0% found this document useful (0 votes)
9 views28 pages

Technical Seminar Report

Uploaded by

porstr8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views28 pages

Technical Seminar Report

Uploaded by

porstr8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

JNANA SANGAMA, BELAGAVI – 590 018

A Technical Seminar Report on

SECURITY ALGORITHMS IN CLOUD


COMPUTING
Submitted in partial fulfillment of the requirements for the VIII semester of
Bachelor of Engineering in Computer Science and Engineering
Submitted by:

Mr. Pruthviraj Dhupad 2KA19CS038

Under the Guidance of


Dr. Arunkumar Joshi
Associate Professor
Dept. of CSE,
SKSVMACET, Lakshmeshwar.

Department of Computer Science and Engineering


Smt. Kamala & Sri. Venkappa M. Agadi
College of Engineering & Technology
Lakshmeshwar-582 116
2024-2025
Smt. Kamala & Sri. Venkappa M. Agadi
College of Engineering & Technology
Lakshmeshwar-582 116

Department of Computer Science and Engineering


This is to certify that Mr. Pruthviraj Dhupad bearing USN
2KA19CS038 has satisfactorily completed the Technical
Seminar Work entitled “SECURITY ALGORITHMS IN CLOUD
COMPUTING” in partial fulfillment for the VIII semester of Bachelor
of Engineering in Computer Science and Engineering of Visvesvaraya
Technological University Belagavi, during the year 2024-25. This
Technical Seminar report has been approved, as it satisfies the
academic requirements in respect of seminar work prescribed for
the said degree.

………………. ……………… …………………. ………………….


Seminar Guide HOD Vice Principal Principal
Dr. Arunkumar Dr. Arun Kumbi Mr. Vikram Shirol Dr. Parashuram Baraki
Joshi
ACKNOWLEDGEMENT

The satisfaction and euphoria that accompany the successful completion of any
task would be incomplete without the mention of people who made it possible, whose
constant guidance and encouragement crowned out efforts with success.

I would like to take this opportunity to thank my Technical Seminar Guide Dr.
Arunkumar Joshi, Associate Professor Department of Computer Science and
Engineering, without his immense guidance and support the work would have been
unthinkable. Also, I would like to thank my Technical Seminar Coordinator Mr.
Prakash Hongal, Assistant Professor, Department of Computer Science and
Engineering, helped me in the completion of technical seminar work.

I express my deep sense of gratitude to our HOD Dr. Arun Kumbi,


Department of Computer Science and Engineering, for his unstinted support. I extend
my gratitude to the Vice Principal Dr. Vikram Shirol, SKSVMACET,
Lakshmeshwar and the Principal Dr. Parashuram Baraki, SKSVMACET,
Lakshmeshwar for their generous support in all regards.

I extend my heartfelt thanks to all the faculty members, teaching and non-
teaching staff of department of Computer Science and Engineering, SKSVMACET,
Lakshmeshwar who have helped me directly or indirectly. I’m very much indebted to my
parents and friends for their unquestioning best cooperation and help.

Mr. Pruthviraj Dhupad (2KA19CS038)


ABSTRACT

Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the
Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to
plan ahead for provisioning, and allows enterprises to start from the small and increase resources only
when there is a rise in service demand. Popular security experts decrypt the most demanding feature of
cloud computing security. Cloud computing allows both large and small companies to have the
opportunity to use Internet-based services .so that they can lower the start-up costs, capital expenditures,
access applications only if there is a need, use services on pay-asyou- use basis, and quickly lower or
increase ability. This algorithm has a specific form to encrypt and decrypt subtle data and is put in all
hardware and software. It is highly tough to hackers to get the actual data when encrypting by AES. Till
date there is no proof to crack this algorithm. AES has the capacity to deal with 3 dissimilar key sizes
such as AES 128, 192 and 256 bit. Each of its code has 128 bit.
CONTENTS

