A Comparative Analysis of Encryption Techniques An
A Comparative Analysis of Encryption Techniques An
1
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.16, June 2014
2
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.16, June 2014
pairs and if a pair ha same alphabet is separated by Diffie Hellman keys in exchange.
introducing a filler letter with ‘x’. Digital Signature used for authentication
AES encryption algorithm is used to encrypt or
5.2 Fully Homomorphic Encryption decrypt user’s data file.
Maha tebaa et al [15] proposed an application of a method to
execute operations on encrypted data without decrypting In cloud storage environment to avoid data modification, they
them, which will provide us with the same results after used two separate servers are maintained, one for encryption
calculations as if the authors have worked directly on the raw process known as computing platform and another one known
data. Homomorphic Encryption method is able to perform as a storage server for storing user data.
operations on encrypted data without decrypting.
Homomorphic Encryption systems are used to perform
5.4 Cloud DES Algorithm
operations on encrypted data without knowing the private key Neha Jain and Gurpreet et al [19] have proposed Data
(without decryption), the client is the only holder of the secret security in cloud computing using the DES algorithm. This
key. In their paper, a new concept of security which enables Cipher Block Chaining system is to be secure for clients and
providing results of calculations on encrypted data without server. The security architecture of the system is designed by
knowing the raw data on which the calculation was carried using DES cipher block chaining, which eliminates the fraud
out, in respect of the data confidentiality. The improvement of that’s occurring today with stolen data. The data which are
the complexity of the Homomorphic encryption algorithms sent, being intercepted and replaced has no danger. The
and compares the response time of the requests to the public system with encryption is acceptably secure, but that the level
key. of encryption has to be stepped up, as computing power
increases. Results in order to be secured the communication
Huda et al [16] proposed fully homomorphic encryption system between the modules are encrypted using a symmetric
(FHE) allows a user that does not have the secret decryption key. The author proposed that the cloud data security must be
key to compute any result of the data. The author focused considered to analyze the data security risk, the data security
technique is based on a FHE algorithm with key delegation to requirements, deployment of security functions and the data
ensure data confidentiality, authentication, integrity and security process through encryption. The main contribution of
availability of multi-level hierarchical order. Their proposed their paper is the new view of data security solutions with
framework solution is the using of homomophic cryptography encryption, which is important and can be used as reference
with Attribute Based Encryption. for designing the complete security solution.
Padmapriya et al Inverse Caesar Classical Substitution ASCII full characters Cloud Data Security
Cipher Cipher Same key used customer and and Privacy
for Encryption & (256 characters) Cloud provider
Decryption side
Sastry et al Playfair Cipher Classical substitution 5x5 matrix and Cloud Data Security
Cipher. Same key used Alphabetic characters customer and and Privacy
for Encryption & used Cloud provider
3
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.16, June 2014
Decryption side
Maha et al Fully The private key is used Cryptosystem based Cloud Data Security
Homomorphic for Encryption on fully provider side
Encryption (without Decryption) Homomorphic only
Encryption
Huda et al Fully The private key is used Electronic Health Cloud Data
Homomorphic for Encryption Records classify Customer and confidentiality,
Encryption (without Decryption) based on PI Cloud Provider Authentication,
(Personally side. Availability
Identifiable and Integrity.
information)
Sugumaran et al Block based Symmetric layer The private key Cloud Data Security
Symmetric inserted for encrypting concept is used Customer side and Privacy
Cryptography the secure data using a between sender and
symmetric algorithm receiver
Monikandan et al Classical Both Substitution and Palin text is Customer's Data Security
Encryption Transposition. Same converted to ASCII side only and Privacy
key used for code value, key range
encryption and between 1 to 256
Decryption
Neha Jain et al DES Algorithm The same key is used Cipher Block Both Cloud Data Security
for Encryption and Chaining mode customer and
Decryption Cloud provider
6. DATA SECURITY ISSUES IN CLOUD Use: This phase uses the data in the repository for
various processes.
COMPUTING
Data Security means protecting data from unauthorized Share: In this phase, the transmission of data occurs
access, modification or destruction. In the cloud model, between customers and the partners.
service provider is responsible for maintaining the data
security. Recently, technology has focused on only one stage Archive: In this phase, stored data is utilized for
for a data security life cycle, which is process manage from future use.
creation to destroy. Figure 2 explains the data security life Destroy: This phase will permanently remove the
cycle and the phases in it. data in the repository.
