Cloud
Cloud
Cloud
1 *, 2, 3 & 4
P School of Information Technology, SEGi University, Kota Damansara, Malaysia
P
5
P Faculty of Engineering and Built in Environment, SEGi University, Kota Damansara, Malaysia
P
61
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
computing resources visualized as services and 1.1.1 Infrastructure as a service (IaaS) is a form of
delivered over the Internet [2][3]. cloud computing that provides virtualized computing
resources over the internet. In a IAAS model, a third
RSA is widely used Public-Key algorithm. RSA party provider hosts hardware, software, servers,
stands for Ron Rivest, Adi Shamir and Len Adleman, storage and other infrastructure components on the
who first publicly described it in 1977. behalf of its users. IAAS providers also host users’
In our proposed work, we are using RSA algorithm to applications and handle tasks including system
encrypt the data to provide security so that only the maintenance backup and resiliency planning. IAAS
concerned user can access it. By securing the data, platforms offer highly scalable resources that can be
we are not allowing unauthorized access to it. adjusted on-demand which makes it a well-suited for
workloads that are temporary, experimental or
User data is encrypted first and then it is stored in change unexpectedly. Other characteristics of IAAS
the Cloud. When required, user places a request for environments include the automation of
the data for the Cloud provider, Cloud provider administrative tasks, dynamic scaling, desktop
authenticates the user and delivers the data. virtualization and policy based services. Other
characteristics of IAAS include the automation of
RSA is a block cipher, in which every message is
administrative tasks, dynamic scaling, desktop
mapped to an integer. RSA consists of Public-Key
virtualization and policy based services [3]-[5]
and Private-Key. In our Cloud environment, Pubic-
Key is known to all, whereas Private-Key is known 1.1.2 Platform as a service (PaaS) is a cloud
only to the user who originally owns the data. computing model that delivers applications over the
internet. In a PAAS model, a cloud provider delivers
Thus, encryption is done by the Cloud service hardware and software tolls, usually those needed for
provider and decryption is done by the Cloud user or application development, to its users as a service. A
consumer. Once the data is encrypted with the PAAS provider hosts the hardware and software on
Public-Key, it can be decrypted with the its own infrastructure. As a result, PAAS frees users
corresponding Private-Key only.[4] from having to install in-house hardware and
software to develop or run a new application. A
1.1 Cloud computing service models PAAS provider, however, supports all the underlying
computing and software; users only need to login and
Cloud computing has been majorly divided into three start using the platform-usually through a Web
broad service categories: Infrastructure as a Service
45T
browser interface. PAAS providers then charge for
(IAAS), Platform as a Service (PAAS) and Software
45T 45T 45T 45T that access on a per-use basis or on monthly basis.
as a Service (SAAS) a shown in fig. 1: and detailed
45T
Some of the main characteristics of PAAS are[3]-[5]:
technical information as below.
• Scalability and auto-provisioning of the
underlying infrastructure.
• Security and redundancy.
• Build and deployment tools for rapid
application management and deployment.
• Integration with other infrastructure
components such as web services, databases,
and LDAP.
• Multi-tenancy, platform service that can be
used by many concurrent users.
• Logging, reporting, and code
instrumentation.
• Management interfaces and/or API.
62
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
model as underlying technologies that support Web 1.2.2 Communications as a service (CaaS) is an
services and service- oriented architecture (SOA) outsourced enterprise communications solution that
mature and new development approaches, such as can be leased from a single vendor. Such
Ajax, become popular. SAAS is closely related to the communications can include voice over IP (VoIP or
ASP (Application service provider) and on demand Internet telephony), instant messaging (IM),
computing software delivery models. IDC identifies collaboration and video conference applications using
two slightly different delivery models for SAAS fixed and mobile devices. The CAAS vendor is
namely the hosted application model and the software responsible for all hardware and software
development model. Some of the core benefits of management and offers guaranteed Quality of
using SAAS model are [3]-[5]: Service (QoS). CAAS allows businesses to
selectively deploy communications devices and
• Easier administration. modes on a pay-as-you-go, as-needed basis.
• automatic updates and patch management.
• compatibility: all users will have the same 1.2.3 Network as a service (NaaS) a framework that
version of software. integrates current cloud computing offerings with
• easier collaboration, for the same reason. direct, yet secure, client access to the network
• global accessibility. infrastructure. NAAS is a new cloud computing
model in which the clients have access to additional
computing resources collocated with switches and
routers. NAAS can include flexible and extended
Virtual Private Network (VPN), bandwidth on
demand, custom routing, multicast protocols, security
firewall, intrusion detection and prevention, Wide
Area Network (WAN), content monitoring and
filtering, and antivirus.
