Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing
Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing
Growth of cloud computing is mainly hampered due In all types of computing systems and environments,
to these security concerns and challenges. Prope
Proper it is matter of great concern that the data and
security arrangements are need to be placed before applications remain secure and unauthorized access
selecting the service provider for any cloud must be prevented to stop unwanted use of
computing service and customers need to be very information but in cloud computing specific measures
careful about understanding the risks of security need to be taken and implemented to ensure data
breaches and challenges of using this new computing integrity, security, authentication and authorization. In
environment. comparison to the traditional computing environment,
data, applications, resources and processes remain at
The methodology implements on Cloud Sim 3.0.1 some unknown remotely located position in a cloud
toolbox, which is configure in Net Beans 8.1. The computing
puting environment. In cloud computing
outcome demonstrates that it gives improved environment if any breach of data occurs then both
execution contrasted with supplementary predictable the service provider and user are responsible and both
security algorithm. Crypto operation time, key are responsible to make cloud secure. In cloud
operation time
ime and total execution are reduced by computing mechanism of data storage, retrieval,
2.72%, 7.91% and 4.63% significantly. security, process,
s, application etc are to be kept hidden
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 1511
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
3. Methodology 4. Results And Analysis
CP-IBE used to facilitate key management and We used Java for implementing a working prototype
cryptographic access control in an expressive and of CPIBE. The .Net cryptographic packages were
efficient way. An attribute descriptive string assigned used for the involved cryptographic operations. Large
to a user and each user may be tagged with multiple prime numbers were handled by using the cloud based
attributes under the construction of CP-IBE. Multiple cryptography classes. Policies were uploaded as a
users may share common attribute which allow separate file to the cloud and the KM.
sensors to specify a data access policy by composing
multiple attribute through logical operators such as Table 1: Analysis of Key Establishment Time
“AND”, “OR”. (In sec)
File Upload Download
The Algorithm of proposed methodology CPIBE Size DaSCE[ CPIBE DaSCE[ CPIBE
(Cryptographic Policy with Instance Based (in 6] (Propose 6] (Propose
Encryption) is as follows: kb) d) d)
1. Setup: Defines the universal attribute set (U), 0.01 0.1 0.074 0.97 0.068
computes the public key (PK) and master key 1 0.098 0.068 0.99 0.072
(MK). 10 0.09 0.062 0.97 0.071
2. Encryption (PK, M, A): Takes input the public 100 0.15 0.84 0.95 0.78
key PK, message M and an access structure. A 1000 0.23 0.095 0.99 0.063
built over the universal attribute set U. Gives as 1000 0.28 0.098 0.98 0.059
output the cipher text CT. Only users having a set 0
of attributes corresponding to the access structure
A can decrypt the cipher text (CT).
3. Key Generation (MK, S): Takes as input a master
key MK and the user set of attributes S and
generates the user’s secret key SK.
4. Decryption (PK, CT, SK): Takes as input the
public key PK, cipher text CT and a secret key
SK. It returns a message M that is plain text of
CT.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 1512
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Table 2: Analysis of Crypto Operation Time
(In sec)
File Upload Download
Size Da CPIBE CPIBE
Da SCE
(in SCE (Propos (Propos
[6]
kb) [6] -ed) -ed)
0.01 0.059 0.035 0.062 0.057
1 0.076 0.041 0.068 0.061
10 0.083 0.078 0.073 0.069
100 0.092 0.081 0.075 0.063 Figure 6: Comparison of Key Transmission Time
1000 0.14 0.094 0.187 0.096 (in sec.) in between of DaSCE[6] and CPIBE
10000 0.29 0.14 0.548 0.18 (Proposed) (upload case)
Figure 4: Comparison of Crypto Operation Time Figure 7: Comparison of Key Transmission Time
(in sec.) in between of DaSCE[6] and CPIBE (in sec.) in between of DaSCE[6] and CPIBE
(Proposed) (upload case) (Proposed) (download case
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 1513
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
secret sharing mechanism. We modelled and analyzed
FADE. The analysis highlighted some issues in key
management of FADE. CPIBE improved key
management and authentication processes. The
performance of the CPIBE was evaluated based on the
time consumption during file upload and download.
The results revealed that the CPIBE protocol can be
practically used for clouds for security of outsourced
Figure 9: Comparison of File Transmission Time data. The fact that the CPIBE does not require any
(in sec.) in between of DaSCE[6] and CPIBE protocol and implementation level changes at the
(Proposed) (download case) cloud makes it highly practical methodology for
cloud.
