IJTIR Article 201403009
IJTIR Article 201403009
IJTIR Article 201403009
A Survey of
Cryptographic based
Security Algorithms for
Cloud Computing
Mayank Patwaland Tanushri Mittal
mayank.patwal@gmail.com
Abstract
loud computing is the outsourcing of IT communications by the
use of the Internet and maintaining own hardware and software
environment. Cloud computing facilitates computing assets on
demand by the use of a service provider. It is there whenever you
need it, as much as you need, and you pay as you go and only for what
you use. Security is a prim concern in the use of cloud computing.
In this paper, we have presented a survey of cryptographic based
security algorithms for cloud computing.
Keywords
Cloud Computing, Security Issues, Cryptography, Security Algorithms.
M.Tech Student, Department of Computer Science & Engineering, Graphic Era University,
Dehradun, India
Introduction
Cloud computing is the outsourcing of IT communications by the use of the
Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets (processor compute time and data storage)
on demand by the use of a service provider. Comparisons of cloud services are
made by their nature and utilize services such as gas or electricity. It is there
whenever you need it, as much as you need, and you pay as you go and only for
what you use.
Now a days Security of data has become a big distress. High levels of data repositioning have off-putting implications for data security and data shield as well
as data availability. Thus the main worry regarding security of data residing in
the Cloud is: how to make sure the security of data which is at rest. Although,
consumers know the dimensions and location of web data high in no data
mobility, you can find questions associated with its security and confidentiality
of the USB ports. To be sure the Cloud Computing area happens to be larger
to its broad network access and flexibility. But reliability regarding a secure
and secure environment to the personal data and info on the user is still required.
NIST definition of cloud computing Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
Cloud computing is a form of information technology which is being used
where lesser investment in efficient software is needed. Cloud computing consists of Access to applications and services is enabled over the network and it
also require only access to internet connection. Possibly one can get access of
the cloud with the use of an ordinary client simply anywhere and any-time and
one needs a certain information facility, without any special software. Cloud
computing also facilitates the clients for immediate access to pre-set common
but valuable information resources (as access to the network, hardware, storage
capacities, software, and special information services) that are eagerly available
without a wide agreement making process.
Here we also can describe cloud computing by four fundamental characteristics, three service models and four deployment models.
Page 2 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 3 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 4 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 5 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 6 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 7 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Literature Survey
Rahul Bhatnagar et al. (2013) in Security in Cloud Computing [16] have
proposed an analysis of technical component and some research in threats for
cloud computing Users and threats for cloud service provider then provide
many security topics related for cloud security standardization(i.e. Storage
Security, Data and Privacy Protection, Virtualization Security, Security Architecture/Model and Framework, Security Management and Audit Technology).
Page 8 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 9 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 10 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 11 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
Page 12 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
DES Algorithm
Data Encryption Standard (DES) also known as as the Data Encryption Algorithm. DES algorithm provides improvement over the RSA algorithm. The
speeds of DES encryption can be several M per second, It can be well suited
for encrypted numerous message. RSA algorithm will be based upon the issue
of factoring, and it is computing velocity is slower than DES,RSA algorithm is
merely well suited for encrypting a tiny bit of data, The RSA encrypt the data
essentially 117 bytes of once.
DES is really a block cipher. It encrypts the data in block height and width
of 64 bits each. Thats 64 bits are plain text goes as the input to DES, which
produces 64 items of cipher text. Same key and algorithm can be used as
encryption and decryption.DES uses 56 bit key but initial key is made up of 64
bits. Key is 56 items of 8, 16,24,32,40,48,56,64 are discarded (these bits may
be used for parity checking to make certain the true secret doesnt contain any
errors).Two fundamental features of cryptography Diffusion (Substitution) and
Confusion (Permutation) rounds. In each round key and data bits are shifted,
permuted, XORed and sent through, 8 round 64 bit plain-text is handed to
initial permutation (IP).Then IP generates two halves left plain-text (LPT)and
right plain-text (RPT).Each LPT and RPT goes through 16 rounds. At the
last LPT and RPT are rejoined. Decryption is same process perform rounds in
reverse order.
AES Algorithm
AES algorithm is symmetric and parallel structure. AES is gives the implementation of the algorithm many flexibility. AES is usually compares well against
cryptanalsis attacks. AES algorithm is is useful with modern processor and
deal with smart cards. AES key block size and length size from 128 and 256
bits inside the step of 32 bits. AES necessitates that the plain text block size
has to be 182 bits and key size should be 128,192 or 256 bits.In generally two
version of AES are widely-used: 128 bit plain text block joined with 128 bit
key block and 128 bit plain text block with 256 bit key block.
Digital Signature
Cryptographic digital signatures use public key algorithms to deliver data integrity. When you sign data which has a digital signature, other people can
verify the signature, and may prove that the data descends from you and hasnt
been altered after you signed it.
Page 13 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
References
References
[1] Sanjana Dahal, Security Architecture for Cloud Computing Platform,
Master of Science Thesis Stockholm, KTH Industrial Engineering and
Management, TRITA-ICT-EX-2012:291, Sweden, 2012.
[2] Sadia Marium, Qamar Nazir, Aftab Ahmed, Saira hthasham Mirza Aamir
Mehmood, Implementation of Eap with RSA for Enhancing The Security
of Cloud Computing, International Journal of Basic and Applied Sciences,
177-183, 2012.
