0% found this document useful (0 votes)
18 views

Data Security in Cloud System

The document discusses data security issues in cloud systems and proposes an encryption method to securely store data in the cloud. It first describes existing encryption algorithms like DES and Base64 encoding. It then proposes a new encryption method that applies Base64 encoding, DES encryption, and another round of Base64 encoding to files before storing them on the cloud to enhance security.

Uploaded by

Editor IJRITCC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Data Security in Cloud System

The document discusses data security issues in cloud systems and proposes an encryption method to securely store data in the cloud. It first describes existing encryption algorithms like DES and Base64 encoding. It then proposes a new encryption method that applies Base64 encoding, DES encryption, and another round of Base64 encoding to files before storing them on the cloud to enhance security.

Uploaded by

Editor IJRITCC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 5 Issue: 4 115 118


_______________________________________________________________________________________________

Data Security in Cloud System

Aishwarya Rajendran. Renuka Ramesh Teli Potdar Parag Kishor


Department of Computer, Indira Department of Computer, Indira Department of Computer, Indira
College of Engineering and College of Engineering and College of Engineering and
Management, Pune, India. Management, Pune, India. Management, Pune, India.
[email protected] [email protected] [email protected]

Abstract--Cloud stores the major data around the universe and is one of the most developing technologies today. To protect the data stored on
such cloud is one major challenge faced now days. To overcome these data security challenges, an efficient data encryption to encrypt sensitive
data before sending to the cloud server has been proposed. This addresses the block level data encryption using symmetric key with rotation.
Besides, data users can re-construct the requested data from cloud server using shared secret key. The analysis of the privacy protection of
outsourced data using experiment is carried out on the repository for all kinds of files with variable size. The security and performance analysis
shows that the proposed method is highly efficient than existing methods performance.

Keywords-Data Block, Security, Encryption, Decryption, Cloud Server.

________________________________________________****____________________________________________________

I. INTRODUCTION rounds. The key schedule of DES is used to derive a


sequence of 48-bit sub-keys k1, . . . , k16 from the 56-bit
The advancement of internet has drastically
master key. Each sub-key (ki) is being a permuted subset of
increased in the 21th century. Communication application,
48 bits of the master key.
electronic mail or the World Wide Web are more popularly
used but these are not completely secure for sending and
1. Plaintext encryption process
receiving information. Information sent by these means may
The original 64-bit plain text is converted with the initial
contain volatile or sensitive personal data which can be
permutation (IP), encrypts in 16 rounds, followed by the
intercepted. Therefore encryption of data in the modern
inverse of the initial permutation (IP-1). In each round, the
technology becomes necessary to ensure that data sent
right-side 32 bits of the block are transformed with the
should be read and understood by people for whom the
function labeled (f) and a sub-key, then exclusive-OR
information is intended.
(XOR) with the left side 32 bits. After each round, the two
Data security is the major concern in the field of
sides of the data block are swapped and the algorithm
computer science and information technology. Particularly
continues.
in the cloud computing as the data is stored all over the wold
at different places. Data security and privacy protection are
2. Key generation
the two major concern of users in cloud technology. Though
For each DES round, a sub-key of 48 bits has to be
many techniques and topics are implemented on both
generated. The input key is also 64 bit, but 8 bits are used
academics and industries, data security and privacy
for parity checking. After an initial key permutation (CP-1)
protection are becoming more important for future cloud
the 16 sub-keys, one for each round, are derived from the
development.
56-bit key selected for encryption. One sub-key is obtained
Data security issues are relevant to both hardware
after left shifting, and after a 56 to 48 bit permutation, (CP-
and software in cloud architecture. Services of
2).
cloudcomputing are provided across entire computing
spectrum. A number of data protection and data security
B. Base64 Algorithm- Base64 Encoding is mainly used
techniques are proposed in the research field of cloud
when there is necessity to encode binary data as ASCII text
computing.
that needs to be stored or transferred in environments that,
perhaps for legacy reasons, are restricted to US-ASCII data.
II. EXISTING ENCRYPTION ALGORITHM-
Base64 is commonly used for sending e-mail via MIME
A.DES-The DES block cipher is a 16-round Feistel network (Multipurpose Internet Mail Extensions) however the
with a block length of 64 bits and a key length of 56 bits. mainpurpose is not to send secure email but to achieve the
The same round function (F) is used in each of the 16 effect of fail to understand the contents directly. Base 64
115
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 115 118
_______________________________________________________________________________________________
data representation is based on a 64-character alphabet. The
alphabet is shown in Table 1.
Value Characters
025 AZ
2651 az
5261 09 Fig.1 Base64 Encoding.
62 + Every encryption technique has its own strong and weak
points. In order to apply a suitable technique we must know
63 / its strength and weakness. Therefore the analysis of the
Padding = techniques are very necessary.
Table 1. Base64 Alphabet.
III. PROPOSED ENCRYPTION ALGORITHM

