0% found this document useful (0 votes)
46 views

Analysis and Encryption Technique Using Multi-Dimensional Protection in Cloud Computing

1. The document discusses security issues in cloud computing and proposes a solution using multi-dimensional protection techniques including encryption and authentication. 2. It suggests encrypting data using AES, Blowfish, or a hybrid of both before uploading to the cloud. A two-factor authentication using passwords and CHAP is also proposed. 3. A hybrid encryption algorithm is described that first encrypts data with AES, then further encrypts the cipher text with Blowfish, making the data very difficult to decrypt without the keys. This multi-pronged approach aims to improve security and availability of data in the cloud.

Uploaded by

Shodh Sangam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Analysis and Encryption Technique Using Multi-Dimensional Protection in Cloud Computing

1. The document discusses security issues in cloud computing and proposes a solution using multi-dimensional protection techniques including encryption and authentication. 2. It suggests encrypting data using AES, Blowfish, or a hybrid of both before uploading to the cloud. A two-factor authentication using passwords and CHAP is also proposed. 3. A hybrid encryption algorithm is described that first encrypts data with AES, then further encrypts the cipher text with Blowfish, making the data very difficult to decrypt without the keys. This multi-pronged approach aims to improve security and availability of data in the cloud.

Uploaded by

Shodh Sangam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SHODH SANGAM – A RKDF University Journal of Science and Engineering

Analysis and Encryption Technique using Multi-Dimensional


Protection in Cloud Computing
Ankur Saxena 1 , Raj Kumar Paul 2 ,
1,2
Department of Computer Science & Engineering,
RKDF University, Bhopal, India

Abstract: In this day and age where each measurement One of the key obstacles to cloud approval is data security
of human life is seeing new advancements relatively con- and privacy, because the user and the service provider are
sistently, the conventional processing is likewise enhancing not contained in the same trusted domain.
exponentially. A standout amongst the most progressive
change is the origination of Cloud computing. Cloud com-
puting bolsters appropriated benefit situated engineering,
multi-client and multi-space regulatory framework. Along
these lines, it is more inclined to security dangers and vul-
nerabilities. It not only offers a high degree of mobility,
flexibility to its user, it provides a hassle free environment.
In this paper, it is talk about a portion of the systems
that were implemented to data security and propose avail-
ability data in cloud. giving multi-dimensional security to
cloud framework, up to a specific degree this arrangement
additionally obliges the need to framework availability. We
have used AES and Blowfish as encryption techniques and
CHAP (Challenge Handshake protocol) as an authentication
technique to achieve some of the security goals.
Keywords: Cloud Computing, Encryption Techniques,
Authentication, Security, CHAP, AES. Figure 1: Cloud Computing

Security issues are increasingly significant in lower layer


I Introduction Infrastructure as a Service (IaaS) to higher Platform as a
Service (PaaS). These cloud layers are deployed (public, pri-
Cloud Computing is a combination of IT administrations vate, community, and hybrid) in high end MCC (Mobile
given by many specialist co-ops. The term cloud was begun Cloud Computing). Users vacillate to shift into the cloud
from the web and is likewise a stage that gives individuals because of certain ambiguities in its architecture that makes
the open door for sharing assets, administrations and data cloud computing insecure [5].
internationally [1].
As per the Cloud definition given by Cloud Security Al-
liance Group [6], Cloud figuring advocates the utilization
of accumulation of administrations, applications, informa- II Characteristics of Cloud Com-
tion and foundation which involves a reusable pool of PCs, puting
processors, data and capacity media. These reusable parts
can be quickly provisioned, executed and decommissioned, Following inherent characteristics of cloud computing makes
scaled-up or down to give an on-request utility model of it a highly promising computing platform to use [6].
designation and utilization of assets [2].
Gartner defines cloud computingas a style of computing
in which scalable and elastic IT-enabled capabilities are de- On-Demand Self-Service
livered as a service using Internet technologies. Strong con-
fidentiality means cloud providers will not be able to access Users of cloud computing have the flexibility to easily man-
the data. For example confidential and classified business in- age the resources like processors, storage media and network
formation, government secret information, etc. Applications resources as per their need, and more surprisingly it does
that execute in the cloud can poise several factors including not require any manual intervention of any administrator or
load balancing, bandwidth, size of data and security [3, 4]. service provider.

