0% found this document useful (0 votes)
4 views

Double Encryption Using AES and RSA Algorithm

The document presents a method for efficient and secure file transfer in cloud computing using a double encryption technique that combines AES and RSA algorithms. This approach enhances data security by encrypting files twice, addressing concerns about data integrity, confidentiality, and speed. The study compares the proposed method with existing encryption techniques, demonstrating improved security and performance metrics.

Uploaded by

Phan Thắm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Double Encryption Using AES and RSA Algorithm

The document presents a method for efficient and secure file transfer in cloud computing using a double encryption technique that combines AES and RSA algorithms. This approach enhances data security by encrypting files twice, addressing concerns about data integrity, confidentiality, and speed. The study compares the proposed method with existing encryption techniques, demonstrating improved security and performance metrics.

Uploaded by

Phan Thắm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

2021 International Conference on Emerging Smart Computing and Informatics (ESCI)

AISSMS Institute of Information Technology, Pune, India. Mar 5-7, 2021

Efficient and Secure File Transfer in Cloud Through


Double Encryption Using AES and RSA Algorithm
K.Jaspin Shirley Selvan Sahana.S
Assistant Professor, Associate Professor, UG Scholar,
2021 International Conference on Emerging Smart Computing and Informatics (ESCI) | 978-1-7281-8519-4/20/$31.00 ©2021 IEEE | DOI: 10.1109/ESCI50559.2021.9397005

St.Joseph’s Institute of Technology, St. Joseph’s College of Engineering, St.Joseph’s Institute of Technology,
Chennai, Tamil Nadu, Chennai, Tamil Nadu, Chennai, Tamil Nadu,
India 600119, India 600 119, India 600 119,
[email protected] [email protected] [email protected]

Thanmai.G
UG Scholar,
St.Joseph’s Institute of Technology,
Chennai, Tamil Nadu,
India 600 119,
[email protected]

Abstract—With recent advances in Cloud computing, fragmentation, encryption and dispersion. Fragmentation
information is being contracted by cloud services. Dropbox methods used a public cloud of the less confidential data
and Google Drive provide cloud services to users with low-cost fragments [1]. We prefer to present a novel data protection
storage. Here we present a protection method by encrypting scheme by using a double encryption technique using AES
and decrypting the files which offer an enhanced level of and RSA algorithm for encryption and decryption.
protection. To encrypt the file that we upload in cloud, we
make use of Double encryption technique. The file is being II. RELATED WORKS
encrypted twice using the two algorithms one after the other.
The file is first encrypted using AES algorithm and then by Yibin Li et.al, [1] focused on the data over collection
RSA algorithm. The corresponding keys are being generated problem.They tried to put all customer details into a cloud
during the execution of the algorithm. This technique the security of customer details could be increased They
increases the security level. The various parameters that we have explored various experiments and the output shows the
have considered here are security level, speed, data effectiveness of their approach. Their most direct
confidentiality, data integrity and cipher text size. Our method improvement was reducing the storage in customer
is more efficient as it satisfies all the parameters where the smartphone Pictures, videos and other storage information or
conventional methods failed to do so. The cloud we used to data occupy more storage space so these are vacated which
store the content of the file is DropBox, which is in the enable users to install new applications. They showcased an
encrypted format using AES and RSA algorithms. active approach. Whenever an application requires customer
data it needs to access request in cloud.
Keywords—Double Encryption, Security in Cloud storage,
Security analysis, AES, RSA. Liwei Kuang et.al [2], implemented a method that could
process large scale heterogeneous data that safely
I. INTRODUCTION decompose a tensor [15][37]. Tensor is used in applications
In this fast-moving world data security plays a vital role. that are rich in data or information [15]. Required number of
Cloud is becoming very much popular with the person users orthogonal bases is multiplied along with the core tensor.
for the purpose of data storage. Cloud platform has been Fully homomorphic encryption is used to encrypt the data,
used by the individual's as it offers a lot of free services. after which decomposition is performed by an algorithm. It
Cloud-based services like DropBox provide personal users could secure data processing on the cloud. A security
with cost effective storage, but this can affect fidelity of the scheme for cluster management detailed by Jun Wu et.al
service provided. As they give a lot of services at low-cost provides high security [3].
this situation raises the problem of trustworthiness of Cloud Krikor et.al, in [4] presented a selective encryption
service providers. The necessity to secure data has also been method by using high frequency DCT coefficients that
increased drastically. There are many attacks known in the contain more visual information. Security is added to the
cloud. Some privacy and security breaches are also observed encrypted block by making use of shuffling method. The use
in today’s cloud services [1] [2] [3]. The service providers of DCT transform helps in data reduction. It is well known
also face many external attacks. In 2018, cosmetic data was that multimedia data are compressed using DCT. At the
looted from a wellness system in Singapore. In such cases, receiver end, Han Qui et.al [5] estimated the DC
people lose their confidence in providers. Personal data coefficients, which help to reduce the transmission error.
could be used as in the case of Cambridge Analytica data
scandal [1]. Therefore, it becomes necessary that end users Andreas Pommer et.al in [6] designed a scheme to
protect their data from providers by keeping the data onto protect content and provide security for a specific
the personal computer. The other solution will be to use the multimedia application. This scheme which made use of
encryption algorithms. Our base paper suggested the idea of classical ciphers on the multimedia proved to be inefficient
selective encryption along with novel data protection such as as it required high computation. Med Karim Abdmouleh
et.al [7] encrypted the LL band after performing DWT on