Create: This phase is the generation of new digital Data security threats can be classified into internal
content in client or server in the cloud. threats and external threats. Internal threats, mainly come
Store: This phase occurs simultaneously after the from an insider attack because cloud service providers
creation process, therefore storage of data occurs in and users, are the main reason for these threats. External
the repository or stored in multiple nodes. threats, mainly come from outside attack because data
can be accessed from third party. The attacker can steal
the user’s personal data. [21]. There are Six types of
major issues [22], while discussing data security in the
cloud.
Data Authentication
Data Privacy and Confidentiality
Data Integrity
Data Location
Data Availability
Data Storage, Backup and Recovery
4
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.16, June 2014
parallel with other users who may have a LAN or client [3] Donald, A. Cecil, S. Arul Oli, and L. Arockiam. "Mobile
credentials which may not be authenticated from the cloud. Cloud Security Issues and Challenges: A
Perspective." International Journal of Electronics and
6.2 Data Privacy and Confidentiality Information Technology (IJEIT), ISSN (2013): 2277-
Once the clients outsource data to the cloud there should be 3754.
assurance that data is accessible to only authorized users. The
cloud computing service provider should make secure the [4] Maneesha Sharma, Himani Bansal, Amit Kumar Sharma,
customer personal data is well protected from other service “Cloud Computing: Different Approach & Security
provider’s and user. Authentication is the best solution for Challenges”, International Journal of Soft Computing
data privacy because service provider must make sure who is and Engineering (IJSCE) ISSN: 2231-2307, Volume-2,
accessing the data and who is maintaining the server; so that Issue-1, March 2012.
the customer’s personal data is protected. The cloud customer [5] Sales force. Salesforce CRM applications and software
must be guaranteed that data stored in the cloud will be solutions. http://www.salesforce.com/eu/crm/products.jsp
confidential [22].
[6] Google, Google Apps. <http://www.google.com/apps/>.
6.3 Data Integrity [7] Sarvesh Kumar, Jahangeer Ali, Ashish Bhagat, Jinendran
Data Integrity means data is complete and consistent. The data
P.K, “An Approach to Creating a Private Cloud for
stored in the cloud may suffer from damage during integration
Universities and Security Issues in Private Cloud”
operations. The cloud provider must make the client aware of
International Journal of Advanced Computing, Vol. 36,
what particular data are outsourced to the cloud, the native
Issue 1, ISSN: 2051- 0845, 2013.
and the integrity mechanisms put in place [22].
[8] Cecil A Donald and L Arockiam. Article: Securing Data
6.4 Data Location with Authentication in Mobile Cloud Environment:
The cloud users did not know where the data will be hosted Methods, Models and Issues. International Journal of
and in fact, their users want to know the location exactly. It Computer Applications 94(1):25-29, May 2014.
requires a contractual agreement between the users that data Published by Foundation of Computer Science, New
should stay in a particular location. York, USA.
6.5 Data Availability [9] Microsoft. Microsoft Windows Azure.
Data provided by the customer is normally stored in different <http://www.microsoft.com/windowsazure/>.
servers often placing in different locations or in different [10] Amazon. Amazon Elastic Compute Cloud (EC2).
clouds. Data availability becomes a major legitimate issue as <http://aws.amazon.com/ec2/>.
the availability of corrupted and relatively difficult servers.
[11] Padmapriya and Subhasri,”Cloud Computing: Security
6.6 Data Storage, Backup and Recovery Challenges & Encryption Practices”, International
The cloud users decide to move their data to the cloud Journal of Advanced Research in Computer Science and
provider should ensure adequate resilience storage systems. Software Engineering, Volume 3, Issue 3, ISSN: 2277
The process of recovering and backing up data is simplified. 128X, March 2013.
The cloud providers will store the data in several places across
many independent servers. [12] C. Gentry, "Computing Arbitrary Functions of Encrypted
Data", ACM, Vol. 53, Issue 3, March 2010, pp. 97-105.
7. CONCLUSION [13] Padmapriya, Subhasri,” Cloud Computing: Reverse
Cloud computing is a versatile technology, widely studied in
Caesar Cipher Algorithm to Increase Data Security”,
recent years. The providers and the clients must make sure
International Journal of Engineering Trends and
that the cloud is safe from all the internal threats, external
Technology (IJETT), Volume 4, Issue 4, 2013.
threats and mutual understanding between the customer and
provider when it comes to the security of cloud. The major [14] V.U.K. Sastry, N. Ravi Shankar and S. Durga Bhavani,
issues in cloud computing is data security and it has many “A Generalized Playfair Cipher involving Intertwining,
aspects like confidentiality, Integrity, surveillance, reliability, Interweaving and Iteration”, International Journal of
availability, Security, anonymity, telecommunications Network and Mobile Technologies, pp 45-53, 2010.