ISSN No. 2581–5806 http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 1


SHODH SANGAM – A RKDF University Journal of Science and Engineering

Broad Network Access that point additionally the cloud system will not be robust
[10, 11].
Cloud capabilities are distributed over the internet which Thus remembering every one of these viewpoints, in our
makes it broadly available and increases its usability to any proposed work we have recommended a joined answer for in-
remote or local area. These services are accessed via stan- crement the cloud system security and availability In the
dard mechanisms and users have the flexibility to use any following area we will give the points of interest of proposed
thin or thick client applications (from their Desktops, lap- work [12].
tops, PDAs, mobiles etc.) to leverage cloud service.

Resource Pooling IV Proposed Work


CSP’s resources are pooled to serve multiple end users using As stated in problem statement the major challenges to a
a multi-tenancy model with the ease of allocating and de- cloud system implementation are Data Security and confi-
allocating the resource based on the consumers need. Due dentiality. Therefore as part of the proposed work, we have
to the distributed nature of cloud services, these resource targeted these major concerns using following approaches:
provisioning is transparent to the end users.
1. Data residing in the cloud storage

Measured Service 2. Data transmission via network

Cloud enabled systems have the capability to track and op- 3. User identification and Authentication
timize the use of pooled resources according to consumers’ In order to provide secure and authorized data access from
usage, and the users are charged on fair usage policy. cloud systems, following components needs to be secured:
1. Data Privacy & Data Security:
Rapid Elasticity For achieving data privacy and security, we have proposed
to use following Encryption algorithms:
Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and in- • AES (Advanced Encryption Standard)
ward commensurate with demand. To the consumer, the • Blowfish Encryption Algorithm
capabilities available for provisioning often appear to be un-
limited and can be appropriated in any quantity at any time • Hybrid Encryption Algorithm (Combination of AES &
[7, 8]. Blowfish)
Data/document to be uploaded will be encrypted by a dif-
ferent algorithm based on the security level of the document.
III Problem Identification 2. User Authentication:
For providing a strong user authentication process, we have
We have reviewed into a portion of solutions proposed by
proposed to use two-level authentication process.
various authors/researchers to strengthen the security of a
cloud system implementation; every one of them were fo- • Level #1 - Password based Authentication: In
cused to give better confirmation and information encryp- this level, user will be authenticated using the generic
tion methods [9]. password based authentication
Anyway sending a straightforward validation and encryp-
tion process will not be adequate to evacuate all sort of vul- • Level #2: CHAP Authentication: Once user suc-
nerabilities identified with cloud framework security (client cessfully gets authenticated with level-1, he/she has to
ID, information classification) and system availability. If go through CHAP authentication process as part of
some of these vital aspects is not provisioned with sufficient level-2 authentication.
means, it may lead to two issues.

• Security V Hybrid Encryption Algorithm


• Availability Hybrid Encryption Algorithm is a two-phase process. In
the principal stage the report (in plain content) is scram-
Another essential perspective separated from verification bled with AES calculation and after that in the second stage
and information security is framework accessibility, so re- the figure content produced from stage 1, is again encoded
gardless of whether the cloud framework gives both; a solid utilizing Blowfish calculation to create the last figure con-
validation and solid information security includes yet at tent, which makes it about unimaginable for any program-
the same time needs in giving high accessible of the cloud mer/assailant to interpret. Following flow-chart shows the
framework (because of successive blackouts/downtimes) at working of Hybrid Encryption process:

ISSN No. 2581–5806 http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 2


SHODH SANGAM – A RKDF University Journal of Science and Engineering

VI Result Analysis
In the proposed work, we have attempted to enhance the se-
curity of a cloud system execution by using definitely known
and broadly utilized advances. We can condense the re-
sultant advantages of utilizing the proposed approach: We
Figure 2: Hybrid Encryption Process have looked at the execution of different encryption calcu-
lations for encryption/decryption process; we have recorded
the time taken during process, CPU and memory usage.
And following flow-chart shows of decryption using Hy-
brid algorithm:
6.1 Comparing the Time Taken by Various
Encryption Algorithms
Analysis done for the encryption process of 5 algorithms, for
file sizes from 1 MB to 20 MB, and the resultant value is
the average of 5 iterations of each algorithm.