5. Conclusions and Future Work
The main goal of this work was to analyze and In future, the CPIBE methodology can be extended to
evaluate the security techniques for data protection in secure group shared data and secure data forwarding.
the cloud computing. For that purpose we analyzed Cloud computing can become the frontrunner for a
and evaluated the most important security techniques secure, flexible, scalable, cost effective, virtual and
for data protection that are already accepted from the user friendly tool for information technology enabled
cloud computing providers. We classified them in services.
four sections according to the security mechanisms
that they provide: authentication, confidentiality, We recommended important security measures
access control and authorization. relating to data protection in the cloud that must be
taken into account. We also proposed a lot of issues
So, we successfully answered on the key questions in that should be considered in order to have improved
the cloud technology, or simply said should cloud data security in the cloud computing, like proper
computing be trusted in data protection. We can usage of administrative privileges, wireless access
conclude that if all recommended measures are taken control of the data in systems that use wireless
into account providing authentication, confidentiality, networks, data recovery and boundary defence in the
access control and authorization, then the cloud cloud.
computing can be trusted in data protection.
6. References
We also focused on the security issues that should be 1. P. Ravi Kumar, P. Herbert Raj, P. Jelciana,
taken into account in depth in order to have proper “Exploring Data Security Issues and Solutions in
data security in the cloud. We recommended Cloud Computing”, 6th International Conference
important security measures relating to data protection on Smart Computing and Communications,
in the cloud that must be taken into account. We also ICSCC 2017, Kurukshetra, India.
proposed a lot of issues that should be considered in 2. Prof. (Dr.) Pradeep Kumar Sharma, Prof. (Dr.)
order to have improved data security in the cloud Prem Shankar Kaushik, Prerna Agarwal, “Issues
computing, like proper usage of administrative And Challenges of Data Security In A Cloud
privileges, wireless access control of the data in Computing Environment”, IEEE Conference on
systems that use wireless networks, data recovery and Cloud Computing, 2017.
boundary defence in the cloud.
3. DIAO Zhe, WANG Qinghong, SU Naizheng and
We proposed the CPIBE protocol, a cloud storage ZHANG Yuhan “Study on Data Security Policy
security system that provided key management, Based On Cloud Storage”, IEEE 3rd International
access control, and file assured deletion. Assured Conference on Big Data Security on Cloud, 2017.
deletion was based on policies associated with the 4. WANG Qinghong, SU Naizheng, “High
data file uploaded to cloud. On revocation of policies, performance and security in cloud computing”,
access keys are deleted by the KMs that result in Wiley Journal of Cloud Computing, 2017.
halting of the access to the data. There-fore, the files
were logically deleted from the cloud. The key 5. Shazia Tabassam, “Security and Privacy Issues in
management was accomplished using (k, n) threshold Cloud Computing Environment”, Journal of
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 1514
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Information Technology & Software Engineering, 11. Dr. K.B.Priya Iyer, Manisha R, Subhashree
2017. R,Vedhavalli K, “Analysis of Data Security in
6. Mazhar Ali, Saif U. R. Malik, Samee U. Khan, Cloud Computing”, International Conference on
“DaSCE: Data Security for Cloud Environment Advances in Electrical, Electronics, Information,
with Semi-Trusted Third Party”, IEEE Communication and Bio-Informatics, 2016.
Transactions on Cloud Computing, 2017. 12. Ahmed Albugmi, Madini O. Alassafi, Robert
7. Manpreet Kaur, Kiranbir Kaur, “A Comparative Walters, Gary Wills, “Data Security in Cloud
Review on Data Security Challenges in Cloud Computing”, 5th International Conference on
Future Generation Communication Technology,
Computing”, International Research Journal of
Engineering and Technology (IRJET) Volume: 2016.
03, Issue: 01, Jan-2016. 13. Selvamani K, Jayanthi S, “A Review on Cloud
Data Security and its Mitigation Techniques”,
8. B. Hari Krishna, Dr.S. Kiran, G. Murali, R.
International Conference on Intelligent
Pradeep Kumar Reddy, “Security Issues In
Computing, Communication & Convergence,
Service Model Of Cloud Computing
2015.
Environment”, 2016 International Conference on
Computational Science. 14. R. Velumadhava Rao, K. Selvamani, “Data
Security Challenges and Its Solutions in Cloud
9. Naresh vurukonda, B.Thirumala Rao, “A Study
Computing”, International Conference on
on Data Storage Security Issues in Cloud
Intelligent Computing, Communication &
Computing”, 2nd International Conference on
Convergence, 2015.
Intelligent Computing, Communication &
Convergence. 15. Yunchuan Sun, Junsheng Zhang, Yongping Xiong
and Guangyu Zhu, “Data Security and Privacy in
10. Kire Jakimoski, “Security Techniques for Data
Cloud Computing”, International Journal of
Protection in Cloud Computing”, International
Distributed Sensor Networks, Volume 2014.
Journal of Grid and Distributed Computing Vol. 9,
No. 1 (2016).
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 1515