This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
Cloud computing is one the promising and emerging field in Information Technology because of its performance, low cost and great availability. Cloud computing basically gives services to an individual and the organization through the network with the capability to scale down or up their different kinds of services. The basic service of cloud computing system is known as a cloud storage system which containing a collection of storage servers. These storage servers gives long-term storage services by using the internet with free of cost. However, the storing data using cloud system of third party causes very serious problem over data confidentiality. Typically, different kinds of encryption schemes are used to protect the cloud data confidentiality, but it take more time to process even a single operation. Thus, in this paper proposes cloud data confidentiality by integrates encoding, encrypting and forwarding. Token Based Data Security Algorithm (TBDSA) along with RSA and AES is used for decryption and encryption process and Role Based Access Control Model (RBACM) is access at the time of data forwarding. Here, cloud user’s accessing password is created by using encoding process which is done by Genetic Algorithm (GA) and process of GA is presented in this paper. This
TBDSA and GA algorithms takes minimum time to execute and raises the system performance.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
Cloud computing is one the promising and emerging field in Information Technology because of its performance, low cost and great availability. Cloud computing basically gives services to an individual and the organization through the network with the capability to scale down or up their different kinds of services. The basic service of cloud computing system is known as a cloud storage system which containing a collection of storage servers. These storage servers gives long-term storage services by using the internet with free of cost. However, the storing data using cloud system of third party causes very serious problem over data confidentiality. Typically, different kinds of encryption schemes are used to protect the cloud data confidentiality, but it take more time to process even a single operation. Thus, in this paper proposes cloud data confidentiality by integrates encoding, encrypting and forwarding. Token Based Data Security Algorithm (TBDSA) along with RSA and AES is used for decryption and encryption process and Role Based Access Control Model (RBACM) is access at the time of data forwarding. Here, cloud user’s accessing password is created by using encoding process which is done by Genetic Algorithm (GA) and process of GA is presented in this paper. This
TBDSA and GA algorithms takes minimum time to execute and raises the system performance.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
Cloud computing is an innovative idea for IT industries which provides several services to
users. In cloud computing secure authentication and data integrity of data is a major challenge, due to
internal and external threats. For improvement in data security over cloud, various techniques are
used.MAC based authentication is one of them, which suffers from undesirable systematic demerits
which have bounded usage and not secure verification, which may pose additional online load to users,
in a public auditing setting. Reliable and secure auditing are also challenging in cloud. In Cloud auditing
existing audit systems are based on aggregate key HLA algorithm. This algorithm is based on variable
sizes, different aggregate key generation, which encounters with security issues at decryption level.
Current Scheme generates a high length of key decryption that encounters with problem of space
complexity. To overcome these issues, We can improve HLA algorithm by improve aggregate key
generation, based on fixed key size. This algorithm generates constant aggregate key which will
overcomes problem of sharing of keys, security issues and space complexity.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
Cloud computing has developed progressively prevalent for data owners to outsource their data to public cloud servers
while consenting data users to reclaim this data. For isolation disquiets, a secure rifle over encrypted cloud data has stirred numerous
research mechanisms underneath the particular owner model. Conversely, most cloud servers in practice do not just assist one owner,
as an alternative, their sustenance gives multiple owners to share the assistances carried by cloud computing. In this proficient and
confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, new schemes to deal with Privacy preserving
Ranked Multi-keyword Search in a Multi-owner model (PRMSM) has been introduced. To facilitate cloud servers to execute secure
search without knowing the actual data of both keywords and trapdoors, we thoroughly build a novel secure search protocol. To rank
the search results and domain the privacy of relevance scores amongst keywords and files. To thwart the assailants from snooping
secret keys and fantasizing to be legal data users submitting pursuits, a novel dynamic secret key generation protocol and a new data
user authentication protocol is discussed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
This is a common fact nowadays to use the external third party resources for data storage and
sharing among multiple personnel of the same organization or different organizations. Such external
resources are collectively known as Cloud Computing resources. Cloud Computing resources save
time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of
using cloud services in many organizations or individuals, there are many concerns resulted. The
major concerns are data sharing, security and efficiency. Since from last 15 years, there are number
of solutions and researches were conducted and applied. Data sharing both single user and multi-user
in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent
cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are
designed for secure data sharing among multiple users. All the recent methods have some limitations
and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security
and their comparative analysis first. At we discussed the research limitations of those methods.