Acknowledgement
Abstract

Chapter 1 INTRODUCTION

Chapter 2 LITERATURE SURVEY

Chapter 3 METHODOLOGY

Chapter 4 COMPARITIVE ANALYSIS OF ALGORITHMS

CONCLUSION

REFERENCES
CHAPTER 1
INTRODUCTION

Cloud computing provides a large variety of architectural configurations, such as the


number of cores, amount of memory, and the number of nodes. The performance of a
workload an application and its input can execute up to 20 times longer or cost 10 times
more than optimal. The ready flexibility in cloud offerings has created a paradigm shift.
Whereas before an application was tuned for a given cluster, in the cloud the
architectural configuration is tuned for the workload. Furthermore, because the cloud
has a pay-as-you-go model, each configuration (cluster size VM type) has running cost
and execution time. Therefore, a workload can be optimized for least cost or shortest
time which are different configurations. Choosing the right cloud configuration for an
application is essential to service quality and commercial competitiveness. For instance,
a bad cloud configuration can result in up to 12 times more cost for the same
performance target. The saving from a proper cloud configuration is even more
significant for recurring jobs [5], [9] in which similar workloads are executed
repeatedly. Nonetheless, selecting the best cloud configuration, e.g., the cheapest or the
fastest, is difficult due to the complexity of simultaneously achieving high accuracy,
low overhead, and adaptivity for different applications and workloads.

II. WHAT IS A CLOUD

A cloud can be defined as the software and services that run on the Internet, instead of
locally on a local host system. These software and services can be accessed remotely.
Example of cloud services include Netflix, Google Drive, and Microsoft One drive.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 6


Also Amazon Web Service, Microsoft Azure, IBM cloud service, Google
Cloud service are among the top cloud service provider. Most Common
questions that’s need to answered in Cloud Computing are:

 How to evaluate and choose the right cloud solution?


 How to design applications which is optimized for the cloud?
 How to integrate public cloud applications with in- premise and
private cloud applications?
 How to integrate different cloud solutions?
 How to setup new infrastructures so that applications running on them
can easily interoperate and move to public cloud, if required?

In this work a brief survey is presented to discuss the present research work
addressing all these questions and their probable solutions.

III. WHAT IS CLOUD COMPUTING

A. The NIST Definition of Cloud Computing

Cloud computing is a model for enabling ubiquitous, convenient, on-


demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal management effort
or service provider interaction. This cloud model is composed of five
essential characteristics, three service models, and four deployment
models.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 7


NISTs definition identified self-service, accessibility from desktops, laptops,
and mobile phones, resources that are pooled among multiple users and
applications, elastic re- sources that can be rapidly reapportioned as needed,
and measured service as the five essential characteristics of cloud computing.
When these characteristics are combined, they create cloud computing
infrastructure that contains both a physical layer and an abstraction layer. The
physical layer consists of hardware resources that support the cloud services
(i.e. servers, storage and network components). The abstraction layer consists
of the software deployed across the physical layer, thereby expressing the
essential characteristics of the cloud per NISTs definition.

B. Characteristics of Cloud Computing:

On-demand self-service. A consumer can unilaterally provision computing


capabilities, such as server time and network storage, as needed automatically
without requiring human interaction with each service provider. Broad
network access. Capabilities are available over the network and accessed
through standard mechanisms that promote use by heterogeneous thin or thick
client platforms (e.g., mobile phones, tablets, laptops, and work- stations).

Resource pooling. The providers computing resources are pooled to serve multiple
consumers using a multi-tenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand. There is a
sense of location independence in that the customer generally has no control or
knowledge over the exact location of the provided resources but may be able to
specify location at a higher level of abstraction (e.g., country, state, or datacenter).
Examples of resources include storage, processing, memory, and network
bandwidth.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 8


Rapid elasticity. Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and inward commensurate
with demand. To the consumer, the capabilities available for provisioning
often appear to be unlimited and can be appropriated in any quantity at any
time.

