Literature Review
Literature Review
Literature Review
Abstract—Cloud computing is the latest technology in the Data centers etc. It is also known as Hardware as a Service
field of distributed computing. It provides various online (HaaS).
and on-demand services for data storage, network services,
platform services and etc. Many organizations are II. LITERATURE SURVEY
unenthusiastic to use cloud services due to data security
In cloud computing the major issue is to provide the security
issues as the data resides on the cloud services provider’s
servers. To address this issue, there have been several of data. In Cloud computing data security is prepared by the
approaches applied by various researchers worldwide to Authentication, Encryption & Decryption, Message
strengthen security of the stored data on cloud computing. authentication code, Hash function, and Digital signature and
The Bi-directional DNA Encryption Algorithm (BDEA) is so on. So here we discuss about some security problems and
one such data security techniques. However, the existing their solutions.
technique focuses only on the ASCII character set,
ignoring the non-English user of the cloud computing. Use of Digital Signature with Diffie Hellman Key
Thus, this proposed work focuses on enhancing the BDEA Exchange and AES Encryption Algorithm to Enhance
to use with the Unicode characters Data Security in Cloud Computing [1].
Keywords— Cloud computing, Data security issues, Bi- Mr.PrashantRewagad and Ms.YogitaPawar [1]. Here in this
Directional DNA Encryption Algorithm, DNA digital code, paper, the researcher using three way architecture protection
Socket Programming. schemes. Firstly Diffie-Hellman algorithm is used to generate
keys for key exchange step. Then digital signature is used for
authentication, thereafter AES encryption algorithm is used to
I. INTRODUCTION
encrypt or decrypt user’s data file. Diffie- Hellman key
Cloud computing has recently reached popularity and exchange algorithm is vulnerable to main in the middle
developed into a major trend in IT. We perform such a attack. The most serious limitation is the lack of the
systematic review of cloud computing and explain the authentication.
technical challenges facing in this paper. In Public cloud the
“Pay per use” model is used. In private cloud, the computing Union of RSA algorithm, Digital Signature and Kerberos
service is distributed for a single society. In Hybrid cloud, the in Cloud Security [2].
computing services is consumed both the private cloud
Mehdi Hojabri and Mona Heidari [2]. Here in this paper, the
service and public cloud service.Cloud computing has three researcher first performs the concept of Kerberos
types of services. Software as a Service (SaaS), in which authentication services. At the next step the Authenticate
customer prepared one service and run on a single cloud, then Server (AS) of Kerberos do verifies users and created the
multiple consumer can access this service as per on demand. ticket granting ticket and session key and it sent to the users.
Platform as a Service (PaaS), in which, it provides the The next step users send the ticket granting ticket and session
platform to create application and maintains the application. key to Ticket Granting Server (TGS) for getting the service.
Infrastructure as a Service (IaaS), as per term suggest to Then TGS send ticket and session key for user. In final step
provides the data storage, Network capacity, rent storage, the users send the request service to cloud service provider
for using the cloud service and also cloud service, provide
___________________________________
978-1-4673-6680-9/16/$31.00 ©2016 IEEE
2016 International Conference on Computer Communication and Informatics (ICCCI -2016), Jan. 07 – 09, 2016, Coimbatore, INDIA
service to users. After doing this step user can used the cloud • KEY COMBINATION
service provider. But for more security they performed RSA Here in this work, we are using ATGC as a key. Every bit
algorithm for encryption & decryption and then they use have 2 bits like A=00, T=01, G=10, and C=11 and by using
Digital Signature for Authentication.
ATGC, key combinations is generated and give numbering
Implementation Digital signature with RSA Encryption respectively that is given into table. From the table 2, we can
algorithm to enhance the Data security of cloud in Cloud generate 64 bit key values and adding ATGC, we can generate
Computing [3]. 72-bit key (64 bits of key combination and 8 bits of ATGC).
ATGC key is sending to the receiver side by using Diffie
Uma Somani, Kanika Lakhani, and Manish Mundra [3]. In Hellman key sharing algorithm. In this work, every time the
this paper, there are two enterprises A and B. An enterprise A key value will be randomly changed.
has some data that are public data and enterprise has public
cloud. Now B wants some secure data from A’s cloud. So Table 2: Key combination
RSA algorithm and Digital signature are used for secure
communication. In this method, enterprise A takes data from
cloud, which B wants. Now the data or document is crushed KEY
PATTERNS VALUES
COMBINATION
into little line using Hash code function that is called Message
digest. Then A encrypts the message digest within private key
AA 0101 5
the result is in the Digital signature form. Using RSA
algorithm, A will encrypt the digital signed signature with B’s
public key and B will decrypt the cipher text to plain text with AT 0011 3
his private key and A’s public key for verification of
signature. AG 0001 1
AC 0010 2
PROPOSED WORK
Previous section describes the study about the cloud TA 0110 6
computing, basics of cloud computing and security problems
occurs in cloud. Then study some papers to solve these TT 1111 15
security problems. Here in this paper, the Bi-serial DNA
encryption algorithm is performing, that providing the two TG 0111 7
level of security.
