A_modified_cryptographic_approach_for_securing_distributed_data_storage_in_cloud_computing
A_modified_cryptographic_approach_for_securing_distributed_data_storage_in_cloud_computing
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
unauthorised user to reach the sensitive data. easy to find since the key size is usually
Besides this, it should also restrict cloud providers maintained to be the same as that of plaintext size.
from accessing the data. That is, the user should The randomness in cipher text is less that results
be assured that their data remains confidential, by in more easy way to trace the key. For example in
following proper policies. any text containing meaningful sentences, the
character that will be probably more in use is the
2. Data availability: single space. Hence it is easy for the hacker to
trace the character that is more in use in the cipher
The data, once decided to store in the cloud, text. This makes it easy to match the plain and
can reside anywhere in the cloud and in case of cipher texts, using which the key value can be
any failure in the retrieval, data must be available found easily by XORing both of them [9]. Hence,
in another alternate cloud for the user. through brute force method, if the key is found,
then the encryption proves to be useless.
B.EXISTING TECHNIQUES
III.PROPOSED MODEL
a)Authorisation Mechanism
User saves data by providing credentials with The proposed model consists of three phases as
username and password. This acts as the shown in Fig.1,
authorisation for the data so that any unauthorised A. Before sending into cloud
user cannot access the data. This mechanism is This phase deals with the preparation of
less secure since that if the credentials are hacked, data to send into the cloud. That is, it deals with
it is very easy to reach the data. Moreover for the data split and the encryption process.
cloud storage, this is totally insecure for 1. Data split
confidential and private data because it is possible 2. Encryption
for the cloud service provider to directly reach the B. Cloud storage
data. This phase deals with the storing of data
into the cloud, that is, the data being uploaded into
1.1.1 b)No split Mechanism and downloaded from the cloud.
1. Upload
This mechanism is mostly used for the cloud 2. Download
storage where it follows that the data of the user, Retrieving from the cloud
to be stored in cloud is encrypted before storing. This phase deals with the retrieval of the
The encryption is done for the whole data. This data from cloud and getting the original data, the
mechanism is secure than the authorisation data being downloaded from the cloud is the split
technique since the cloud provider cannot reach one, and hence this phase first decrypts the split
the data directly. But this method has its flaw that data and then it merges it.
if the encryption algorithm is hacked, it is possible 1. Decryption
for anyone to know the data since it is saved on the 2. Data merge
whole. Any brute-force that hacks the encryption
will be able to decrypt the whole data.
132
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
1.2.1 1. DATA SPLIT Two cloud accounts are created for the
The module deals with splitting the storage of text files. The access key is used to link
input file into two based on a random text in the to the cloud accounts.
file and encrypting them before storing into the
cloud. The input text file name is provided by the a) Upload
user that is taken for the split operation. A random
text is chosen from the file based on which the The files generated from the
split operation takes place. The file is split into encryption process are uploaded into the cloud
three parts containing the part of file before accounts. The access keys of the respective
random text, second as the random text and the accounts are used that uploads the files into
third part containing text after the random text. corresponding Dropbox accounts.
1. The input file is opened and read line by line The encrypted files that are stored in
the cloud are specified with their path so that they
2. A random text is chosen from the file can be downloaded. Two files are created to store
the contents of the downloaded files.
3. Based on the random text, the file is split into two These downloaded files are
decrypted to get the original text.
and saved in two separate files.
4 DECRYPTION
133
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
b) Encryption 3. This ptext is the original text to be used by
the user.
c) Decryption
2. DIFFIE-HELLMAN
a) Key Generation Diffie-hellman algorithm is generally used
Generation of key takes place before the in key exchange process such that both the sender
encryption step. It generates both the private and and receiver can calculate the key efficiently. In
the public key pair. our model, the diffie-hellman algorithm is used
along with RSA to randomize the cipher text
Steps: achieved. It can also be used efficiently in the
future in case we include sender- receiver concept.
1. Pick two different integers x and y, both
are to be prime. They are chosen at STEPS:
random and to be of same length.
a) Key Generation
2. Calculate p = x* y.
3. Calculate t(p) = (x-1) * (y-1), where t(p) 1. Choose a,b,g,r as four random integers
is the Euler’s totient function.
4. Pick a random prime number e, such that 2. Compute x as (g^a) mod r
1 < e < Ø(n) and e and Ø(n) are coprime. 3. Compute y as (g^b) mod r
5. calculate d as follows:
6. d = e-1(mod t(p)) i.e., d is the 4. Compute k1 as (y^a) mod r and kept as public
multiplicative inverse of e mod t(p). key
7. d is the Private- Key , such that d * e = 1
mod t(p). 5. Compute k2 as (x^a) mod r and kept as private
8. The Public-Key is, (e, p). key
9. The Private-Key is (d, p)
b) Encryption
b) Encryption
Encryption process converts the plain text or The cipher text is calculated as:
the original text into the cipher text
1. C=k1^m
Steps:
134
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
A. INTELLIGENT APPROACH B. MODIFIED APPROACH
The data to be stored D is encrypted by XORing Here the data undergoes a two level
it with the key 0100 as shown in Fig.2. The data to encryption by RSA followed by diffie-hellman
be stored is encrypted by XORing with the key before the cloud storage. It is shown from the
100. Here, if the key is found through brute force Fig.3. . that each of the character in the plain text
method, it is very easy for the hacker to decrypt is encrypted to get a 4 digit long integer that is
difficult to predict. Further, the two step
encryption process ensures double security to the
data. Thus the method provides security to the data
stored in cloud without much difficulty in the
merging process.
the text.
135
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
Fig.3. An example for modified cryptographic approach
V. SAMPLE RESULTS
136
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
Fig.4. Input file
137
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
Fig.7. Output file
138
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.
[6] Parsi Kalpana,, “Data Security in Cloud
VII.CONCLUSION AND FUTURE WORK
Computing using RSA Algorithm, International
Journal of Research in Computer and
Thus through our approach, the Communication technology”, IJRCCT, Vol 1,
cloud provider cannot directly reach the data. This Issue 4, September 2012.
technique provides double security to the data
stored in cloud and it is easy to integrate, that
[7] S. Liu , Q. Qu , L. Chen , L. Ni , SMC:
defends malicious activities occurred on the cloud
“A practical schema for privacy-preserved data
server. It also ensures data retrievability.
sharing over distributed data streams”, IEEE
Distribution of data ensures security of sensitive
Trans. Big Data 1 (2) (2015) 68–81
data. Future work would address securing data
[8] Zaid Kartit, Mohamed El Marraki,”
duplications in order to increase the level of data
Applying Encryption Algorithm to Enhance Data
availability. Future work would also include
Security in Cloud Storage”, Engineering Letters,
compression of the encrypted data that is slightly
23:4
of heavier weight.
[8] Yibin Li, Keke Gai, Longfei Qiu,
REFERENCES
Meikang Qiu, Hui Zhao, “Intelligent cryptography
approach for secure distributed big data storage in
[1] V. Chang , M. Ramachandran ,
cloud computing”, Information Sciences, in press
“Towards achieving data security with the cloud
computing adoption framework”, IEEE Trans.
Serv. Comput. 9 (1) (2016) 138–151 .
139
Authorized licensed use limited to: COMSATS INSTITUTE OF INFORMATION TECHNOLOGY. Downloaded on October 24,2024 at 09:27:05 UTC from IEEE Xplore. Restrictions apply.