978-1-7281-8519-4/21/$31.00 ©2021 IEEE 791

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
the image. This method proved to be fast, robust, and encrypted data. They also tried to improve the time for multi
efficient. Keke Gai et.al, in [8] proposed CRN it is widely keyword search over the RSA.
used in wireless networking. CRN make use of WSGNs.
Their proposed approach was examined and the outputs A more secure algorithm implemented in VHDL used a
were positive. A method of data storage from end-users to digital signature [19]. The usage of both cryptography and
clouds was presented by Han Qiu et.al [9]. Zafar Shahid et.al steganography at the same time improved security to a large
[10] presented a selective encryption idea that satisfies all extent [20]. Naga Hemanth et.al in [21] proposed an RSA
real time constraints. In spite of Data integrity being an algorithm for the purpose of security of the information and
essential factor, it was not considered in earlier SE methods the key which is used for encrypting the information or data.
[11]. Image quality and Integrity are not assured in fractional This methodology is implemented in three steps. In the first
wavelet based SE methods [12]. step text is been encrypted using playfair cipher which make
use of 9x6 matrices. The second step deals with XOR
In another method, data packets are checked if required operation carried out between key and encrypted text. At the
to be split during operation period. It provides security and last step of encryption the key was made using the RSA
can guard threats from clouds [12]. Han Qiu et al [13] did algorithm and further XOR operation was continued. Finally
DCT on bitmap images and tried to reduce rounding errors the encrypted information along with key is received and
and recovery from non-selected DCT coefficients. Another decrypted to read the message. This algorithm provided by
encryption algorithm uses a secret key, a map to change them provides extra security among the existing algorithms.
positions of image pixels and a second map to modify A hybrid encryption algorithm that could protect data in
intensity of image pixels. This method could enhance Cloud used three encryption keys [22]. An Enhanced RSA
security to a large level [14]. algorithm made it difficult for data stealing and consumed
less time [23].
Han Qiu Et.al in [14] proposed an image protection with
shorter calculation resources but with larger image input. III. SYSTEM DESIGN
The traditional encryption method is very slow. As it is not
fast it consumes a lot of CPU calculation resource. For this We propose a method that provides high security. The
issue they came up with a combined selective encryption user uploads a file into the cloud which has public and
along with the current GPGPU acceleration. Yulen Sadourny private fragments. The private fragment is supposed to
et al [15] proposed selective encryption and impact of securely protect. As said before we have proposed to use the
signaling information. When the signaling was taken into Double Encryption Technique. For Double Encryption the
account there was lot of problems, So they tried to resolve algorithms that we have used are AES and RSA. Here we
by applying the selective encryption scheme. This was first encrypt the private fragment containing the important
implemented because the image code stream provided extra information with AES128. After the first encryption is over
information to the transcoding application the corresponding key is generated. This encrypted file is
again subjected to encryption with another algorithm.
W.Puech et al [16] incorporated AES cipher to encrypt
JPEG images. A major advantage of this method is the Figure 1 shows the process of how a file is being
reduction of calculation resources for big sized data. Ayoub uploaded. Initially the user first registers and then logs into
Massoudi et al [17] proposed a cost effective encryption the profile. The user then selects the file which he wanted to
method for JPEG2000 . Harshitha.Y et.al in [18] proposed a upload into the cloud to keep it safe. After choosing the file
study which is based on keyword and multi-keyword. this some internal process is undergone by the file before it gets
compares the term efficiency. Here the performance is uploaded. First the file is being encrypted using the AES
calculated based on the speed of search done over the algorithm and then by RSA algorithm. Double Encryption is
done for security purposes.