TC 1001 9
• DNA DIGITAL CODING
CA 1110 14
Binary value DNA digital coding
00 A CT 1011 11
01 T
10 G CG 0000 0
11 C
CC 1101 13
2016 International Conference on Computer Communication and Informatics (ICCCI -2016), Jan. 07 – 09, 2016, Coimbatore, INDIA
5c753065305c753061615c7530323032305c753065305c7530
61615c753062365c753065305c753061615c753062665c7530
65305c753061615c75306237
Binary value:
01011100011101010011000001100101001100000101110001
11010100110000011000010110000101011100011101010011
00000011001000110000001100100011000001011100011101
01001100000110010100110000010111000111010100110000
01100001011000010101110001110101001100000110001000
11011001011100011101010011000001100101001100000101
11000111010100110000011000010110000101011100011101
01001100000110001001100110010111000111010100110000
01100101001100000101110001110101001100000110000101
1000010101110001110101001100000110001000110111
DNA Digital coding:
TTCATCTTACAATGTTACAATTCATCTTACAATGATT
GATTTCATCTTACAAACAGACAAACAGACAATTCAT
CTTACAATGTTACAATTCATCTTACAATGATTGATTT
CATCTTACAATGAGACTGTTCATCTTACAATGTTACA
ATTCATCTTACAATGATTGATTTCATCTTACAATGAG
TGTGTTCATCTTACAATGTTACAATTCATCTTACAAT
GATTGATTTCATCTTACAATGAGACTC
Amplified Message
11111110100111110010010101111111001001011111111010
01111100100101011100110111001111111101001111100100
10100110001001001010010000100100101111111110100111
Fig 1: Encryption process
11001001010111111100100101111111101001111100100101
To understand the scenario of proposed work flow chart we 01110011011100111111111010011111001001010111000100
consider one example. In this the example plaintext is 10011111111110100111110010010101111111001001011111
આિશષand performing encryption operation. 11101001111100100101011100110111001111111110100111
11001001010111000101110111111111101001111100100101
Plaintext: 01111111001001011111111010011111001001010111001101
આિશષ 1100111111111010011111001001010111000100101001
Unicode:
B. DECRYPTION PROCESS
આશિષ
Now at receiver side, the receiver receives the amplified
ASCII: message and ATGC key for decryption.
\u0e0\u0aa\u02020\u0e0\u0aa\u0b6\u0e0\u0aa\u0bf\u0e0\u0a
a\u0b7
2016 International Conference on Computer Communication and Informatics (ICCCI -2016), Jan. 07 – 09, 2016, Coimbatore, INDIA
TTCATCTTACAATGTTACAATTCATCTTACAATGATT
GATTTCATCTTACAAACAGACAAACAGACAATTCAT
CTTACAATGTTACAATTCATCTTACAATGATTGATTT
CATCTTACAATGAGACTGTTCATCTTACAATGTTACA
ATTCATCTTACAATGATTGATTTCATCTTACAATGAG
TGTGTTCATCTTACAATGTTACAATTCATCTTACAAT
GATTGATTTCATCTTACAATGAGACTC
From the table of DNA digital coding we can generate.
01011100011101010011000001100101001100000101110001
11010100110000011000010110000101011100011101010011
00000011001000110000001100100011000001011100011101
01001100000110010100110000010111000111010100110000
01100001011000010101110001110101001100000110001000
11011001011100011101010011000001100101001100000101
11000111010100110000011000010110000101011100011101
01001100000110001001100110010111000111010100110000
01100101001100000101110001110101001100000110000101
1000010101110001110101001100000110001000110111
Hexadecimal value:
5c753065305c753061615c7530323032305c753065305c7530
61615c753062365c753065305c753061615c753062665c7530
65305c753061615c75306237
ASCII:
\u0e0\u0aa\u02020\u0e0\u0aa\u0b6\u0e0\u0aa\u0bf\u0e0\u0a
a\u0b7
Unicode:
આશિષ
Plaintext:
આિશષ
Fig.5:Decryption Process
REFERENCES
[1] PrashantRewagad, YogitaPawar, “Use of Digital Signature with Diffie-
Hellman Key Exchange and AES Encryption Algorithm to Enhance
Data Security in Cloud Computing” 2013 International Conference on
Communication System and Network Technologies (IEEE Computer
Society).
[2] Uma Somani, Kanika Lakhani, ManishaMundra, ”Implementing
Digital Signature with RSA Encryption Algorithm to Enhance the Data
Security of Cloud in Cloud Computing”-2010 IEEE 1st International
Conference on Parallel, Distributed and Grid Computing (PDGC-
2010).
[3] Mehdi Hojabri& Mona Heidari“Union of RSA algorithm, Digital
Signature and KERBEROS in Cloud Computing” International
Conference on Software Technology and Computer Engineering
(STACE-2012).
[4] Ashish Prajapati, Amit Rathod “Enhancing security in cloud computing
using Bi-Directional DNA Encryption Algorithm”, International
Conference on Intelligent Computing, Communication & Devices.
(ICCD-2014), Springer.