Data Security in Cloud System
Data Security in Cloud System
Abstract--Cloud stores the major data around the universe and is one of the most developing technologies today. To protect the data stored on
such cloud is one major challenge faced now days. To overcome these data security challenges, an efficient data encryption to encrypt sensitive
data before sending to the cloud server has been proposed. This addresses the block level data encryption using symmetric key with rotation.
Besides, data users can re-construct the requested data from cloud server using shared secret key. The analysis of the privacy protection of
outsourced data using experiment is carried out on the repository for all kinds of files with variable size. The security and performance analysis
shows that the proposed method is highly efficient than existing methods performance.
________________________________________________****____________________________________________________
Table 2: Base64 Character Set. Step 5: The secret key is shared to the user via email. This
key will be used to decrypt the encrypted file.
In computer systems, a byte is a unit of data that is
composed of eight bits. Base64 algorithm takes three bytes, Step 6: The file selected will be decrypted in the original
each consisting of eight bits, and converts them into four form using the key.
bytes composed of six bits each. According to the value of
each byte (after converting into four bytes), obtain the IV. SYSTEM MODEL
character from Table 1 based on the value. The padding 1. The binary format of the file is split into 4 bytes of
character = is also used at the end of encoded text if the blocks.
total number of bits (or number of characters in the plaintext) 2. It is then combined to full 32 bit stream.
are not multiple of 3. If the total number of bits in text are 3. This stream is then converted to 6 bit values.
3n+1, the encoder puts one = at the end of encoded text, 4. If padding is requires then zeroes are added to the
and if the total number of bits in text are 3n+2, it puts two binary stream.
= at the end of output. 5. These 6 bit binary values are converted into
decimal values.
6. This values are then converted into Base64
characters.
116
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 115 118
_______________________________________________________________________________________________
V. OBJECTIVES
117
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 115 118
_______________________________________________________________________________________________
[2] Jing-Jang Hwang, Taoyuan, Taiwan,Yi-Chang Hsu,
ChienHsing Wu, ABusiness Model for Cloud Computing
Based on a Separate Encryption and Decryption Service,
in International Conference on Information Science and
Applications(ICISA), pages 1-7,2011.
[3] Jing-Jang Hwang, Kun-Kai Chang, Securing the Cloud:
Cloud ComputingSecurity Techniques and Tactics,
Elsevier Inc., USA, 2011.
[4] Fatemi Moghaddam F,Karimi O,Alrashdan M T, A
Comparative Studyof Applying Real-Time Encryption in
Cloud Computing Environments, in IEEE 2nd
International Conference on Cloud Networking, pages
185-189, 2013.
[5] Lan Zhou, Varadharajan V, Hitchens M, Integrating
Trust with CryptographicRole-Based Access Control for
Secure Cloud Data Storage Trust, in 12thIEEE
International Conference on Security and Privacy in
Computing and Communications(Trust Com), pages
Fig 6: Data Encryption and Decryption time comparison for
560-569, 2013.
Audio file. [6] Shaify Kansal, Minaksha Mittal, Performance Evaluation
of various SymmetricEncryption Algorithm, Central
From Fig 6. Time taken for encryption of the Audio file is University of Punjab, Batinda India.
more than compared to the other files as the size of the file [7] Naik Riddhi, Nikunj Gamit,An Efficient Algorithm for
is in Mbs. The decryption time required is comparatively Dynamic Key Generationfor Image Encryption,Uka
less than its encryption. Tarsadia University,Bardoli,Surat,Gujrat.
[8] N.Jayapandian,Dr.A.M.J.Md.Zubair Rahman,S.Radhika
Devi,M.Koushikaa,EnhancedCloud Security to Confirm
The overall time complexity of the process depends upon
Data Security on Asymmetric and Symmetric Key
the size of the file. Smaller file size are processed early
Encryption,Knowledge Institute of
while the greater file size requires more time to encrypt and Technology,Salem,Tamil Nadu.
decrypt. [9] http://aspe.hhs.gov/admnsimp/pIl0419I.html
104th United States Congress, Health Insurance
VII. CONCLUSION AND FUTURE SCOPE Portability and Accountability Act of 1996.
[10] Tim Mather, Subra Kumaraswamy, and Shahed Latif,
Encryption is not a new technology.Previously encrypted Cloud Securityand Privacy, Published by 0 Reilly Media,
data was stored on server which was located in a place Inc., 2009.
where the company had direct control.Today many popular [11] http://security.setecs.com, Security Architecture for
business applications hosted in cloud need to depend on Cloud ComputingEnvironments, White paper, 20 II .
contract language to protect their valuable data,selecting a [12] Junzuo Lai, Deng R H, Chaowen Guan, Jian Weng,
cloud provider that will allow the customerto encrypt data Attribute-BasedEncryption With Verifiable Outsourced
Decryption, in IEEE Transactions on Information
before it is stored on cloud with software as a service(Saas)
Forensics and Security, vol. 8(8), pages 1343-1354, 2013.
that will manage the encryption and decryption of the
[13] Qin Liu, Tan CC, Jie Wu, Guojun Wang, Reliable
corporate data.In cloud computing,wehave proposed an ReEncryption inUnreliable Clouds, in IEEE International
efficient data encryption and decryption algorithm to protect Conference on Global
the sensitive data in cloud environment. Also to reduce the Telecommunications(GLOBECOM), pages 1-5,20 II.
burden,a trusted third party is invented for verification of [14] Miwen, Rongxinglu, Kuanz hang, Jing Shenglei,
authorised user to access the data on cloud. On the other Xiaohuiliang andXueminshen, PaRQ:A Privacy-
hand,we also demonstrate for bit leveloperations on data for Preserving Range Query Scheme Over
insertion,deletion and updation of data which we consider as EncryptedMetering Data for Smart Grid, in IEEE
International Journal of Computer Networks,pages 178-
an improvement for our future work.
191,2013.
REFERENCE
[1] Prakash G L, Dr. Manish Pratik, Dr. Inder Singh, Data
Encryption and DecryptionAlgorithm using key Rotation
for Data Security in Cloud System. University of
Petroleum and Energy Studies, Dehradun.
118
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________