
the proposed decryption algorithm the obtained data
can be decrypted by the user. The major benefit of
this proposed technique is, the encryption is done by
the data owner and the encrypted data is only stored
at the cloud storage with the help of CSP. The
authorized users have knowledge on inverse INF
which is another important factor for decryption.
Thus the intruders and third parties aren’t able to
retrieve and misuse the cloud data without knowledge
on inverse INF and decryption key. In experimental
section the proposed technique is compared with
AES and Triple DES techniques. The performance
analysis is done using some parameters such
encryption time and decryption time against file size.
From the Figure 5 & 6, it is clearly observed that our
proposed crypto technique is efficient and faster in
terms of reduced encryption and decryption time
compared to other techniques. In future the proposed
DESD crypto technique will be used to encrypt video
files.
References
[1] Dai Yuefa, Wu Bo, et al. "Data security model for cloud
computing."Proceedings of the 2009 International Workshop on
Information Security and Application (IWISA 2009) Qingdao,
China. 2009., pp 141-144.
[2] Mohit Marwahe, Rajeev Bedi, “Applying Encryption
Algorithm for Data Security and Privacy in Cloud Computing”,
International Journal of Computer Science Issues. Vol 10, Issue 1,
January 2013, pp. 367-370
[3] Eman M.Mohamed, Hatem S.Abdelkar and Sherif El-Etriby,
“Data Security Model for Cloud Computing”, the twelfth
International Conference on Networks, 2013, pp. 66-74
[4] L. Arockiam, S. Monikandan “Data Security and Privacy in
Cloud Storage using Hybrid Symmetirc Encryption Algorithm”,
International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 2, Issue 8, August 2013, pp
3064-3070.
[5] http://www.nku.edu (Fall 2006 Chris Christensen)
0
10
20
30
40
50
60
70
2 5 8 10 12 20
DecryptionTime(sec)
File Size (MB)
AES
Triple
Propo
Techn
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
29 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
10. [6] Sinkov A., “Elementary Cryptanalysis – A Mathematical
Approach”, Mathematical Association of America, 1996.
[7] V. Masthanamma, G. Lakshmi Preya,” An Efficient Data
Security in Cloud Computing Using the RSA Encryption Process
Algorithm”, International Journal of Innovative Research in
Science, Engineering and Technology,Vol.4,pp.1441- 1445,2015.
[8] Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng,
Member, IEEE"A Secure Erasure Code Based Cloud Storage
System With Secure Data Forwarding” IEEE Transactions On
Parallel And Distributed Systems, Vol. 23, No. 6, June 2012.
[9] Pancholi, Vishal R., and Bhadresh P. Patel. "Enhancement of
Cloud Computing Security with Secure Data Storage using AES."
International Journal for Innovative Research in Science and
Technology 2.9 (2016):18-21.
[10] Nasrin Khanezaei, Zurina Mohd Hanapi “A Framework Based
on RSA and AES Encryption Algorithms for Cloud Computing
Services” IEEE Conference on Systems, Process and Control
(ICSPC 2014), 12 - 14 December 2014, Kuala Lumpur, Malaysia.
[11] Bokefode Jayant D, Ubale Swapnaja A, Pingale Subhash V,
Karande Kailash J., Apate Sulabha S., “Developing Secure Cloud
Storage System by Applying AES and RSA Cryptography
Algorithms with Role based Access Control Model” International
Journal of Computer Applications (0975 – 8887) Volume 118–
No.12, May 2015.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
30 https://sites.google.com/site/ijcsis/
ISSN 1947-5500