Measured service. Cloud systems automatically control and optimize resource


use by leveraging a metering capability1 at some level of abstraction
appropriate to the type of service (e.g., storage, processing, bandwidth, and
active user accounts). Resource usage can be monitored, controlled, and
reported, providing transparency for both the provider and consumer of the
utilized service.

According to Amazon, clouds enable 7 transformation of how applications are


designed, built and used.

 Cloud makes distributed architectures easy


 Cloud enables users to embrace the security advantages of shared
systems
 Cloud enables enterprises to move from scaling by architecture to
scaling by command
 Cloud puts a supercomputer into the hands of every developer
 Cloud enables users to experiment often and fail quickly • Cloud
enables big data without big servers
 Cloud enables users to experiment often and fail quickly • Cloud
enables big data without big servers.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 9


C. Service Models:

Software as a Service (SaaS). The capability provided to the consumer is to use


the providers applications running on a cloud infrastructure2 . The applications
are accessible from various client devices through either a thin client interface,
such as a web browser (e.g., web- based email), or a program interface. The
consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, storage, or even individual
application capabilities, with the possible exception of limited userspecific
application configuration settings.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 10


Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storge, but has control over the deployed
applications and possibly configuration settings for the application-hosting environment.

Infrastructure as a Service (IaaS). The capability provided to the consumer is to


provision processing, storage, net- works, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underly- ing cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).

Dept. of CSE SKSVMACET - Lakshmeshwar Page 11


D. Deployment Models:

Private cloud. The cloud infrastructure is provisioned for exclusive use by a


single organization comprising multiple consumers (e.g., business units). It
may be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.

Community cloud. The cloud infrastructure is provisioned for exclusive use


by a specific community of consumers from organizations that have shared
concerns (e.g., mis- sion, security requirements, policy, and compliance
considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of
them, and it may exist on or off premises.

Public cloud. The cloud infrastructure is provisioned for open use by the
general public. It may be owned, managed, and operated by a business,
academic, or government organization, or some combination of them. It exists
on the premises of the cloud provider.

Hybrid cloud. The cloud infrastructure is a composition of two or more


distinct cloud infrastructures (private, community, or public) that remain
unique entities, but are bound together by standardized or proprietary
technology that enables data and application portability (e.g., cloud bursting
for load balancing between clouds).

Dept. of CSE SKSVMACET - Lakshmeshwar Page 12


CHAPTER 2
LITERATURE SURVEY

Dept. of CSE SKSVMACET - Lakshmeshwar Page 13


CHAPTER
3
METHODOLOGY

Security AES
Algorithms Symmetric DES
TDES
Blowfish

RSA
Asymmetric DSA

Diffie-Hellman

EXISTING ALGORITHM ON CLOUD SECURITY

A. Symmetric Encryption Algorithm (Secret Key Cryptography) Symmetric Encryption


Algorithm uses one key for both encryption and decryption. Examples of this
encryption algorithm a briefly discussed below.

• Data Encryption Standard (DES) DES is a standard for data encryption that uses a secret key
for both encryption and decryption. It adopts a 64-bit secret key, of which 56 bits are randomly
generated and the other 8 bits are used for error detection.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 14


It employs a data encryption algorithm (DEA), a secret block cipher employing a 56-bit key
operating on 64-bit blocks. It is the archetypal block cipher- an algorithm that takes a fixed-
length string of plaintext bits and transforms it into a ciphertext bit string of the same length.
DES design allows users to implement it in hardware and use it for single-user encryption,
such as files stored on a hard disk in encrypted form.

