Analysis and Encryption Technique Using Multi-Dimensional Protection in Cloud Computing
Analysis and Encryption Technique Using Multi-Dimensional Protection in Cloud Computing
Abstract: In this day and age where each measurement One of the key obstacles to cloud approval is data security
of human life is seeing new advancements relatively con- and privacy, because the user and the service provider are
sistently, the conventional processing is likewise enhancing not contained in the same trusted domain.
exponentially. A standout amongst the most progressive
change is the origination of Cloud computing. Cloud com-
puting bolsters appropriated benefit situated engineering,
multi-client and multi-space regulatory framework. Along
these lines, it is more inclined to security dangers and vul-
nerabilities. It not only offers a high degree of mobility,
flexibility to its user, it provides a hassle free environment.
In this paper, it is talk about a portion of the systems
that were implemented to data security and propose avail-
ability data in cloud. giving multi-dimensional security to
cloud framework, up to a specific degree this arrangement
additionally obliges the need to framework availability. We
have used AES and Blowfish as encryption techniques and
CHAP (Challenge Handshake protocol) as an authentication
technique to achieve some of the security goals.
Keywords: Cloud Computing, Encryption Techniques,
Authentication, Security, CHAP, AES. Figure 1: Cloud Computing
Broad Network Access that point additionally the cloud system will not be robust
[10, 11].
Cloud capabilities are distributed over the internet which Thus remembering every one of these viewpoints, in our
makes it broadly available and increases its usability to any proposed work we have recommended a joined answer for in-
remote or local area. These services are accessed via stan- crement the cloud system security and availability In the
dard mechanisms and users have the flexibility to use any following area we will give the points of interest of proposed
thin or thick client applications (from their Desktops, lap- work [12].
tops, PDAs, mobiles etc.) to leverage cloud service.
Cloud enabled systems have the capability to track and op- 3. User identification and Authentication
timize the use of pooled resources according to consumers’ In order to provide secure and authorized data access from
usage, and the users are charged on fair usage policy. cloud systems, following components needs to be secured:
1. Data Privacy & Data Security:
Rapid Elasticity For achieving data privacy and security, we have proposed
to use following Encryption algorithms:
Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and in- • AES (Advanced Encryption Standard)
ward commensurate with demand. To the consumer, the • Blowfish Encryption Algorithm
capabilities available for provisioning often appear to be un-
limited and can be appropriated in any quantity at any time • Hybrid Encryption Algorithm (Combination of AES &
[7, 8]. Blowfish)
Data/document to be uploaded will be encrypted by a dif-
ferent algorithm based on the security level of the document.
III Problem Identification 2. User Authentication:
For providing a strong user authentication process, we have
We have reviewed into a portion of solutions proposed by
proposed to use two-level authentication process.
various authors/researchers to strengthen the security of a
cloud system implementation; every one of them were fo- • Level #1 - Password based Authentication: In
cused to give better confirmation and information encryp- this level, user will be authenticated using the generic
tion methods [9]. password based authentication
Anyway sending a straightforward validation and encryp-
tion process will not be adequate to evacuate all sort of vul- • Level #2: CHAP Authentication: Once user suc-
nerabilities identified with cloud framework security (client cessfully gets authenticated with level-1, he/she has to
ID, information classification) and system availability. If go through CHAP authentication process as part of
some of these vital aspects is not provisioned with sufficient level-2 authentication.
means, it may lead to two issues.
VI Result Analysis
In the proposed work, we have attempted to enhance the se-
curity of a cloud system execution by using definitely known
and broadly utilized advances. We can condense the re-
sultant advantages of utilizing the proposed approach: We
Figure 2: Hybrid Encryption Process have looked at the execution of different encryption calcu-
lations for encryption/decryption process; we have recorded
the time taken during process, CPU and memory usage.
And following flow-chart shows of decryption using Hy-
brid algorithm:
6.1 Comparing the Time Taken by Various
Encryption Algorithms
Analysis done for the encryption process of 5 algorithms, for
file sizes from 1 MB to 20 MB, and the resultant value is
the average of 5 iterations of each algorithm.
This process provides highly secure mechanism for docu- File Encryption Time (in ms)
Size AES Blowfish DES 3-DES Hybrid
ment encryption/decryption.
1 MB 368.2 334.8 381.5 541.4 429.4
3 MB 469 425.4 572.8 1030.2 577.6
5 MB 788.4 645.4 775.7 1582 801.8
5.1 Increased Availability of Authentica- 10 MB 889.2 806.2 1283.8 2935.6 1266.2
15 MB 1439.2 1168.8 1687.6 4069.4 1658.7
tion Process 20 MB 1546.4 1503.2 2355.6 5574.2 2269.4
in this paper we can additionally make it more secure uti- Services and Technologies, Sept 2015, pp. 370–375. [Online].
lizing the SSL (Secured Socket Layer) or TLS (Transport Available: https://doi.org/10.1109/NGMAST.2015.25
Layer Security) features, which will certainly secure the data
[10] D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes,
in transit as well. Another aspect for improvement will be to M. M. Freire, and P. R. M. Inácio, “Security issues
work on achieving better performance of the overall system. in cloud environments: a survey,” International Journal
of Information Security, vol. 13, no. 2, pp. 113–170,
Apr 2014. [Online]. Available: https://doi.org/10.1007/
REFERENCES s10207-013-0208-7
[1] M. Sugumaran, B. B. Murugan, and D. Kamalraj, “An [11] “Security in cloud computing,” International Journal
architecture for data security in cloud computing,” in of Information Security, vol. 13, no. 2, pp. 95–96,
2014 World Congress on Computing and Communication Apr 2014. [Online]. Available: https://doi.org/10.1007/
Technologies, Feb 2014, pp. 252–255. [Online]. Available: s10207-014-0232-2
https://doi.org/10.1109/WCCCT.2014.53
[12] B. A. Sullivan, “Securing the cloud: Cloud computer
[2] F. F. Moghaddam, S. D. Varnosfaderani, I. Ghavam, security techniques and tactics,” Security Journal, vol. 27,
and S. Mobedi, “A client-based user authentication no. 3, pp. 338–340, Jul 2014. [Online]. Available:
and encryption algorithm for secure accessing to cloud https://doi.org/10.1057/sj.2012.16
servers based on modified diffie-hellman and rsa small-
e,” in 2013 IEEE Student Conference on Research and
Developement, Dec 2013, pp. 175–180. [Online]. Available:
https://doi.org/10.1109/SCOReD.2013.7002566