0% found this document useful (0 votes)
9 views

Applying_Encryption_Algorithm_for_Data_S

The document discusses the importance of data security and privacy in cloud computing, highlighting the challenges posed by security threats and vulnerabilities. It emphasizes the use of encryption algorithms, particularly a combination of public and private key encryption, to protect sensitive data in cloud storage. The paper also outlines various cloud service models and deployment types, while addressing issues such as trust, privacy, security, and data ownership.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Applying_Encryption_Algorithm_for_Data_S

The document discusses the importance of data security and privacy in cloud computing, highlighting the challenges posed by security threats and vulnerabilities. It emphasizes the use of encryption algorithms, particularly a combination of public and private key encryption, to protect sensitive data in cloud storage. The paper also outlines various cloud service models and deployment types, while addressing issues such as trust, privacy, security, and data ownership.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IJCSI International Journal of Computer Science Issues, Vol.

10, Issue 1, No 1, January 2013


ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 367

Applying Encryption Algorithm for Data Security and Privacy in


Cloud Computing
Mohit Marwaha1, Rajeev Bedi2
1
Computer Science And Engineering, Punjab Technical University, Beant College of engineering and Technology
Gurdaspur, Punjab, India

2
Computer Science And Engineering, Punjab Technical University, Beant College of engineering and Technology
Gurdaspur, Punjab, India

Abstract protection, availability Reliability, Ownership, Data


Cloud computing is the next big thing after internet in the field of Backup, Data Portability and Conversion, Multiplatform
information technology; some say it’s a metaphor for internet. It Support and Intellectual Property.
is an Internet-based computing technology, in which software,
shared recourses and information, are provided to consumers and
devices on-demand, and as per users requirement on a pay per
2. Cloud Computing Framework
use model. Even though the cloud continues to grow in
popularity, Usability and respectability, Problems with data Service Models: These three are the most widely used
protection and data privacy and other Security issues play a service models of cloud computing.
major setback in the field of Cloud Computing. Privacy and
security are the key issue for cloud storage. Encryption is a well 2.1 Software as a service.
known technology for protecting sensitive data. Use of the
combination of Public and Private key encryption to hide the Software-as-a-Service (SaaS): It is also referred as
sensitive data of users, and cipher text retrieval. The paper
software available on demand, it is based on multi-tenant
analyzes the feasibility of the applying encryption algorithm for
data security and privacy in cloud Storage.
architecture. Software like word processor, CRM
(Customer Relation Management), etc. or application
Keywords: Cloud Storage, Cipher text retrieval, encryption services like schedule, calendar, etc. are executed in the
algorithm. “cloud” using the interconnectivity of the internet to do
manipulation on data. Custom services are combined with
3rd party commercial services via Service oriented
1. Introduction architecture to create new applications. It is a software
delivery for business applications like accounting, content
Cloud computing is a flexible, cost- effective and proven delivery, Human resource management (HRM), Enterprise
delivery platform for providing business or consumer IT resource planning (ERP) etc on demand on pay-as-you go
services over the Internet. Cloud computing supports model[1].
distributed service oriented architecture, multi-users and
multi-domain administrative infrastructure, it is more 2.2 Platform as a Service.
prone to security threats and vulnerabilities. At present, a
major concern in cloud adoption is its security and Platform-as-a-Service (PaaS): This layer of cloud provides
Privacy. Intrusion prospects within cloud environment are computing platform and solution stack as service.
many and with high gains. Security and Privacy issues are Platform-as-a-Service provides the user with the freedom
of more concern to cloud service providers who are of application design, application development, testing,
actually hosting the services. In most cases, the provider deployment and hosting as well as application services
must guarantee that their infrastructure is secure and such as team collaboration, web service integration and
clients’ data and applications are safe by implementing database integration, security, scalability, storage,
security policies and mechanisms. While the cloud persistence, state management, application versioning,
customer must ensure that provider has taken proper without thinking about the underlying hardware and
security measures to protect their information. The issues software layers by providing facilities required for
are organized into several general categories: trust, completion of project through web application and services
architecture, identity management, software isolation, data via Internet.

Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 368

2.3 Infrastructure as a Service. 4. Issues in Cloud Data Storage.


Infrastructure-as-a-Service (IaaS): Infrastructure as a
service delivers a platform virtualization environment as a Cloud Computing moves the application software and
service. Instead of purchasing servers, software, data databases to the large data centers, where the management
center space or network equipment, clients can buy these of the data and services may not be fully trustworthy. This
resources as outsourced service. In other words the client unique attribute, however, poses many new security
uses the third party infrastructure services to support its challenges which have not been well understood. In this
operations including hardware, storage, servers and article, we focus on cloud data storage security, which has
networking components. always been an important aspect of quality of service. To
ensure the correctness of users’ data in the cloud.
3. Cloud Deployment Models
A. Trust: Trust is defined as
There are three types cloud Deployment models that reliance on the integrity, strength, ability and surety of a
widely used are: person or thing. Entrusting your data on to a third party
who is providing cloud services is an issue. Recent
incidents like In April of 2012 Amazon's Elastic Compute
3.1 Public.
Cloud service crashed during a system upgrade, knocking
customers' websites off-line for anywhere from several
It is referred as external cloud or multi-tenant cloud, this
hours to several days. That same month, hackers broke into
model represents an openly accessible cloud environment
the Sony PlayStation Network, exposing the personal
in this cloud can be accessed by general public. Customer
information of 77 million people around the world. And in
can access resources and pay for the operating resources.
June a software glitch at cloud-storage provider Dropbox
Public Cloud can host individual services as well as
temporarily allowed visitors to log in to any of its 25
collection of services
million customers' accounts using any password or none at
all. These issues have certainly created doubts in mind of
3.2 Private. cloud consumers and damaged the trust ability of
Consumers [4].
It is also known as internal cloud or on-premise cloud, a
private cloud provides a limited access to its resources and B. Privacy: Different from the traditional computing
services to consumers that belong to the same organization model, cloud computing utilizes the virtual computing
that owns the cloud. In other words, the infrastructure that technology, users’ personal data may be scattered in
is managed and operated for one organization only, so that various virtual data center rather than stay in the same
a consistent level of control over security, privacy, and physical location, even across the national borders, at this
governance can be maintained. time, data privacy protection will face the controversy of
different legal systems. On the other hand, users may leak
3.3 Hybrid. hidden information when they accessing cloud computing
services. Attackers can analyze the critical task depend on
A hybrid cloud is a combination of public and private the computing task submitted by the users [9].
cloud. It provides benefits of multiple deployment models.
It enables the enterprise to manage steady-state workload C. Security: Cloud service providers employ data storage
in the private cloud, and if the workload increases asking and transmission encryption, user authentication, and
the public cloud for intensive computing resources, then authorization. Many clients worry about the vulnerability
return if no longer needed. of remote data to criminals and hackers. Cloud providers
are enormously sensitive to this issue and apply substantial
3.4 Community. resources to mitigate this problem.

This deployment model share resources with many D. Ownership: Once data has been relegated to the cloud,
organizations in a community that shares common some worry about losing their rights or being unable to
concerns (like security, governance, compliance etc). It protect the rights of their customers. Many cloud providers
typically refers to special-purpose cloud computing address this issue with well-skilled user-sided agreements.
environments shared and managed by a number of related According to the agreement, users would be wise to seek
organizations participating in a common domain or vertical advice from their favourite legal representative [10].
market [12].

Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 369

E. Performance and Availability: Business organizations Objective of our System.


are worried about acceptable levels of performance and
1. To develop a system that will Provide Security and
availability of applications hosted in the cloud.
Privacy to Cloud Storage
F. Legal: There are certain apprehensions for a cloud 2. To Establish an Encryption Based System for protecting
service provider and a client receiving the service like Sensitive data on the cloud and Structure how owner and
location of the cloud provider, infrastructure and physical storage Service Provider to operate on encrypted Data
location of the data and outsourcing of the cloud provider’s 3. To Create a System where the user store its data on the
services etc. cloud the data is sent and stored on the cloud in encrypted
G. Multiplatform Support: More an issue for IT form As in normal cases in cloud computing when a user
departments using managed services is how the cloud- login to the cloud and they store data on cloud storage
based service integrates across different platforms and device the data stored on the server cloud is not much
operating systems, e.g. OS X, Windows, Linux and thin- secure as it can be readable to anyone which have
clients. Usually, some customized adaption of the service permission to access and Leaving data vulnerable,
takes care of any problem. Multiplatform support 4. To Develop a retrieval System in which the data is
requirements will ease as more user interfaces become retrieved by the user in encrypted form and is decrypted by
web-based. the user at its own site using a public and private key
H. Intellectual Property: A company invents something encryption both the keys working at the user level.
new and it uses cloud services as part of the invention. Is
6. Conclusion
the invention still patentable? Or there can be issues like
cloud service provider can make claim for that invention or Our research indicates that that Security and Privacy are
leak the information to the competitor. the major issues that are needed to be countered, efforts
are being made to develop many efficient System That can
I. Data Backup: Cloud providers employ redundant servers
Provide Security and privacy at the user level and maintain
and routine data backup processes, but some people worry
the trust and intellectual property rights of the user. Our
about being able to control their own backups. Many
method States Encryption is one such method that can
providers are now offering data dumps onto media or
provide peace of mind to user and if the user have control
allowing users to back up data through regular downloads.
over encryption and decryptions of data that will boost
J. Data Portability and Conversion: Some people have consumer confidence and attract more people to cloud
concerns like, switching service providers; there may be platform.
difficulty in transferring data. Porting and converting data
is highly dependent on the nature of the cloud provider’s
data retrieval format, particular in cases where the format References
cannot be easily revealed. As service competition grows [1]http://en.wikipedia.org/wiki/Cloud_computing.
and open standards become established, the data [2] Rich Maggiani, solari communication. “Cloud computing is
portability issue will ease, and conversion processes will changing how we communicate”.
become available supporting the more popular cloud [3] Randolph Barr, Qualys Inc, “How to gain comfort in losing
control to the cloud”.
providers. Worst case, a cloud subscriber will have to pay [4] Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni,
for some custom data conversion. Harold Hall, HiPODS, www.ibm.com/
These are certain areas in which cloud computing requires developerworks/websphere/zones/hipods
to excel and solve problem related to it. Out of all the [5] http://www.roughtype.com.
[6] Tharam Dillon, Chen Wu, Elizabeth Chang, 2010 24 th IEEE
problems Security, Privacy and Intellectual property put
International Conference on Advanced Information Networking
the major threats on growth of cloud computing that are and Applications ,“Cloud computing: issues and challenges”.
needed to be worked upon. [7]June13,2009,http://server.zol.com.cn/183/1830464.html.
[8] Elinor Mills, January 27,2009. “Cloud computing security
forecast: clear skies”.
5. OVERVIEW OF OUR APPROACH [9] Jianchun Jiang, Weiping Wen, “Information security issues in
cloud computing environment”, Netinfo
Our goal is to build up a repository to facilitate the data Security,doi:10.3969/j.issn.1671-1122.2010.02.026.
integration and sharing across cloud along with [10] Jianchun Jiang, Weiping Wen, “Information security issues
preservation of data confidentiality. For this we will be in cloud computing environment”, Netinfo
using an encryption technique to provide data security on Security,doi:10.3969/j.issn.1671- 1122.2010.02.026. of virtual
machines” In Proc. Of NSDI’05, pages 273-286, Berkeley CA,
data storage [16].
USA, 2005. USENIX Association.

Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814
www.IJCSI.org 370

[11] Eucalyptus Completes Amazon Web Services Specs with


Latest Release.
[12] Open Cloud Consortium.org.
[13] July 27,2009. Available from http://fx.caixun.com/.
[14] Jack Schofield. Wednesday 17 June 2009 22.00 BST,
http://www.guardian.co.uk/technology/2009/jun/17/cloud-
computingjack- schofield.
[15] Gartner. “Seven cloud-computing security risks”.
[16] Ranjita Mishra “A Privacy Preserving Repository for
Securing Data across the Cloud”.

First Author Mohit Marwaha completed BTech from Beant


College of Engineering and Technology in 2008 Pursuing MTech
from Beant College of Engineering and Technology I have
published two papers one in an international jouranal and other in
an international conference and is presently working with Beant
college of Engineering and Technology as Assistant Professor.
Area of Research is security on cloud computing.

Second Author Rajeev Bedi completed B.Tech Computer


Science and Engineering in 2000 and M.Tech. Computer Science
and Engineering in 2008 from Punjab Technical University,
Jalandhar and Pursuing PhD from CMJ University Shillong.
Currently Working as Assistant Professor in Beant College of
Engineering and Technology, Gurdaspur since 2004. I am
Reviewer of IJCSIT journal. I have 13 publications in different
Internationl, National Journals and Conferences. My current
research interest is Cloud Computing.

Copyright (c) 2013 International Journal of Computer Science Issues. All Rights Reserved.

You might also like