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
Accordin to easily manage cloud computing, flexibility and powerful resources on space, provide great potential for
improving cost efficiency. Cloud computin capabilities through the efficient use of shared hardware resources increases. Properties
mentioned above, incentive agencies and other users of their programs and sevices in this space with a series with a series of threats
and risks are also met.
This ensures higher accuracy virtualization and cloud infrastrure components of the virtual machines is. In this regard, particularly for
initial design thesis developed a new model called cloud protectionsystem, it is suggested and shown that the proposed model, can
increase supply security in the cloud. And packets received by sources and do not be discarded. How to test this architecture, in terms
of effectiveness and efficiency in the fight against offensive attacks mentioned above, partly expressed and tools for simulating and
measuring the efficiency of the system may be useful, recommended.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Group chain is a scalable public blockchain of two-chain structure. Built on the principle of reducing consensus size to achieve high transaction efficiency. Employs the leader group with a small size to collectively commit blocks. Group chain reduce transaction confirmation latency. Achieves a throughput of over 800 TPS with a small leader group size. Performance is close to 600 TPS even in a ledger group size is 100.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
Cloud computing is an innovative idea for IT industries which provides several services to
users. In cloud computing secure authentication and data integrity of data is a major challenge, due to
internal and external threats. For improvement in data security over cloud, various techniques are
used.MAC based authentication is one of them, which suffers from undesirable systematic demerits
which have bounded usage and not secure verification, which may pose additional online load to users,
in a public auditing setting. Reliable and secure auditing are also challenging in cloud. In Cloud auditing
existing audit systems are based on aggregate key HLA algorithm. This algorithm is based on variable
sizes, different aggregate key generation, which encounters with security issues at decryption level.
Current Scheme generates a high length of key decryption that encounters with problem of space
complexity. To overcome these issues, We can improve HLA algorithm by improve aggregate key
generation, based on fixed key size. This algorithm generates constant aggregate key which will
overcomes problem of sharing of keys, security issues and space complexity.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
Cloud computing has developed progressively prevalent for data owners to outsource their data to public cloud servers
while consenting data users to reclaim this data. For isolation disquiets, a secure rifle over encrypted cloud data has stirred numerous
research mechanisms underneath the particular owner model. Conversely, most cloud servers in practice do not just assist one owner,
as an alternative, their sustenance gives multiple owners to share the assistances carried by cloud computing. In this proficient and
confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, new schemes to deal with Privacy preserving
Ranked Multi-keyword Search in a Multi-owner model (PRMSM) has been introduced. To facilitate cloud servers to execute secure
search without knowing the actual data of both keywords and trapdoors, we thoroughly build a novel secure search protocol. To rank
the search results and domain the privacy of relevance scores amongst keywords and files. To thwart the assailants from snooping
secret keys and fantasizing to be legal data users submitting pursuits, a novel dynamic secret key generation protocol and a new data
user authentication protocol is discussed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
This is a common fact nowadays to use the external third party resources for data storage and
sharing among multiple personnel of the same organization or different organizations. Such external
resources are collectively known as Cloud Computing resources. Cloud Computing resources save
time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of
using cloud services in many organizations or individuals, there are many concerns resulted. The
major concerns are data sharing, security and efficiency. Since from last 15 years, there are number
of solutions and researches were conducted and applied. Data sharing both single user and multi-user
in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent
cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are
designed for secure data sharing among multiple users. All the recent methods have some limitations
and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security
and their comparative analysis first. At we discussed the research limitations of those methods.
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
Accordin to easily manage cloud computing, flexibility and powerful resources on space, provide great potential for
improving cost efficiency. Cloud computin capabilities through the efficient use of shared hardware resources increases. Properties
mentioned above, incentive agencies and other users of their programs and sevices in this space with a series with a series of threats
and risks are also met.