Fig. 1. File Upload Process

792

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
Figure 2 shows the system architecture for file download The various keys used by this algorithm are 128,192,256
purpose. The user again logs into account. The user views bits.It is considered as the most secured algorithm.
the cloud to check out the files that are being uploaded by
others. The user requests the file that he wishes for. This file
request is sent to the owner of the file. If the owner of the
file wishes to grant access he accepts the request otherwise
he deletes it. If the request is accepted, send the key to the
user through Email to open the file. The requested user shall
make the user of the key to download the file to view or read
it. The downloaded file gets stored in the requested user’s
system

Fig. 3. Working of AES Algorithm

B. Working of RSA Algorithm [24]


Step 1: Generating Public Key:
x Select two prime numbers. Suppose p=53 and q=59
x Now we have to compute the public key which is
done as follows : we require n and e
x n is computed as n = p*q (3127)
x e is an integer but not a factor of n. e should be like
1< e < (n). So the value of e is taken as 3.
Now our public key is created using n and e.

Step 2: Generating Private Key: [24]


x Here we need to calculate (n) in such a way that
(n) = (p -1) (q-1). Here, (n)=3016.
x Now we calculate private key d as d = (k*(n) + 1) /
e for some integer k
If we take k as 2 then d is 2011. Now we are ready with
our
Fig. 2. File Download Process
x Public Key (n = 3127 and e = 3) and
IV. IMPLEMENTATION
x Private Key (d = 2011)
The system has been implemented using AES and RSA
algorithms. Both the algorithms are explained here. Step 3: Encryption and Decryption [24] [25]
A. Working of AES Algorithm Now we can encrypt and decrypt using an example. Let
the example be “HI”
1. Obtain the key from cipher key.
2. Assign the plain text to state array. x Convert the letters to numbers: H=8 and I=9
3. Prefix state array with initial round key. x The encryption formula is c = 89e mod n (1394 for
4. Perform manipulation nine times. the example)
5. Carry out the tenth and last manipulation. x The decryption formula is m = cd mod n (the
6. Copy cipher text. encrypted data comes out as 89 which is nothing but
“HI”).
Figure 3 represents the working of AES algorithm. AES
is an iterative cipher. It is symmetrical block cipher V. EXPERIMENTAL RESULT
algorithm. It is capable of encrypting 128 bits of plain text. Table I refers to the comparison of proposed work with
existing tables. In our project we consider parameters such

793

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
as Security level, Speed, Data confidentiality, Data integrity
and Ciphertext size. These are all considered as important
parameters to compare various algorithms. This analysis was
done by reading various reference papers. This performance
efficiency helped us to get to know that the combination of
AES and RSA provides more security for file protection
than the convolution methods.
The following performance was observed by considering
the various parameters such as security, speed, Data
confidentiality, Data Integrity etc. The various results are
discussed below.

TABLE I. COMPARISION OF PROPOSED WORK WITH EXISTING Fig. 5. File Size Vs time (Downloading)
METHODS
AES+ Figure 4 is the graph which shows the time taken to
BLOWFIS 3-DE upload the file .The graph shows the time taken by various
Paramete RC5 RSA
DES[4] H S
rs
[23]
[18]
[28]
(PROP files of sizes in MB to upload. The time is calculated by
OSED) first taking the start time from the system before uploading.
Better The time taken for uploading the file followed by
Not Partially Very
Security Secure than
secure secure
DES
secure encryption and decryption is the end time. The difference
Very Very between both the times is considered as the upload time.
Speed Fast Slow Slow Figure 5 is the graph which shows the time taken to
slow Fast
Data download the file.
Confid No Yes No No Yes
entiality
Data
No Yes No No Yes
Integrity
Larger Larger Large
Same as
Cipher than Same as than r than
plain
Text plain plain text plain plain
text
text text text

The execution time for encryption and decryption is


tabulated in table II. It is our experimental result where we
have taken various file sizes varying in MB and calculated
the encryption and decryption time.

