PANCDS-2v1 2
PANCDS-2v1 2
PANCDS-2v1 2
1 Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
2,3,4 III
BCA, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data security is, protecting data from ill- customers are still unwilling to place their business in the
conceived get to, utilize, introduction, intrusion, change, cloud. One of the real concerns which lessens the
examination, recording or destruction. Cloud computing is a development of Cloud computing is security and impediment
sort of Internet-based computing that grants conjoint PC with data security and information protection keep on
handling resources and information to PCs what's more, infecting the market. Cloud information storage augments
different gadgets according to necessity. It is a model that the danger of data spillage and ill-conceived get to. The
empowers universal, on-request access to a mutual pool of architecture of cloud poses certain dangers to the security of
configurable computing resources. At present, security has the existing technologies when deployed in a cloud
been viewed as one of the best issues in the improvement of environment. Cloud service users need to be alert in
Cloud Computing. The key issue in effective execution of Cloud interpreting the risks of data intrusion in this new
Computing is to adequately deal with the security in the cloud environment.[1] The security concerns with respect to cloud
applications. This paper talks about the part of cryptography computing are end-user data security, network traffic, file
in cloud computing to improve the data security. The systems and host machine security which can be addressed
expectation here is to get bits of knowledge another security with the help of cryptography to a considerable level.
approach with the usage of cryptography to secure “Security and privacy are indeed interrelated because the
information at cloud data centers. security is provided without having privacy but the privacy
is not maintained without security. “[2]
Key Words: Cloud Computing, Elliptical Curve
Cryptography, Cryptography What is Cryptography?
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 32
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
3. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Clouds may be classified broadly as:
Tereza Carvalho, Marcos Simplicio, Mats Näslundy and
Makan Pourzandi in their research paper, “An quantitative i) Public Cloud: hosted, operated and managed by third
analysis of current security concerns and solutions for cloud party vendor from one or more data centers.
computing” says that aiming to organize the information ii) Private Cloud: managed or owned by an organization,
related to cloud security have identify the main problems in providing services within an organization.
the area and grouped them into a model composed of eight iii) Hybrid Cloud: comprised both the private and public
categories: Compliance, Trust, Architecture, Identity and cloud models where organization might run non - core
Access, availability, incident response, data protection and application in a public cloud, while maintaining core
governance. applications and sensitive data in- house in a private cloud.
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 33
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
ii) Self and On-Demand Service i) Cloud Consumer: One who uses a cloud provider's
resources, from a company to an individual.
Cloud computing depends on self-service and on-demand ii) Cloud Auditor: The goal of Cloud Audit is to provide
service models. It ought to enable the client to collaborate cloud service providers with a way to make their
with the cloud to perform assignments like building, performance and security data readily available for potential
deploying, managing, and scheduling. The client ought to customers.
have the capacity to get to figuring abilities as and when they iii) Cloud Broker: the Service brokers concentrate on the
are required and with no association from the cloud service negotiation of the relationships between consumers and
provider. This would help clients to be in control, getting providers. There are two major roles for brokers: SLA
deftness their work, and to settle on better choices on the Negotiation and VM Monitor. The SLA Manager takes care
present and future needs. that no Service Level Agreement (SLA) is violated and VM
Monitor the current stated of virtual machines periodically
iii) Broad Network Access at specific amount of time[2].
iv) Cloud Provider: The Company who makes the cloud
Capabilities are accessible over the network and got to available to others. They are in charge of maintenance/
through standard mechanisms that advance use by upkeep of the cloud and, of course, making sure it is always
heterogeneous thin or thick client stages (e.g., cell phones, available to the cloud user.
tablets, portable PCs and workstations).
4. ROLE OF CRYPTOGRAPHY IN CLOUD COMPUTING
iv) Measured Services
A) Introduction to Cryptography
Cloud systems consequently control what's more, upgrade
resource use by utilizing a metering ability at some level of Cryptography is the technique widely used in computer
reflection proper to the type of service (e.g. storage capacity, networks to provide security to the data and messages
processing, transmission capacity and active client communicated over the network. The plain text message
accounts). Resource utilization can be monitored, controlled being sent from sender is encrypted in to a special format
and reported, giving straightforwardness to the provider and called as “Cipher Text” by applying some cryptographic
consumer. algorithm and then communicated over the network. At the
receiver’s end, the Cipher text message is decrypted in the
v) Rapid Flexibility original plain text again by applying some decryption
algorithm. Thus only the sender & receiver of the
Capabilities can be flexibly provisioned and discharged, now communication can read the encoded message and no one
and again naturally, proportional quickly outward and else. Cryptography is used for addressing the network
internal proportionate with demand. To the customer, the security problems.
capacities accessible for provisioning regularly have all the
earmarks of being boundless and can be appropriated in any i. Data Integrity: Information has value only if it is correct,
quantity whenever. this refers to maintaining and assuring the accuracy and
consistency of data, its implementation for computer
E) Cloud Computing Entities systems that store use data, processes, or retrieve that data.
ii.Authentication: Determining whom we are talking to
Figure shows the cloud computing entities: before revealing the sensitive information or entering into a
business deal.
iii. Non Repudiation: Deals with signatures and is the
assurance that a party, contract or someone cannot deny the
authenticity of their signature and sending a message that
they originated.
iv. Secrecy: Keeping information out of the hands of
unauthorized users, relates to loss of privacy, identity theft.
