Technical Seminar Report
Technical Seminar Report
The satisfaction and euphoria that accompany the successful completion of any
task would be incomplete without the mention of people who made it possible, whose
constant guidance and encouragement crowned out efforts with success.
I would like to take this opportunity to thank my Technical Seminar Guide Dr.
Arunkumar Joshi, Associate Professor Department of Computer Science and
Engineering, without his immense guidance and support the work would have been
unthinkable. Also, I would like to thank my Technical Seminar Coordinator Mr.
Prakash Hongal, Assistant Professor, Department of Computer Science and
Engineering, helped me in the completion of technical seminar work.
I extend my heartfelt thanks to all the faculty members, teaching and non-
teaching staff of department of Computer Science and Engineering, SKSVMACET,
Lakshmeshwar who have helped me directly or indirectly. I’m very much indebted to my
parents and friends for their unquestioning best cooperation and help.
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the
Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to
plan ahead for provisioning, and allows enterprises to start from the small and increase resources only
when there is a rise in service demand. Popular security experts decrypt the most demanding feature of
cloud computing security. Cloud computing allows both large and small companies to have the
opportunity to use Internet-based services .so that they can lower the start-up costs, capital expenditures,
access applications only if there is a need, use services on pay-asyou- use basis, and quickly lower or
increase ability. This algorithm has a specific form to encrypt and decrypt subtle data and is put in all
hardware and software. It is highly tough to hackers to get the actual data when encrypting by AES. Till
date there is no proof to crack this algorithm. AES has the capacity to deal with 3 dissimilar key sizes
such as AES 128, 192 and 256 bit. Each of its code has 128 bit.
CONTENTS
Acknowledgement
Abstract
Chapter 1 INTRODUCTION
Chapter 3 METHODOLOGY
CONCLUSION
REFERENCES
CHAPTER 1
INTRODUCTION
A cloud can be defined as the software and services that run on the Internet, instead of
locally on a local host system. These software and services can be accessed remotely.
Example of cloud services include Netflix, Google Drive, and Microsoft One drive.
In this work a brief survey is presented to discuss the present research work
addressing all these questions and their probable solutions.
Resource pooling. The providers computing resources are pooled to serve multiple
consumers using a multi-tenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand. There is a
sense of location independence in that the customer generally has no control or
knowledge over the exact location of the provided resources but may be able to
specify location at a higher level of abstraction (e.g., country, state, or datacenter).
Examples of resources include storage, processing, memory, and network
bandwidth.
Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.
Security AES
Algorithms Symmetric DES
TDES
Blowfish
RSA
Asymmetric DSA
Diffie-Hellman
• Data Encryption Standard (DES) DES is a standard for data encryption that uses a secret key
for both encryption and decryption. It adopts a 64-bit secret key, of which 56 bits are randomly
generated and the other 8 bits are used for error detection.
This encryption algorithm was introduced to solve key- management problems [10].
involves both a public key and a private key. The public key is publicly available, whereas
the sender keeps the private key secret. Asymmetric encryption uses a key pair comprising
of public key available to anyone and a private key held only by the key owner, which helps
to provide confidentiality, integrity, authentication, and nonrepudiation in data management.
RSA is a public-key cryptosystem for Internet encryption and authentication. RSA uses
modular arithmetic and elementary number theories to perform computations using two
large prime numbers [8]. The RSA system is widely used in a variety of products, platforms
and industries. It is one of the de-facto encryption standards. Companies such as Microsoft,
Apple and Novell build RSA algorithms into their operating systems [4]. RSA is the most
popular asymmetric algorithm. The computational complexity offactoring large integers that
are the product of two large prime numbers underlies the security of the RSA algorithm [10].
Multiplying two prime numbers is easy, but RSA is based on the complexity of calculating
the original numbers from the product [9].
Elliptic Curve Cryptography has been proposed to replace the RSA algorithm because of the
small key size of the ECC [2].
The matrix of 4x4 consisting of 128 bytes input block is known as the state array. The
process of encryption revolves around four stages namely mix, columns, sub bytes, add
round key and shift rows.
Sub Bytes – It is defined as substitution step. It is non- linear. Each byte is restored with
another according to S-box. The operation gives an indirect proportion in cipher. The
resultant matrix consists of four columns and four rows.
Shift Rows – It is stage where each row is rotated repetitively a definite number of times. It
is also known as permutation. The four rows in the matrix are rotated accordingly. The rows
are shifted to the left. Shift is carried out as Row1 is not rotated. Row2 is shifted one byte
place to the left. Row3 is shifted two places to the left. Row4 is shifted three places to the
left. The resultant matrix consists of the 16 bytes but rotated with respect to each other.
Add Round Key – The round key is bounded to each byte of state. In this particular step, the
matrix is XO-Red with the round key. A 4x4 matrix represents the original key. It contains
128bits. This 4 words key where each word is of 4 bytes, is converted to a 43 words key.
The first four words represent W[0], W[1], W[2], and W[3].
Cloud computing is a promising and emerging technology for the next generation of IT
applications. Cryptography is one of the most important and prominent skill to secure the
data from hackers by using the essential processes that is Encryption and Decryption. AES
encryption is the speedy method that has the flexibility and is easy to implement.
Data can also protect against future attacks such as smash attacks. AES encryption algorithm
has high performance and very little storage space without any restrictions while other
symmetric algorithms have some restrictions and differences in storage space and
performance. The implementation of Advanced Encryption Standard for securing data
bestows benefits of less computation time and less memory consumption in contrast to other
algorithms.
1. Leena Khanna, Anant Jaiswal, “Cloud Computing: Security Issues and Description
of Encryption Based Algorithms to Overcome Them”, IJARCSSE 2013
2. G Devi, Pramod Kumar “Cloud Computing: A CRM Service Based on a Separate
Encryption and Decryption using Blowfish algorithm” IJCTT 2012
3. Simarjeet Kaur “Cryptography and Encryption in Cloud Computing”, VSRD
International Journal of CS and IT, 2012
4. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza
Carvalho, Mats Naslund, Makan Pourzandi “A quantitativeanalysis of current
security concerns and solutions for cloud computing”, Springer 2012.
5. Ronald Krutz, Russell Vines, “Cloud Security: A Comprehensive Guide to Secure
Cloud Computing” Wiley Publishing 2010
6. Behrouz Forouzan, “Cryptography and Network Security”, McGraw-Hill Special
Indian Edition 2007
7. Wayne Jansen, Timothy Grance “Guidelines on Security and Privacy in Public Cloud
Computing”, National Institute of Standards andTechnology 2011
8. Akhil Behl “Emerging Security Challenges in Cloud Computing”, IEEE 2011
9. Maha Tebba, Saïd Haji Abdellatif Ghazi, “Homomorphic Encryption Applied to the
Cloud Computing Security”, World Congress onEngineering 2012
10. Cloud Security Alliance (CSA), “Security Guidance for critical Areas of Focus in
cloud computing V3.0” CSA 2015