[3] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose
and Rajkumar Buyya, CloudSim: a toolkit for modeling and simulation
of cloud computing environments and evaluation of resource provisioning
algorithms. Wiley Online Library, DOI: 10.1002/spe.995, 2011.
[4]
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, Achieving Secure,
Scalable, and Fine-grained Data Access Control in Cloud Computing,
978-1-4244-5837-0/10,IEEE, 2010.
Page 14 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
References
Li, Enabling Public Auditability and Data Dynamics for Storage Security
in Cloud Computing, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.
[7] Farzad Sabahi, Virtualization-Level Security in Cloud Computing, Faculty
of Computer Engineering Azad University Iran,978-1-61284-486-2/11,IEEE,
2011.
[8] Nelson Gonzalez, Charles Miers, Fernando Redgolo, Tereza Carvalho,
Marcos Simplicio, Mats Naslund and Makan Pourzandi, A quantitative
analysis of current security concerns and solutions for cloud computing,
978-0-7695-4622-3/11, IEEE, 2011.
[9] Mohammed A. AlZain, Ben Soh and Eric Pardede, MCDB: Using MultiClouds to Ensure Security in Cloud Computing, 978-0-7695-4612-4/11,
IEEE, 2011.
[10] Huaglory Tianfield, Security Issues In Cloud Computing, School of Engineering and Built Environment Glasgow Caledonian University, United
Kingdom, 978-1-4673-1714-6/12, IEEE, 2012.
[11] Jen-Sheng Wang, Che-Hung Liu, Grace TR Lin, How to Manage Information Security in Cloud Computing, 978-1-4577-0653-0/11, IEEE, 2011.
[12] P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, Ensuring Data
Storage Security in Cloud Computing using Sobol Sequence, 978-1-42447674-9/10., IEEE, 2010.
[13] Mr. Prashant Rewagad, Ms.Yogita Pawar, Use of Digital Signature with
Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance
Data Security in Cloud Computing, 978-0-7695-4958-3/13, IEEE, 2013.
[14] Hamid Banirostam, Alireza Hedayati, A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure, 978-0-7695-4994-1/13,
IEEE, 2013.
[15] Mohammed A. AlZain, Ben Soh and Eric Pardede, A New Approach
Using Redundancy Technique to Improve Security in Cloud Computing,
Department of Computer Science and Computer Engineering, La Trobe
University, Bundoora 3086, Australia.
[16] Rahul Bhatnagar, Suyash Raizada, Pramod Saxena, SECURITY IN
CLOUD COMPUTING,International Journal For Technological Research
In Engineering, ISSN (Online) : 2347 4718, December - 2013.
Page 15 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
References
[17] Sanjana Sharma, Sonika Soni, Swati Sengar, Security in Cloud Computing,
National Conference on Security Issues in Network Technologies, 2012.
[18] Odunayo O. Owopetu, Private Cloud Implementation and Security, Bachelors Thesis (UAS) , School of Computing Blekinge Institute of Technology
SE - 371 79 Karlskrona Sweden, Degree Program in Information Technology,Internet Technology, 2013.
[19] Venkata Sravan Kumar, Maddineni Shivashanker Ragi, Security Techniques
for Protecting Data in Cloud Computing, Master Thesis Electrical Engineering, School of Computing Blekinge Institute of Technology SE - 371
79 Karlskrona Sweden, November 2011.
[20] Uma Somani, Kanika Lakhani, Manish Mundra, Implementing the Digital
Signature with RSA Encryption algorithm to Enhance the Data Security of cloud in cloud computing,1st International Conference on Parallel
Distributed and Grid Computing,978-1-4244-7674-9/10, IEEE, 2010.
[21] Aman Sagar, Bineet Kumar Joshi and Nishant Mathur, A Study of Distributed Denial of Service Attack in Cloud Computing (DDoS), Edition on
Cloud and Distributed Computing: Advances and Applications, Volume
2 - August 2013 of HCTL Open Science and Technology Letters (STL),
ISSN: 2321-6980, ISBN: 978-1-62840-833-1.
[22] Shakti Dhar Tiwari, Mahesh Kumar and Preeti Mishra, Cloud Computing:
Implementation of Software as a Service (SaaS) Multitenancy, Edition on
Cloud and Distributed Computing: Advances and Applications, Volume
2 - August 2013 of HCTL Open Science and Technology Letters (STL),
ISSN: 2321-6980, ISBN: 978-1-62840-833-1.
[23] Mahesh Kumar and Shakti Dhar Tiwari, Cloud Computing: Various
Aspects of Cloud Security, Edition on Cloud and Distributed Computing:
Advances and Applications, Volume 2 - August 2013 of HCTL Open Science
and Technology Letters (STL), ISSN: 2321-6980, ISBN: 978-1-62840-833-1.
[24] Aman Sagar, Sanjeev Kumar, Palladium in Cryptography: The Advancement in Data Security, HCTL Open International Journal of Technology
Innovations and Research, Volume 7, January 2014, ISSN: 2321-1814, ISBN:
978-1-62951-250-1.
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution 3.0 Unported License (http:
Page 16 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.
References
//creativecommons.org/licenses/by/3.0/).
c
2014
by the Authors. Licensed and Sponsored by HCTL Open, India.
Page 17 of 17
Mayank Patwal and Tanushri Mittal
A Survey of Cryptographic based Security Algorithms for Cloud Computing.