Some of the other service categories which are more 1.3 Deployment models
commonly classified as below:
In this section various Deployment Models are
1.2.1 Storage as a service (SaaS) Storage as a discussed:[11]-[12]
Service is a business model in which a large company
rents space in their storage infrastructure to a smaller 1.3.1 Private cloud: In this model cloud owner does
company or individual. The economy of scale in the not share their resources with any other organization.
service provider's infrastructure theoretically allows It is set up and maintained by an organization.
them to provide storage much more cost effectively Security can be very well implemented in this model.
than most individuals or corporations can provide
their own storage, when total cost of ownership is 1.3.2 Public cloud: In this cloud model the resources
considered. Storage as a Service is generally seen as are accessed by general public. Everybody can access
a good alternative for a small or mid- business that easily with this cloud so it is less secure model. Cost
lacks the capital budget and/or technical personnel to of this cloud is not expensive. This model requires a
implement and maintain their own storage huge investment these are owned by large
infrastructure. organizations such as Microsoft, Google or Amazon.
63
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
1.3.3 Community cloud: A cloud shares the two or tampering or to prevent the exposure of data beyond
more several organizations or companies for their the agreed territories.[11]
requirements. Usually used in school or university
campus. 2.3 Data location and relocation: Cloud
Computing offers a high degree of data mobility.
1.3.4 Hybrid cloud: This type of cloud uses the one Consumers do not always know the location of their
or more cloud model combinations for better use. data. However, when an enterprise has some sensitive
data that is kept on a storage device in the Cloud,
they may want to know the location of it. They may
also wish to specify a preferred location. This, then,
requires a contractual agreement, between the Cloud
provider and the consumer that data should stay in a
particular location or reside on a given known server.
Also, cloud providers should take responsibility to
ensure the security of systems (including data) and
provide robust authentication to safeguard customers’
information. Another issue is the movement of data
from one location to another. Data is initially stored
at an appropriate location decide by the Cloud
Fig. 3: Cloud computing service models and provider. However, it is often moved from one place
deployment model to another. Cloud providers have contracts with each
other and they use each other’s resources.[11]-[12]
2. Cloud data security issues
2.4 Data availability: Customer data is normally
2.1 Privacy and confidentiality: Once the stored in chunk on different servers often residing in
client host data to the cloud there should be some different locations or in different Clouds. In this case,
guarantee that access to that data will only be limited data availability becomes a major legitimate issue as
to the authorized access. Inappropriate access to the availability of uninterruptible and seamless
customer sensitive data by cloud personnel is another provision becomes relatively difficult.[12]
risk that can pose potential threat to cloud data.
Assurances should be provided to the clients and 2.5 Storage, backup and recovery: When
proper practices and privacy policies and procedures you decide to move your data to the cloud the cloud
should be in place to assure the cloud users of the provider should ensure adequate data resilience
data safety. The cloud seeker should be assured that storage systems. At a minimum they should be able
data hosted on the cloud will be confidential.[11]- to provide RAID (Redundant Array of Independent
[[12] Disks) storage systems although most cloud
providers will store the data in multiple copies across
2.2 Data integrity: With providing the security many independent servers. [11]
of data, cloud service providers should implement
mechanisms to ensure data integrity and be able to In addition to that, most cloud providers should be
tell what happened to a certain dataset and at what able to provide options on backup services which are
point. The cloud provider should make the client certainly important for those businesses that run
aware of what particular data is hosted on the cloud, cloud based applications so that in the event of a
the origin and the integrity mechanisms put in place. serious hardware failure they can roll back to an
earlier state.
For compliance purposes, it may be necessary to have
exact records as to what data was placed in a public 3. Data security approaches
cloud, when it occurred, what virtual memories
(VMs) and storage it resided on, and where it was Hence Security of data has become a major concern.
processed. When such data integrity requirements When data mobility is at a high level then the risks
exists, that the origin and custody of data or and issues increase many folds especially when data
information must be maintained in order to prevent is transferred to another country with different
regulatory framework.
64
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
3.1.1 Protection of data: Data can be protected from
High levels of data relocation have negative the outside user by creating the security keys such as
implications for data security and data protection as private key.
well as data availability.
3.1.2 Building blocks: The form of Mathematical
Thus the main concern with reference to security of and cryptographic principles server as the building
data residing in the Cloud is: how to ensure security blocks of the security.
of data that is at rest. Although, consumers know the
location of data and there in no data mobility, there 3.1.3 Integrity of data: while uploading the data the
are questions relating to its security and user can verify the correctness of the integrity
confidentiality of it. No doubt the Cloud Computing principles.
area has become larger because of its broad network 3.1.4 Accessing the data: Due to the Encryption and
access and flexibility. But reliability in terms of a Decryption techniques data can be accessed securely.
safe and secure environment for the personal data and
info of the user is still required. 3.1.5 Authentication: Authentication allows only
authorised user to access Data in cloud.
Financial savings, agility and elasticity, all enabled
through cloud technology, are crucial in a fast paced 3.2 Data security life cycle
business world. At the same time security incidents in
The life cycle of the Data security includes the six
the Cloud have made clear that this new promising
phases as once data is created it can process through
technology comes with complexity and security and
all the stages[11]-[13]
privacy challenges.