This ensures higher accuracy virtualization and cloud infrastrure components of the virtual machines is. In this regard, particularly for
initial design thesis developed a new model called cloud protectionsystem, it is suggested and shown that the proposed model, can
increase supply security in the cloud. And packets received by sources and do not be discarded. How to test this architecture, in terms
of effectiveness and efficiency in the fight against offensive attacks mentioned above, partly expressed and tools for simulating and
measuring the efficiency of the system may be useful, recommended.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Group chain is a scalable public blockchain of two-chain structure. Built on the principle of reducing consensus size to achieve high transaction efficiency. Employs the leader group with a small size to collectively commit blocks. Group chain reduce transaction confirmation latency. Achieves a throughput of over 800 TPS with a small leader group size. Performance is close to 600 TPS even in a ledger group size is 100.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Threat Modeling of Cloud based Implementation of Homomorphic Encryptionijcisjournal
Outsourcing of data storage and data processing to cloud-based service providers promises several advantages such as reduced maintenance overhead, elastic performance, high availability, and security. Cloud services offer a variety of functionalities for performing different operations on the data. However, during the processing of data in cloud, security and privacy may be compromised because of inadequate cryptographic implementation. Conventional encryption methods guarantee security during transport (data-in-transit) and storage (data-at-rest), but cannot prevent data leak during an operation on the data (data-in-use). Modern homomorphic encryption methods promise to solve this problem by applying different operations on encrypted data without knowing or deciphering the data. Cloud-based implementation of homomorphic cryptography has
seen significant development in the recent past. However, data security, even with implemented homomorphic cryptography, is still dependant on the users and the application owners. This exposes the risk of introducing new attack surfaces. In this paper, we introduce a novel and one of the early attempts to model such new attack surfaces on the implementation of homomorphic encryption and map them to STRIDE threat model [1] which is proliferously used in the industry.
ISSN 2395-650X
IJLBPS provides an inclusive environment for researchers to share original research, reviews, case studies, and technical notes across a broad spectrum of life sciences, biotechnology, and pharmaceutical sciences.
Homomorphic encryption algorithms and schemes for secure computations in the ...MajedahAlkharji
This article provides:
1. A detailed survey of homomorphic encryption (HE) using public key algorithms such as RSA, El-Gamal, and Paillier algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE as researchers believe in the possibility of advancement in the FHE area.
7/13/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=ed81c06e-b4f4-426c-9cee-f04b1533665… 1/6
%34
%9
%3
%3
SafeAssign Originality Report
Summer 2019 - Application Security (ISOL-534-50) (ISOL-534-51) - Co… • Week 4 -Annotated Bibliography
%50Total Score: High riskNaresh Rama
Submission UUID: 83163885-57ee-26aa-181e-67ee890ed175
Total Number of Reports
1
Highest Match
50 %
AnnotatedBibliography.docx
Average Match
50 %
Submitted on
05/31/19
04:46 PM CDT
Average Word Count
2,482
Highest: AnnotatedBibliography.docx
%50Attachment 1
Global database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Institutional database (4)
Student paper Student paper Student paper
Student paper
Scholarly journals & publications (1)
ProQuest document
Internet (2)
journals archives-ouvertes
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 2,482
AnnotatedBibliography.docx
4 1 12
7 10 5
3 13 2
9
8
6 11
4 Student paper 1 Student paper 12 Student paper
Running head: DATA SECURITY AND CLOUD COMPUTING
DATA SECURITY AND CLOUD COMPUTING
DATA SECURITY AND CLOUD COMPUTING
Naresh Rama
University of the Cumberland’s
Chang, V., & Ramachandran, M. (2015). Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services
Computing, 9(1), 138-151. The author of the article describes the various ways through which we can achieve cloud computing and adoption substructure, the author
of the article describes real-time data security for big units of data which is among the most essential for cloud computing. Cloud computing and Data security are
essential because it can be achieved throughan approach which is well-structured, adoptable and systematic. The author says that CCAF is usually demonstrated by
the design of the system which is usually based on the implementation and requirements and illustrated by the CCAF securitywhich has several layers. The targeted
audience of the author is the organizations which rely cloud computing for the purposes of storing information. Almorsy, M., Grundy, J., & Müller, I. (2016). An
1
2 3
4
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=ed81c06e-b4f4-426c-9cee-f04b15336656&course_id=_109656_1&download=true&includeDeleted=true&print=true&force=true
7/13/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=ed81c06e-b4f4-426c-9cee-f04b1533665… 2/6
analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Almorsy alludes that cloud computing is among the latest computational patterns
which provides an innovative business model for entities so that they can adopt Information Technology without upfront expenditure. Notwithstanding the probable
gains which are obtaine.