Figure 3: Hybrid Decryption Process Table 1: Encryption Algorithm Comparison

This process provides highly secure mechanism for docu- File Encryption Time (in ms)
Size AES Blowfish DES 3-DES Hybrid
ment encryption/decryption.
1 MB 368.2 334.8 381.5 541.4 429.4
3 MB 469 425.4 572.8 1030.2 577.6
5 MB 788.4 645.4 775.7 1582 801.8
5.1 Increased Availability of Authentica- 10 MB 889.2 806.2 1283.8 2935.6 1266.2
15 MB 1439.2 1168.8 1687.6 4069.4 1658.7
tion Process 20 MB 1546.4 1503.2 2355.6 5574.2 2269.4

Step I: Hence in the proposed work, instead of a single


CHAP server, we will use N servers (where N > 1), and
each of the CHAP server will use unique hashing algorithm
to authenticate against user request. And in addition to that 6.2 Performance Graph of Encryption Al-
there will be a success threshold limit S (where S <= N ), gorithms
which denotes the numbers of servers a user should success-
fully authenticate, in order to get the access to cloud system. Horizontal Axis = File sizes in MB
Step II: N =Number of CHAP servers (N > 1) Vertical Axis = Time taken by the algorithm during encryp-
tion (in ms)
S = N/2 + 1

For an instance if N = 5, then 6.3 Comparing the Average CPU and


Step III: Security threshold limit = (5/2) + 1 = 3 Memory Utilization
Hence if any one (or two) of the servers goes down due to
some issue, then also user will be able to login into the sys- We can see that AES and Blowfish are the quickest algo-
tem if he successfully achieves the success threshold limit. rithms. on the other hand Hybrid algorithm is likewise per-
forming ideally well and is superior to DES and Triple-DES.
Especially for higher file sizes Hybrid is performing way bet-
5.2 Increased Security of Authentication ter than DES and Triple-DES. Result of this analysis shows
Process that the average CPU and memory required for these algo-
rithm for these calculation is likewise having indistinguish-
As it is quite possible that a hacker can hack a single authen- able example from past examination. Kindly observe the
tication server, however it is very difficult for him to crack gathered information in the underneath table. Apart from
all the involved servers, where all of them are configured to this analysis, we have also taken the CPU and memory uti-
use a different hashing algorithm. lization report (using Windows Performance Monitor Tool)
Following Figure shows the quick view of authentication of these 5 algorithms, during the encryption of a 15 MB file.
process and access to cloud system:

ISSN No. 2581–5806 http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 3


SHODH SANGAM – A RKDF University Journal of Science and Engineering

Figure 4: Two-level Authentication Process

Figure 7: System Performance while using Hybrid for 5


Figure 5: Comparative Analysis of Encryption Algorithms
times (for encrypting 15 MB file)

Table 2: Performance Analysis of Encryption Algorithms


VII Conclusion and Future Work
Metric Encryption Algorithms
AES Blowfish DES 3-DES Hybrid
As we push forward with time in this registering world, we
Avg. CPU
Utilization 61.383 60.797 63.237 72.553 63.229
will positively observe numerous difficulties, changes, and
(%) improvement in distributed computing; anyway the security
Avg. Memory and administration accessibility angles are continually going
Utilization 46.073 45.573 46.378 46.931 46.38 to be the key for the accomplishment of Cloud situations.
(%)
There have been numerous such proposed answers for battle
with Security issues, having upgrades more than one or the
other. This paper analyses the importance of the data se-
curity and availability in the cloud. Purpose behind picking
mixture encryption calculations are proficient to deal with
encryption for extensive measure of information availability
and successful speed of security information in the cloud.
From the point of view of our answer, we have proposed
systems to anchor cloud condition, up to a decent degree.
This proposed work effectively conveys following changes for
securing cloud systems:

1. Enhanced security for cloud system (using strong au-


thentication and encryption)
Figure 6: System Performance in Idle State
2. Overall performance optimization