Step 1: The Digital file which is uploaded is converted into


text format i.e. the binary numbers are converted into string
format.

Step 2: The string format obtained by the Base64 encoding


is implemented with DES algorithm. Here the DES double
encrypts the file.

Step 3: The file obtained is again triple encrypted with the


help of Base64 algorithm and is stored on the cloud system.

Fig 2. System Architecture.

Step 4: A secret key is generated in order to open the


encrypted file that is stored on the cloud.

Table 2: Base64 Character Set. Step 5: The secret key is shared to the user via email. This
key will be used to decrypt the encrypted file.
In computer systems, a byte is a unit of data that is
composed of eight bits. Base64 algorithm takes three bytes, Step 6: The file selected will be decrypted in the original
each consisting of eight bits, and converts them into four form using the key.
bytes composed of six bits each. According to the value of
each byte (after converting into four bytes), obtain the IV. SYSTEM MODEL
character from Table 1 based on the value. The padding 1. The binary format of the file is split into 4 bytes of
character = is also used at the end of encoded text if the blocks.
total number of bits (or number of characters in the plaintext) 2. It is then combined to full 32 bit stream.
are not multiple of 3. If the total number of bits in text are 3. This stream is then converted to 6 bit values.
3n+1, the encoder puts one = at the end of encoded text, 4. If padding is requires then zeroes are added to the
and if the total number of bits in text are 3n+2, it puts two binary stream.
= at the end of output. 5. These 6 bit binary values are converted into
decimal values.
6. This values are then converted into Base64
characters.

116
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 115 118
_______________________________________________________________________________________________
V. OBJECTIVES

Data Security for outsourcing and accessing data from


cloud servers, our proposed security model achieve the
following objectives.

1. Lightweight and easy to use architecture for


verification of authorised cloud user and access the
cloud data.
2. Design binary level data encryption of the file.
3. Design an efficient data encryption before
outsourcing to cloud and decryption at the user side.

VI. EXPERIMENTAL RESULTS

The experiments are carried out on a repository of text files,


audio files and video files of different size. For testing Fig 4: Data Encryption and Decryption time comparison for
purpose the binary format of the file is extracted which is Audio file.
then encoded by mapping values. The algorithm is
implemented in JAVA. The NetBeans IDE and Windows From Fig 4. Time taken for encryption of the Audio file is
OS forms the complete execution environment. more than compared to the other files as the size of the file
is in Mbs. The decryption time required is comparatively
less than its encryption.

Fig 3: Data Encryption and Decryption time comparison for


Text file.
Fig 5: Data Encryption and Decryption time comparison for
From Fig 3. Time taken for encryption of the text file is less Text file.
than compared to the other files as the size of the file is less.
The decryption time required is comparatively less than its From Fig 5. Time taken for encryption of the text file is less
encryption. than compared to the other files as the size of the file is less.
The decryption time required is comparatively less than its
encryption.