TABLE II. EXECUTION TIME FOR ENCRYPTION AND DECRYPTION

Execution time for Execution time for Fig. 6. RSA public key generation graph
File Size
Encryption Decryption

1 0.75sec 1sec

15 1.25sec 1.5sec

25 1.5sec 2sec

Fig. 7. RSA private key generation graph

The time taken to generate the public key is depicted in


Figure 6. Different key length takes different time to
generate the public key. Here we have calculated the time
taken by 512, 1024 and 2048 key lengths. 512 key lengths
take the least time and 2048 key length takes the largest.
Figure 7 shows the time taken by the RSA algorithm to
Fig. 4. File Size Vs time (Uploading)
generate the private key. Different key length takes different
time to generate the private key. Here we have calculated the
time taken by 512, 1024 and 2048 key lengths. 512 key

794

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
lengths take the least time and 2048 key length takes the
largest.

Fig. 10. Graph for Encryption runtime of text files


Fig. 8. Time taken for file Encryption

Figure 8 and Figure 9 show the comparison of the results


for encrypting and decrypting the various types of files. This
shows that the results achieved in our work is much better
than previous results.

Fig. 11. Graph for Decryption runtime of text files

VI. CONCLUSIONS AND FUTURE WORK


Here, we propose a method to provide high data security
while using Cloud storage services. We make use of the
Fig. 9. Time taken for file Decryption Double Encryption Technique to increase the security of the
file. From the results obtained, our method provides high
The encryption runtime of text file and decryption security with resistance against propagation errors. The
runtime of text file are tabulated in TABLE III and Table IV runtime of our algorithm is less compared to the existing
algorithms, hence it is fast. Therefore, we propose a secure
TABLE III. DATA TABLE FOR ENCRYPTION RUNTIME OF
TEXT FILE and cost effective data protection method for cloud service
end-users. Our system efficiency in terms of runtime with
DES AES+RS secure protection of text data over cloud compared with
Blowfish RC5 3-DES
File(MB) (in
(in sec) (in sec) (in sec)
A existing encryption and decryption methodologies like DES,
sec) (in sec) Blowfish, RC5,3-DES. Our proposed methodology produces
0.1 2.5 1.2 1.5 2 1 the best result compared with existing methods. In the future
0.5 3 1.6 1.8 2.5 1.5 machine learning and deep learning may be used in efficient
0.75 4.5 4 4.2 4.5 3.5 and secure file transfer in the cloud The encryptions made
1 5.5 4.5 4.8 5 4 using machine learning are most welcoming as they are the
Average
15.5 11.3 13.8 14 10 future technology. As technology advances so does our
time ability, now a day’s neural networks are well capable of
Throughp learning to keep the data safe.
1 1.8 1.6 1.25 2
ut(MB/sec)
REFERENCES
TABLE IV. DATA TABLE FOR DECRYTION RUNTIME OF TEXT
FILE [1] Li, Yibin, et al. "Privacy protection for preventing data over-
collection in smart city." IEEE Transactions on Computers 65.5
4-DES (2015): 1339-1350.
DES Blowfish RC5 AES+RSA
File(MB) 5-(in [2] Kuang, Liwei, et al. "Secure tensor decomposition using fully
(in sec) (in sec) (in sec) (in sec)
sec) homomorphic encryption scheme." IEEE Transactions on Cloud
0.1 2.0 1.2 1.5 1.8 1 Computing 6.3 (2015): 868-878.
0.5 2.5 1.8 2 2.3 1.5 [3] Wu, Jun, et al. "Big data analysis-based secure cluster management
0.75 3 2.3 2.5 2.7 2 for optimized control plane in software-defined networks." IEEE
1.0 4 3.5 3.5 3.8 3 Transactions on Network and Service Management 15.1 (2018): 27-
Average 38.
11.5 8.8 9.5 10.6 7.5
time