capacity, government and backup & recovery. But the most
important issue in data security is security and privacy for [15] Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI
protecting the data in cloud storage. This paper analyses the “Homomorphic Encryption Applied to the Cloud
importance of the data security in the cloud. Reason for Computing Security” Proceedings of the World Congress
choosing symmetric encryption algorithms are effective to on Engineering, London, U.K. ISBN: 978-988-19251-3-8
handle encryption for large amount of data, and effective ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online), Vol
speed of storing data in the cloud. In this paper, table 1 1, July 4 - 6, 2012.
explains the comparison among various encryption techniques [16] Huda Elmogazy, Omaima Bamasak,” Towards
used in the cloud. Healthcare Data Security in Cloud Computing”, IEEE
8th International Conference for Internet Technology and
8. REFERENCES Secured Transactions (ICITST-2013).
[1] P. Mell and T. Grance, “The NIST Definition of Cloud
Computing”, September 2011. [17] Sugumaran, BalaMurugan. B, D. Kamalraj,” An
Architecture for Data Security in Cloud Computing”,
[2] Anwar J. Alzaid, Eng. Jassim M. Albazzaz, “CLOUD IEEE World Congress on Computing and
COMPUTING: AN OVERVIEW”, International Journal Communication Technologies 2014.
of Advanced Research in Computer and Communication
Engineering, Vol. 2, Issue 9, September 2013.
5
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.16, June 2014
[18] Prashant Rewagad, Yogita Pawar,” Use of Digital Tiruchirappalli, Tamil Nadu, India. She had attended several
Signature with Diffie Hellman Key Exchange and AES National and International Workshops and Conferences. Her
Encryption Algorithm to Enhance Data Security in Cloud area of research is Cloud Computing. Her areas of interest are
Computing”, 2013 IEEE International Conference on Networks Security, Software Programming and Web
Communication Systems and Network Technologies. Developing Technologies.
[19] Neha Jain and Gurpreet Kaur,” Implementing DES A. Cecil Donald received his Masters in Software
Algorithm in Cloud for Data Security”VSRD-IJCSIT, Engineering from Anna University, Chennai, India. He has
Vol. 2 (4), 2012, 316-321. one year experience in IT industry as a Software Developer.
Currently, he is a Ph.D. research scholar in the department of
[20] L. Arockiam, S. Monikandan,” Data Security and Computer Science at St. Joseph’s College (Autonomous),
Privacy in Cloud Storage using Hybrid Symmetric Tiruchirappalli affiliated to Bharathidasan University, India.
Encryption Algorithm”, International Journal of His main area of research is Mobile Cloud Computing. He has
Advanced Research in Computer and Communication published several papers in the International Journals and also
Engineering Vol. 2, Issue 8, August 2013. he has atteneded several national and international
[21] Xiaojun Y, Qiaoyan Wen,” A View about Cloud Data conferences and workshops.
Security from Data Life Cycle”, IEEE 2010. Dr. L. Arockiam is working as Associate Professor in the
[22] Parsi Kalpana and Sudha Singaraju, “Data Security in Department of Computer Science, St.Joseph’s College
Cloud Computing using RSA Algorithm”, International (Autonomous), Tiruchirappalli, Tamil Nadu, India. He has 25
Journal of Research in Computer and Communication years of experience in teaching and 18 years of experience in
technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, research. He has published more than 187 research articles in
September 2012. the International & National Conferences and Journals. He
has also presented 2 research articles in the Software
9. AUTHORS BIOGRAPHY Measurement European Forum in Rome. He has chaired many
N. Hemalatha is doing M. Phil research in the Department of technical sessions and delivered invited talks in National and
Computer Science, St. Joseph’s College (Autonomous), International Conferences. He has authored 3 books. His
Tiruchirappalli, Tamil Nadu, India. She had attended several research interests are: Cloud Computing, Big Data, Cognitive
National and International Workshops and Conferences. Her Aspects in Programming, Data Mining and Mobile Networks.
area of research is Cloud Computing. Her area of interest is He has been awarded “Best Research Publications in Science”
Networks Security, Software Engineering and Web for 2009, 2010 & 2011 and ASDF Global “Best Academic
Technologies. Researcher” Award from ASDF, Pondicherry for the
academic year 2012-13 and also the “Best Teacher in college”
A. Jenis is doing MPhil research in the Department of award for the year 2013 & 2014.
Computer Science, St. Joseph’s College (Autonomous),
IJCATM : www.ijcaonline.org 6