B. Cryptographic Model
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 34
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 35
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
ECC uses point of multiplication operation, which has been to discover better solutions utilizing Elliptical Curve
found to be computationally more efficient than RSA Cryptography.
exponentiation[12].
8. REFERENCES
ECC has drawn much attention as the security solutions for
wireless networks such as Clouds, due to the small key size [1]S. Subashini, V. Kavitha -Anna University Tirunelveli,
and simplified computation [13]. Elliptic curve has a unique India,” A survey on security issues in service delivery models
property that makes it fit for use in cryptography in cloud of cloud computing“ELSEVIER- Journal of Network and
computing i.e. its power to take any two points on a specific Computer Applications Volume 34, Issue 1, January 2011,
curve, add them together and get a third point on the same Pages 1–11.
curve. The fundamental operation engaged with ECC is point [2] Jashanpreet Pal Kaur, Rajbhupinder kaur, Yadavindra
multiplication, i.e. increase of a scalar K with any guide P on College of Engineering, Talwandi Sabo, Bathinda Punjab,
the curve toward get another point Q on the same curve[14]. “Security Issues and Use of Cryptography in Cloud
The general equation for an elliptic curve is: Computing"
[3] Wang, L., Tao, J., & Kunze, M. (2008). “Scientific cloud
y2 + axy + by = x3 + cx2 + dx + e
computing: Early definition and experience”.
Where a, b, c, d and e are real numbers and x and y belongs [4] Reservoir Project [URL]. http://www-03.ibm.com/
to a set of real number. In its simplest form, an elliptic curve press/us/en/pressrelease/23448.wss/, access on June 2008.
equation can be given as: [5] Amazon Elastic Compute Cloud [URL]. http://aws.
amazon. com/ ec2, access on Nov. 2007.
y2 – x8 + dx + e [6] IBM Blue Cloud project [URL]. http://www-
3.ibm.com/press /us/en/pressrelease/22613.wss/, access
6. ANALYSIS on June 2008.
[7] Nimbus Project [URL].http://workspace.globus.org/
A Statistical investigation, demonstrates that a similar level clouds/nimbus.html/,access on June 2008.
of security rendered by a RSA-based framework with a huge
modulus can be proficient with a considerably smaller [8] Status Project [URL]. http://www.acis.ufl.edu/vws/,
elliptic curve group, i.e. a 163 piece key of ECC is thought to access on June 2008.
be as secure as 1024 bits key in RSA. Also ECC uses smaller [9] OpenNEbula Project [URL].http://www.opennebula.org /,
key sizes, which effects in faster calculations, lower power access on Apr.2008.
consumptions, saving memory and bandwidth. ECC thus [10] Tadapaneni, N. R. (2017). Different Types of Cloud
clubbed with Cloud computing will definitely provide much Service Models. Available at SSRN 3614630.
more secure environment along with speed and saving of
[11] Shweta Sharma, Bharat Bhushan, Shalini Sharma -
many intangible/indirect resources. ECC applied in cloud ”Improvising Information Security in Cloud Computing
will result in more attention paid towards how to avoid data Environment”- International Journal of Computer
duplications, how to utilize data and services efficiently and Applications (0975 – 8887) Volume 86 – No 16, January
how to achieve cost-effective solutions. 2014.
7. CONCLUSION AND FUTURE ENHANCEMENT [11]D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT
Benchmarking of Cryptographic Systems, http://bench.
crypto, October 2013.
Cloud Computing is utilized for service-based architecture.
To plough on cloud computing, the community must take [12] Dr.R.Shanmugalakshmi, M.Prabu – “Research Issues on
sincere and dedicated measures to ensure security. A Elliptic Curve Cryptography and Its applications”- IJCSNS
movement continues to adopt universal standards (for International Journal of Computer Science and Network
example, open source) to ensure interoperability among Security, VOL.9 No.6, June 2009.
service providers. [13] Wang, H., Sheng, B. and Li, Q. (2006) ‘Elliptic curve
cryptographybased access control in sensor networks’, Int. J.
ECC can be utilized as a part of mobile computing, remote Security and Networks,Vol. 1, Nos. 3/4, pp.127–137.
sensor systems, server based encryption, image encryption [14] Ms Bhavana Sharma, B.P.I.T., Rohini, Delhi-“security
and its application in each field of communication. Cloud
architecture of cloud computing based on elliptic curve
computing with ECC is a totally new area and has colossal
cryptography (ecc)” ICETEM 2013.
extent of research. The concern here is data security with
Elliptic curve cryptography to give secrecy and confirmation [15] Wikipedia, the free encyclopedia of Cloud Computing.
of data between clouds. In future, security issues of cloud [16] Khanna, D. (2019). Internet of Things Challenges and
computing can be focused more and an attempt can be made Opportunities. International Journal For Technological
Research In Engineering
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 36