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined
Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Exploring Cloud Encryption
1. CLOUD ENCRYPTION METHODOLOGY 1
Exploring the Cloud Encryption: The Past and the Future
Samuel A. Borthwick
CIT 516000: Database Security and Auditing
Dr. Xiao Luo
November 18, 2020
2. CLOUD ENCRYPTION METHODOLOGY 2
Abstract
Cloud computing is becoming increasingly more common as a way for organizations to
work due to virtualization. Securing data over cloud is still a barrier many parties face when
deciding whether to adopt cloud. Encryption is a major component of security when working
with cloud databases. This research analysis will go over the various encryption methods and
summarize the previous research in encryption that has been done to this point. The advantages
of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency.
As encryption becomes more advanced, so the need for proper key management increases as
well. This paper will conclude with a look at what could be the future of cloud encryption,
Homomorphic Encryption.
Exploring the Cloud Encryption: The Past and the Future
The emergence of Cloud computing has changed the way businesses have set up their IT
infrastructure. Salesforce’s article, 12 Benefits of Cloud Computing, references a study done by
the International Data Group that states “69% of businesses are already using cloud technology
in one capacity or another, and 18% say they plan to implement cloud-computing solutions at
some point” (12 Benefits of Cloud Computing, 2020). The benefits of using cloud computing are
tremendous and companies are starting to realize how vital it will be for their future. Cloud
computing, like that of web-based email, allows users to access all their files and applications
without having to keep the physical data on their own computers. The flexibility to not have an
established network infrastructure is not just a huge cost savings to companies, but it also serves
as a way for a much faster implementation by leasing Cloud data storage.
With the increased convenience of accessing data, comes an increased risk in security
threats as well as complex cloud-specific threats that may be unrecognizable to conventional
database administrators. If a business’s data can be accessed by its employees at any location, it
is reasonable to predict that cybercriminals will likely attempt to take advantage of this
increasingly popular system. The implications of a data leak from any company could have
devastating consequences. The CEO and President of IBM, Ginni Rometty, stated that
cybercrime, “Is the greatest threat to every profession, every industry, every company in the
world” (Rometty, 2015). A key role in cloud security is the encryption and decryption of data in
the cloud. This paper will provide a review of current cloud encryption research, analyze the
various encryption methods that apply to cloud computing, and go over best practices.
Literature Review
A View About Cloud Data Security from Data Life Cycle
This publication by Xiaojun Yu and Qiaoyan Wen details how data security has become
the central problem of cloud computing (Yu, 2010). The authors make the argument that that
3. CLOUD ENCRYPTION METHODOLOGY 3
cloud data security should be solved from the data life cycle. The data life cycle model they refer
to, as shown in Figure 1, includes 5 stages: create, store, Use and share, archive, and destruct.
Figure 1. Data Life Cycle Model
Internal threats are most likely to com from cloud service providers and users of the clous where
external threats can come anywhere (Yu, 2010). As soon as data is generated, that is when risks
are present. The adversary could do several things from data tampering to editing the access
controls. Stored data presents the most risks, as this is when the data is the most vulnerable.
Information has the potential to leak while creating a backup. Sharing data further poses a risk
due to the means of transmitting the data. The archive stage is often safer due to the data not
being used temporarily, but until data is completely destroyed in the destruct phase, threats still
pose a risk.
Yu’s premise is based off taking the following five steps when initiating the general data
security process (Yu, 2010):
1. The user classifies data with sensitivity level as it is created.
2. The user then stored data into the cloud via contact with a cloud sever. The client should
encrypt the data before sending it to the cloud server proxy or build a secure link in
which the data is stored to the cloud.
3. Data that is not actively being used is archived.
4. When transmitting data, the cloud server proxy gives proof of data integrity to the client.
If integrity of data is intact, key management is then initiated to start the transmission of
data
5. When the data is no longer needed, the client sends a data destroy request to the cloud
proxy who will then initiate the process of destroying data, followed by sending back
proof to the client. This step to include key management between the client and cloud
proxy, so that vital information is not deleted from internal or external threats.
Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud
Rishav Chatterjee is his research article, Cryptography in Cloud Computing: A Basic
Approach to Ensure Security in Cloud, gives an overview of the benefits of cloud computing that
make it so attractive to companies. Cloud computing requires no underlying infrastructure and
follows a user-friendly model that only requires payment for storage used (Chatterjee, 2017).