As a future improvement work of the arrangement proposed

ISSN No. 2581–5806 http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 4


SHODH SANGAM – A RKDF University Journal of Science and Engineering

in this paper we can additionally make it more secure uti- Services and Technologies, Sept 2015, pp. 370–375. [Online].
lizing the SSL (Secured Socket Layer) or TLS (Transport Available: https://doi.org/10.1109/NGMAST.2015.25
Layer Security) features, which will certainly secure the data
[10] D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes,
in transit as well. Another aspect for improvement will be to M. M. Freire, and P. R. M. Inácio, “Security issues
work on achieving better performance of the overall system. in cloud environments: a survey,” International Journal
of Information Security, vol. 13, no. 2, pp. 113–170,
Apr 2014. [Online]. Available: https://doi.org/10.1007/
REFERENCES s10207-013-0208-7

[1] M. Sugumaran, B. B. Murugan, and D. Kamalraj, “An [11] “Security in cloud computing,” International Journal
architecture for data security in cloud computing,” in of Information Security, vol. 13, no. 2, pp. 95–96,
2014 World Congress on Computing and Communication Apr 2014. [Online]. Available: https://doi.org/10.1007/
Technologies, Feb 2014, pp. 252–255. [Online]. Available: s10207-014-0232-2
https://doi.org/10.1109/WCCCT.2014.53
[12] B. A. Sullivan, “Securing the cloud: Cloud computer
[2] F. F. Moghaddam, S. D. Varnosfaderani, I. Ghavam, security techniques and tactics,” Security Journal, vol. 27,
and S. Mobedi, “A client-based user authentication no. 3, pp. 338–340, Jul 2014. [Online]. Available:
and encryption algorithm for secure accessing to cloud https://doi.org/10.1057/sj.2012.16
servers based on modified diffie-hellman and rsa small-
e,” in 2013 IEEE Student Conference on Research and
Developement, Dec 2013, pp. 175–180. [Online]. Available:
https://doi.org/10.1109/SCOReD.2013.7002566

[3] L. Qian, Z. Luo, Y. Du, and L. Guo, “Cloud computing:


An overview,” in Cloud Computing, M. G. Jaatun, G. Zhao,
and C. Rong, Eds. Berlin, Heidelberg: Springer Berlin
Heidelberg, 2009, pp. 626–631.

[4] B. Balamurugan and P. Krishna, “Extensive survey on


usage of attribute based encryption in cloud,” Journal of
Emerging Technologies in Web Intelligence, vol. 6, no. 3,
pp. 263–272, Jan 2014. [Online]. Available: http://www.
jetwi.us/uploadfile/2014/1210/20141210112144224.pdf

[5] R. K. L. Ko, M. Kirchberg, and B. S. Lee, “From


system-centric to data-centric logging - accountability, trust
amp;amp; security in cloud computing,” in 2011 Defense
Science Research Conference and Expo (DSR), Aug 2011,
pp. 1–4. [Online]. Available: https://doi.org/10.1109/DSR.
2011.6026885

[6] F. F. Moghaddam, M. B. Rohani, M. Ahmadi, T. Kho-


dadadi, and K. Madadipouya, “Cloud computing: Vi-
sion, architecture and characteristics,” in 2015 IEEE
6th Control and System Graduate Research Colloquium
(ICSGRC), Aug 2015, pp. 1–6. [Online]. Available:
https://doi.org/10.1109/ICSGRC.2015.7412454

[7] A. Shukla and Y. Simmhan, “Toward reliable and rapid


elasticity for streaming dataflows on clouds,” in 2018 IEEE
38th International Conference on Distributed Computing
Systems (ICDCS), July 2018, pp. 1096–1106. [Online].
Available: https://doi.org/10.1109/ICDCS.2018.00109

[8] D. M. Shawky and A. F. Ali, “Defining a measure of cloud


computing elasticity,” in 2012 1st International Conference
on Systems and Computer Science (ICSCS), Aug 2012, pp.
1–5. [Online]. Available: https://doi.org/10.1109/IConSCS.
2012.6502449

[9] T. K. Damenu and C. Balakrishna, “Cloud security risk


management: A critical review,” in 2015 9th International
Conference on Next Generation Mobile Applications,

ISSN No. 2581–5806 http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 5

You might also like