3.2.1 Create: Creation is the generation of the new
In Cloud computing Environment there are various digital data content, uploading and modifying the
security issues are occurs due sharing of resources it data.
leads to a security problem.
3.2.2 Store: Storing is the act committing the digital
Cloud computing as it comprises many technologies data storage repository, and typically occurs nearly
including networks, databases, operating systems, simultaneously with creation.
virtualization, resource scheduling, transaction 3.2.3 Use: Data is viewed, processed and retrieved
management, load balancing, concurrency control actively.
and memory management.
3.2.4 Share: Data is exchanged between the users,
Therefore, security issues for many of these systems customers, and partners of the respective cloud.
and technologies are pertinent to cloud computing.
Cloud possesses the security problem in Data 3.2.5 Archive: Data leaves active use and enters
segregation, Data theft, unauthorized access, long-term storage.
uncleared Owner and responsibility of Data 3.2.6 Destroy: Data is destroyed permanently using
Protection, Data Loss conditions.[11]-[13] the physically or digital name.
65
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
data for the Cloud provider, Cloud provider
authenticates the user and delivers the data.[7]-[9]
2. Encryption
Fig.4: The life cycle of Data security 3. Decryption
4. The proposed methodology 4.2.1 Key generation: Before the data is encrypted,
Key generation should be done. This process is done
The area of cryptography and cryptanalysis together between the Cloud service provider and the user.[14]
are known as cryptology [8]. Cryptanalysis used
many encryption and decryption techniques such as 4.2.1.1 Key generation algorithm
Caeser cipher, Monoalphabetic cipher, Play fair
Steps:
cipher, Hill Cipher. These techniques possess the
Brute Force Attack means the attacker tries every 1. Choose two distinct prime numbers a and b. For
possible key to get the original text to avoid this security purposes, the integers a and b should be
problem public key cryptography used. chosen at random and should be of similar bit length.
RSA is widely used Public-Key algorithm. RSA
2. Compute n = a * b.
stands for Ron Rivest, Adi Shamir and Len Adleman,
who first publicly described it in 1977.
3. Compute Euler’s totient function,
In our proposed work, we are using RSA algorithm Ø(n) = (a-1) * (b-1).
to encrypt the data to provide security so that only the
concerned user can access it. By securing the data, 4. Chose an integer e, such that 1 < e < Ø(n) and
we are not allowing unauthorized access to it.[8][9] greatest common divisor of e , Ø(n) is 1.
Now e is released as Public-Key exponent.
4.1 RSA algorithm: is the public key
5. Now determine d as follows: d = e-1(mod Ø(n))
cryptography, in which both public and the private
P P
66
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
67
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 6 Issue 4, April 2019
ISSN (Online) 2348 – 7968
www.ijiset.com
the high secure and high potential Data Encryption 260. doi:10.1007/s001459900030.
3T 3T 3T 3T
new and evolving paradigm where computing is short RSA secret exponents" (PDF). Information 31T
regarded as on-demand service. Thus, in our Theory, IEEE Transactions on. 36 (3): 553–
proposed work, only the authorized user can access 558. doi:10.1109/18.54902.
31T 31T 31T 31T
the data. Even if some intruder (unauthorized user) [8] Johnson, J.; Kaliski, B. (Feb 2003). "Public-Key 3T
gets the data accidentally or intentionally if he/she Cryptography Standards (PKCS) #1: RSA
captures the data also, he/she can’t decrypt it and get Cryptography Specifications Version 2.1". 3T
back the original data from it. Hence forth, data www.ietf.org. Network Working Group. Retrieved 9 41T 38T41
amount of protection needed to secure data is directly Algorithm into Public Domain". Archived from the 3T 3T
proportional to the value of the data. Security of the original on June 21, 2007. Retrieved 2010-03-03.
3T 41T 38T41 38T
[4] Devi T, “Data Security Frameworks In Cloud”, [14] Simarjeet Kaur, “Cryptography and Encryption
School of Computing Sciences and Engineering in Cloud Computing”, VSRD International Journal of
International Conference on Science, Engineering Computer Science and Information Technology, Vol.
and Management Research (ICSEMR 2014) 978-1- 2(3), 2012, pp: 242-249.
4799-7613-3/14/ ©2014 IEEE. [15]. Vishwa gupta, Gajendra Singh, Ravindra Gupta,
[5] M.Sasikala , Dr. V. Anuratha, “Analysis Of “Advance Cryptography algorithm for improving
Security Algorithms In Cloud”, International Journal data security”, International Journal of Advanced
Of Advanced Research In Science And Engineering, Research in Computer Science and Software
Volume No. 6, Issue No. 12, Year 2017, pp. 631-641. Engineering, Vol 2, Issue 1, Jan 2012.
68