4. CLOUD ENCRYPTION METHODOLOGY 4
Furthermore, it allows for virtualization of physical resources and wide accessibility that was not
previously obtainable. According to Chatterjee, there are two unique groups of models:
deployment models and service models. The deployment model consists of Private cloud, Public
cloud, and a hybrid of both. Service models on the other hand consist of Iaas, Saas, and Paas.
While the benefits of cloud are overwhelming, privacy and security remain a concern.
Different types of service models under cloud computing offer different levels of security
services. Iaas (Infrastructure as a Service) offers the minimum security, while Saas offers the
highest level of security. This paper looks at the various algorithms in encryption including
Symmetric, Asymmetric, and Hashing. and encryption techniques. Brief summaries of
encryption techniques are provided for Advanced Encryption Standard, Blowfish Algorithm,
Data Encryption Standard, and RSA Cryptosystem. The research article ends with discussing the
most prominent problems facing cloud computing such as data theft, data integrity, loss of data,
and location of data.
Homomorphic Encryption for Data Security in Cloud Computing
Traditional standard encryption methods provide security during data storage and data
transmission (Chauthan, 2015). Encryption for data in the processing state has not been possible
without first decryption. This poses a great security risk for cloud computing and has since been
a barrier to organizations considering the transfer to cloud. The reason this is a concern is
because data confidentiality must be forfeited for any operations (totals, averages, standard
deviations) to be performed on the data. The author of this research paper, Kamal Chauhan,
argues that the solution to this problem would be to perform operations on data that is currently
encrypted on the cloud server. This type of encryption is referred to as Homomorphic
Encryption.
The homomorphic encryption technique allows the user to operate ciphertext directly.
The user can decrypt the results of the cipher and see that it matches the same as if operations
were carried out in plaintext. While this has the potential to change cloud security for the better,
it still is developing and currently carries several obstacles. It is very inefficient in the amount of
time it takes to complete operations. Furthermore, the amount of operations that can be done are
very limited. More computing power is needed for this encryption to be rolled out on a massive
scale.
Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm
Dr. Arockiam notes in this research paper, that while cloud computing is transformative
in its ability to store massive amounts of data and centralize data warehouses, it does leave room
for opportunistic cyber thieves (Arockiam, 2013). Many research problems are yet to be
identified, giving leverage to criminal behavior as the rush to both harm and defend cloud
databases intensifies. Dr. Arockiam identifies Symmetric encryption as best suited for handling
large volumes of data efficiently in cloud storage. This paper also proposes an algorithm
improving on classical encryption techniques by integrating substitution cipher and transposition
cipher. Dr. Arockiam describes the algorithm:
5. CLOUD ENCRYPTION METHODOLOGY 5
“In the proposed algorithm, initially the plain text is converted into corresponding ASCII
code value of each alphabet. In classical encryption technique, the key value ranges between 1 to
26 or key may be string (combination alphabets). But in proposed algorithm, key value range
between 1 to 256. This algorithm is used to encrypt the data of the user in the clouds. Since the
user has no control over the data after his session is logged out, the encryption key acts as the
primary authentication for the user” (Arockiam, 2013).
Data Security and Privacy Protection Issues in Cloud Computing
This paper by Deyan Chen provides an overview of some of the challenges in security
facing cloud computing as well as current solutions. According to a survey from IDCI in 2009,
74% IT managers and CIOs believed that the primary challenge that hinders them from using
cloud computing services is cloud computing security issues (Chen, 2012). Choosing the right
vendor can sometimes be challenging, as different vendors offer different levels of security and
understanding the differences can be difficult to comprehend. Figure 2 shows a visual of cloud
computing security architecture.
Figure 2. Cloud Computing Security Architecture
Key management, as Chen points out turns into a major issue. Not every company has the
infrastructure to manage massive amounts of keys with the type of protocols that advanced
encryption requires. Ultimately Chen believes a fully homomorphic encryption scheme, like that
developed by IBM, would solve the majority of problems facing cloud security by allowing data
to remain encrypted while being processed.
Encryption Methodologies
This section outlines the two main types of encryption classifications, symmetric and
asymmetric, and gets into specific encryption techniques. A breakdown of homomorphic
encryption will be given and an analysis on its future implications. Due to the importance of key
management, best practices will be discussed in this section as well.
6. CLOUD ENCRYPTION METHODOLOGY 6
Symmetric Encryption
Symmetric encryption (see Figure 3) involves the use of one single key for both
encryption and decryption (Arockiam, 2013).