117
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 115 118
_______________________________________________________________________________________________
[2] Jing-Jang Hwang, Taoyuan, Taiwan,Yi-Chang Hsu,
ChienHsing Wu, ABusiness Model for Cloud Computing
Based on a Separate Encryption and Decryption Service,
in International Conference on Information Science and
Applications(ICISA), pages 1-7,2011.
[3] Jing-Jang Hwang, Kun-Kai Chang, Securing the Cloud:
Cloud ComputingSecurity Techniques and Tactics,
Elsevier Inc., USA, 2011.
[4] Fatemi Moghaddam F,Karimi O,Alrashdan M T, A
Comparative Studyof Applying Real-Time Encryption in
Cloud Computing Environments, in IEEE 2nd
International Conference on Cloud Networking, pages
185-189, 2013.
[5] Lan Zhou, Varadharajan V, Hitchens M, Integrating
Trust with CryptographicRole-Based Access Control for
Secure Cloud Data Storage Trust, in 12thIEEE
International Conference on Security and Privacy in
Computing and Communications(Trust Com), pages
Fig 6: Data Encryption and Decryption time comparison for
560-569, 2013.
Audio file. [6] Shaify Kansal, Minaksha Mittal, Performance Evaluation
of various SymmetricEncryption Algorithm, Central
From Fig 6. Time taken for encryption of the Audio file is University of Punjab, Batinda India.
more than compared to the other files as the size of the file [7] Naik Riddhi, Nikunj Gamit,An Efficient Algorithm for
is in Mbs. The decryption time required is comparatively Dynamic Key Generationfor Image Encryption,Uka
less than its encryption. Tarsadia University,Bardoli,Surat,Gujrat.
[8] N.Jayapandian,Dr.A.M.J.Md.Zubair Rahman,S.Radhika
Devi,M.Koushikaa,EnhancedCloud Security to Confirm
The overall time complexity of the process depends upon
Data Security on Asymmetric and Symmetric Key
the size of the file. Smaller file size are processed early
Encryption,Knowledge Institute of
while the greater file size requires more time to encrypt and Technology,Salem,Tamil Nadu.
decrypt. [9] http://aspe.hhs.gov/admnsimp/pIl0419I.html
104th United States Congress, Health Insurance
VII. CONCLUSION AND FUTURE SCOPE Portability and Accountability Act of 1996.
[10] Tim Mather, Subra Kumaraswamy, and Shahed Latif,
Encryption is not a new technology.Previously encrypted Cloud Securityand Privacy, Published by 0 Reilly Media,
data was stored on server which was located in a place Inc., 2009.
where the company had direct control.Today many popular [11] http://security.setecs.com, Security Architecture for
business applications hosted in cloud need to depend on Cloud ComputingEnvironments, White paper, 20 II .
contract language to protect their valuable data,selecting a [12] Junzuo Lai, Deng R H, Chaowen Guan, Jian Weng,
cloud provider that will allow the customerto encrypt data Attribute-BasedEncryption With Verifiable Outsourced
Decryption, in IEEE Transactions on Information
before it is stored on cloud with software as a service(Saas)
Forensics and Security, vol. 8(8), pages 1343-1354, 2013.
that will manage the encryption and decryption of the
[13] Qin Liu, Tan CC, Jie Wu, Guojun Wang, Reliable
corporate data.In cloud computing,wehave proposed an ReEncryption inUnreliable Clouds, in IEEE International
efficient data encryption and decryption algorithm to protect Conference on Global
the sensitive data in cloud environment. Also to reduce the Telecommunications(GLOBECOM), pages 1-5,20 II.
burden,a trusted third party is invented for verification of [14] Miwen, Rongxinglu, Kuanz hang, Jing Shenglei,
authorised user to access the data on cloud. On the other Xiaohuiliang andXueminshen, PaRQ:A Privacy-
hand,we also demonstrate for bit leveloperations on data for Preserving Range Query Scheme Over
insertion,deletion and updation of data which we consider as EncryptedMetering Data for Smart Grid, in IEEE
International Journal of Computer Networks,pages 178-
an improvement for our future work.
191,2013.

REFERENCE
[1] Prakash G L, Dr. Manish Pratik, Dr. Inder Singh, Data
Encryption and DecryptionAlgorithm using key Rotation
for Data Security in Cloud System. University of
Petroleum and Energy Studies, Dehradun.

118
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________

You might also like