795

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
[4] Krikor, Lala, et al. "Image encryption using DCT and stream cipher." [15] Sadourny, Yulen, and Vania Conan. "A proposal for supporting
European Journal of Scientific Research 32.1 (2009): 47-57. selective encryption in JPSEC." IEEE Transactions on Consumer
[5] H.Qiu,G.Memmi,X.Chen,andJ.Xiong,“DCcoefficientrecovery for Electronics 49.4 (2003): 846-849.
JPEG images in ubiquitous communication systems,” Future [16] Puech, William, and José M. Rodrigues. "Crypto-compression of
Generation Computer Systems,2019. medical images by selective encryption of DCT." 2005 13th
[6] Pommer, Andreas, and Andreas Uhl. "Selective encryption of European signal processing conference. IEEE, 2005.
wavelet-packet encoded image data: efficiency and security." [17] Massoudi, Ayoub, et al. "Secure and low cost selective encryption for
Multimedia Systems 9.3 (2003): 279-287. JPEG2000." 2008 Tenth IEEE International Symposium on
[7] Abdmouleh, Med Karim, Ali Khalfallah, and Med Salim Bouhlel. "A Multimedia. IEEE, 2008.
novel selective encryption DWT-based algorithm for medical [18] Harshitha, Y., S. Seema, and P. Apoorva. "Comparative study on
images." 2017 14th International Conference on Computer Graphics, RSA algorithm of multi-keyword search scheme over encrypted
Imaging and Visualization. IEEE, 2017. cloud data." 2017 International Conference on Intelligent Computing
[8] Gai, Keke, et al. "Spoofing-jamming attack strategy using optimal and Control (I2C2). IEEE, 2017.
power distributions in wireless smart grid networks." IEEE [19] Viney Pal Bansal and Sandeep Singh “A Hybrid Data Encryption
Transactions on Smart Grid 8.5 (2017): 2431-2439. Technique using RSA and Blowfish for Cloud Computing on
[9] Qiu, Han, and Gerard Memmi. "Fast selective encryption methods FPGAs”, in Proceedings of 2015 RAECS UIET Panjab University
for bitmap images." International Journal of Multimedia Data Chandigarh ,2015
Engineering and Management (IJMDEM) 6.3 (2015): 51-69. [20] Shubhi Mittal, Shivika Arora and Rachna Jain “PData Security using
[10] Shahid, Zafar, and William Puech. "Visual protection of HEVC RSA Encryption Combined with Image Steganography” ,2016.
video by selective encryption of CABAC binstrings." ieee [21] Naga Hemanth P, Abhinay Raj N, Nishi Yadav “Secure Message
transactions on multimedia 16.1 (2013): 24-36. Transfer using RSA algorithm and Improved Playfair cipher in Cloud
[11] Xiang, Tao, Chenyun Yu, and Fei Chen. "Secure MQ coder: An Computing” in 2nd International Conference for Convergence in
efficient way to protect JPEG 2000 images in wireless multimedia Technology,2017.
sensor networks." Signal Processing: Image Communication 29.9 [22] Mahalle, Vishwanath S., and Aniket K. Shahade. "Enhancing the
(2014): 1015-1027. data security in Cloud by implementing hybrid (Rsa & Aes)
[12] Li, Yibin, et al. "Intelligent cryptography approach for secure encryption algorithm." 2014 International Conference on Power,
distributed big data storage in cloud computing." Information Automation and Communication (INPAC). IEEE, 2014.
Sciences 387 (2017): 103-115. [23] Dr.D.I.GeorgeAmalarethinam,H.Leena “Enhanced RSA Algorithm
[13] Qiu, Han, Nathalie Enfrin, and Gerard Memmi. "A case study for with varying Key Sizes for Data Security in Cloud” in World
practical issues of DCT based bitmap selective encryption methods." Congress on Computing and Communication Technologies,2017.
2018 Third International Conference on Security of Smart Cities, [24] https://www.geeksforgeeks.org/rsa-algorithm-cryptography
Industrial Control System and Communications (SSIC). IEEE, 2018. [25] https://www.google.com/search?source=univ&tbm=isch&q=Liverpo
[14] Qiu, Han, and Gerard Memmi. "Fast selective encryption method for ol+Community+College+%2B+Encryption+and+Decryption%
bitmaps based on GPU acceleration." 2014 IEEE International
Symposium on Multimedia. IEEE, 2014.

796

Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.

You might also like