Figure 3. Symmetric Encryption
For example, a source would produce a message in plaintext. The encrypt, a key is the generated
at the message source and provided to the destination through a secure channel for decryption.
Because Symmetric Encryption only requires one key and is the more simplistic form of
encryption, it is much faster method than asymmetric, and is almost exclusively used to transmit
data in bulk. It requires much less computational power than asymmetric and because of this, is
much more cost-efficient.
DES. The Data Encryption Standard (DES) is a block cipher developed in 1977 by the
National Institute of Standards (Chatterjee, 2017). At the encryption site, DES takes 64-bit
plaintext and creates 64-bit cipher text. During decryption, 64-bit cipher text is created back to
64-bit plaintext, so both the cipher and plaintext stay at 64-bit throughout the entire process. The
key however is a 56-bit cipher key used for both encryption and decryption. Encryption takes
place in two permutations, initial and final permutation. There are sixteen different rounds
throughout encryption and each round uses a different sort of 48-bit key which is generated from
the cipher key based on a predefined algorithm. See Figure 5.
7. CLOUD ENCRYPTION METHODOLOGY 7
Figure 4. DES Architecture
AES. Advanced Encryption Standard (AES) is a symmetric key algorithm. Each of the
ciphers has a 128-bit block size with key sizes of 128, 192, and 256 bits (Chatterjee, 2017). See
Figure 5.
Figure 5. AES Architecture
With AES, rows are shifted in a transposition step where each row is shifted a certain number of
steps. Columns are mixed, combining the four bytes in each column. The key that is generated
follows the shifts in the rows and mixed columns to generate a key that is used for both
encryption and decryption, as it is symmetric. The National Institute of Standards developed
AES in 1997 for the U.S. government (Rouse, 2020).
AES VS DES. AES was developed largely to replace DES in securing classified
information for the US government.
The time required to crack an encryption algorithm is directly related to the length of the key
used to secure the communication (Rouse, 2020).
8. CLOUD ENCRYPTION METHODOLOGY 8
AES has much larger key sizes—128-bit, 192-bit, and 256-bit, making it much stronger than the
56-bit key of DES.
Asymmetric Encryption
In Asymmetric Encryption, different keys are used for encryption and decryption. Each
of the receivers have their own key for decryption, known as their private key. Receivers share a
key for encryption, known as the public key. Due to this two-key architecture, Asymmetric has a
much higher level of security. Common applications for Asymmetric Encryption include
blockchain, text communication, and intellectual property. See Figure 6.
Figure 6. Asymmetric Encryption
RSA. The oldest and still most used asymmetric cryptosystem is RSA encryption
(Chatterjee, 2017). Considered the most secure used method of encryption, RSA involves two
keys, the private key and the public key. In the verification process, the server implements
authentication of the public key by signing a unique message known as the digital signature. The
use of a digital signature allows for further security. The key sizes for RSA are far larger (512-
bit, 1024-bit, 2048-bit, 3072-bit, and 4096-bit) than those of Symmetric methods making it far
more secure.
Homomorphic Encryption
A current limitation to cloud computing is that encryption can only be applied to data that
is in a storage state or transmission state. Homomorphic Encryption allows data to be processed
while still in an encrypted state (Chauhan, 2015). For example, plain text of 5 and 10 could be
encrypted to X and YZ. X and YZ could then be added together to form (X+YZ). No party
would ever know the value of (X+YZ) is equal to 15, because they would only be able to see the
encrypted text, X and YZ. Only until the final step of decryption, would the receiver know that
(X+YZ) =15. See Figure 7.
9. CLOUD ENCRYPTION METHODOLOGY 9
Figure 7. Homomorphic Encryption Example
Because the level of computational power required for Homomorphic Encryption is
tremendous, Homomorphic is still very young in its development and is not able to be adopted
widely. The biggest benefit Homomorphic Encryption could potentially have, is allowing parties
to share data with each other, while still protecting each party’s individual data from being
revealed. A practical application would include free elections where votes could be added up
while keeping the results of each vote private, allowing for a more secure and transparent
election process. Currently IBM and Microsoft are working to speed up the process of
Homomorphic Encryption in hopes that it can soon be deployed on a much larger scale.
Key Management Best Practices
Encryption, both Symmetric and Asymmetric, is only as reliable as the security of its
keys. Symmetric is more vulnerable since the same key is used for encryption and decryption.
Key management can be a challenge for many parties with the complexity of key protocols. Best
practices should include:
• Centralize Encryption key management systems
• Use automation to rotate keys at set intervals
• Keep strict logging and auditing of encryption key use
• Create an Encryption Key Management Policy for Employees
• Rotate Your Keys
Companies should adopt centralized, in-house key management policies. However, many
companies and organizations may not have the underlying infrastructure, so hiring a third-party
10. CLOUD ENCRYPTION METHODOLOGY 10
key management service may be required. By centralizing encryption keys, it minimizes the
number of places where keys can get exposed to attackers.
Conclusion and Future Scope
Cloud computing is emerging as a standard practice in information technology for
companies and organizations across the globe. As it becomes more common place, so will the
need to secure against current known threats and unknown threats that have yet to be determined.
Ultimately encryption is the best defense against cyber criminals attacking the cloud. The two
distinct encryption algorithms are Symmetric and Asymmetric. Symmetric is highly efficient and
is best for transmitting data in bulk, where Asymmetric offers a much higher level of security
through a public and private key. Best practices and set policies should be used when
approaching key management. Homomorphic Encryption offers a large scope possibility of
future improvement and still early in development. Finding ways to decrease the amount of
computational overhead for Homomorphic to be efficient, leaves much research for the future.
Advances in machine learning are a likely avenue for Homomorphic and need to be investigated.
11. CLOUD ENCRYPTION METHODOLOGY 11
References
Arockiam, L. (2013). Data Security and Privacy in Cloud Storage using Hybrid Symmetric
Encryption Algorithm. Retrieved November 11, 2020, from
https://www.academia.edu/6899998/Data_Security_and_Privacy_in_Cloud_Storage_using_Hybr
id_Symmetric_Encryption_Algorithm
Birch, S. (2016, August 05). IBM's CEO on hackers: "Cyber crime is the greatest threat to every
company in the world". Retrieved November 18, 2020, from https://www.ibm.com/blogs/nordic-
msp/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/
Chatterjee, R. (n.d.). (PDF) Cryptography in Cloud Computing: A Basic Approach to ...
Retrieved November 11, 2020, from
https://www.researchgate.net/publication/320755577_Cryptography_in_Cloud_Computing_A_B
asic_Approach_to_Ensure_Security_in_Cloud
D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012
International Conference on Computer Science and Electronics Engineering, Hangzhou, 2012,
pp. 647-651, doi: 10.1109/ICCSEE.2012.193.
K. K. Chauhan, A. K. S. Sanger and A. Verma, "Homomorphic Encryption for Data Security in
Cloud Computing," 2015 International Conference on Information Technology (ICIT),
Bhubaneswar, 2015, pp. 206-209, doi: 10.1109/ICIT.2015.39.
MANDEEP KAUR MANISH MAHAJAN (2013) Using encryption Algorithms to enhance the
Data Security in Cloud Computing. International Journal of Communication and Computer
Technologies, 1 (2), 130-133. doi:10.31838/ijccts/01.02.12
Rouse, M. (2020, April 17). What is AES Encryption and How Does it Work? Retrieved
November 19, 2020, from https://searchsecurity.techtarget.com/definition/Advanced-Encryption-
Standard
Singla, Jasmeet Singh, S. (2013). Cloud Data Security using Authentication and Encryption
Technique. Global Journal Of Computer Science And Technology, . Retrieved
from https://computerresearch.org/index.php/computer/article/view/201
X. Yu and Q. Wen, "A View about Cloud Data Security from Data Life Cycle," 2010
International Conference on Computational Intelligence and Software Engineering, Wuhan,
2010, pp. 1-4, doi: 10.1109/CISE.2010.5676895
Thakkar, J. (2020, November 03). 12 Enterprise Encryption Key Management Best Practices.
Retrieved November 11, 2020, from https://www.thesslstore.com/blog/12-enterprise-encryption-
key-management-best-practices/
Thakkar, J. (2020, November 03). 12 Enterprise Encryption Key Management Best Practices.
Retrieved November 11, 2020, from https://www.thesslstore.com/blog/12-enterprise-encryption-
key-management-best-practices/
12 Benefits of Cloud Computing and Its Advantages. (2020). Retrieved November 18, 2020,
from https://www.salesforce.com/products/platform/best-practices/benefits-of-cloud-computing/