• Advanced Encryption Standard (AES)

It is a National Institute of Standards and Technology (NIST) specification for encrypting


electronic data. It also helps to encrypt digital information such as telecommunications,
financial, and government data. It is being used by US government agencies to sensitive
unclassified materials. AES consists of symmetric key algorithm: both encryption and
decryption are performed using the same key. It is an iterated block cipher that works by
repeating the defined steps multiple times. It has 128-bit block size, with key sizes of 128,
192, and 256 bits for AES-128, AES-192, and AES-256, respectively. The design of AES
makes its use efficient in both software and hardware and also works at multiple network
layers.
• Blowfish

Blowfish is a type of symmetric algorithm designed to replace DES or IDEA algorithms. It


uses the same secret key to encrypt and decrypt data . The algorithm splits the data into a
block length of 64 bits and produces a key ranging from 32 bits to 448 bits. Due to its high
speed and overall efficiency, blowfish is used in password protection tools to e-commerce
websites for securing payments.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 15


B. Asymmetric Encryption Algorithm (Public-Key Cryptography)

This encryption algorithm was introduced to solve key- management problems [10].
involves both a public key and a private key. The public key is publicly available, whereas
the sender keeps the private key secret. Asymmetric encryption uses a key pair comprising
of public key available to anyone and a private key held only by the key owner, which helps
to provide confidentiality, integrity, authentication, and nonrepudiation in data management.

• Rivest Shamir Adleman (RSA) Algorithm

RSA is a public-key cryptosystem for Internet encryption and authentication. RSA uses
modular arithmetic and elementary number theories to perform computations using two
large prime numbers [8]. The RSA system is widely used in a variety of products, platforms
and industries. It is one of the de-facto encryption standards. Companies such as Microsoft,
Apple and Novell build RSA algorithms into their operating systems [4]. RSA is the most
popular asymmetric algorithm. The computational complexity offactoring large integers that
are the product of two large prime numbers underlies the security of the RSA algorithm [10].
Multiplying two prime numbers is easy, but RSA is based on the complexity of calculating
the original numbers from the product [9].

• Elliptic Curve Cryptography (ECC)

Elliptic Curve Cryptography has been proposed to replace the RSA algorithm because of the
small key size of the ECC [2].

Dept. of CSE SKSVMACET - Lakshmeshwar Page 16


Implementation of AES algorithm

The matrix of 4x4 consisting of 128 bytes input block is known as the state array. The
process of encryption revolves around four stages namely mix, columns, sub bytes, add
round key and shift rows.

Sub Bytes – It is defined as substitution step. It is non- linear. Each byte is restored with
another according to S-box. The operation gives an indirect proportion in cipher. The
resultant matrix consists of four columns and four rows.

Shift Rows – It is stage where each row is rotated repetitively a definite number of times. It
is also known as permutation. The four rows in the matrix are rotated accordingly. The rows
are shifted to the left. Shift is carried out as Row1 is not rotated. Row2 is shifted one byte
place to the left. Row3 is shifted two places to the left. Row4 is shifted three places to the
left. The resultant matrix consists of the 16 bytes but rotated with respect to each other.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 17


Mix Columns –In this step, each column is changed using matrix multiplication. Each
column consists of four bytes. The resultant matrix consists of 16 bytes. The input is taken
for each column. It takes four bytes. The output produces four bytes which is entirely
different from the four bytes given as input.

Add Round Key – The round key is bounded to each byte of state. In this particular step, the
matrix is XO-Red with the round key. A 4x4 matrix represents the original key. It contains
128bits. This 4 words key where each word is of 4 bytes, is converted to a 43 words key.
The first four words represent W[0], W[1], W[2], and W[3].

Dept. of CSE SKSVMACET - Lakshmeshwar Page 18


Dept. of CSE SKSVMACET - Lakshmeshwar Page 19
CHAPTER 4

COMPARATIVE ANALYSIS OF ALGORITHMS

Dept. of CSE SKSVMACET - Lakshmeshwar Page 20


CONCLUSION

Cloud computing is a promising and emerging technology for the next generation of IT
applications. Cryptography is one of the most important and prominent skill to secure the
data from hackers by using the essential processes that is Encryption and Decryption. AES
encryption is the speedy method that has the flexibility and is easy to implement.

Data can also protect against future attacks such as smash attacks. AES encryption algorithm
has high performance and very little storage space without any restrictions while other
symmetric algorithms have some restrictions and differences in storage space and
performance. The implementation of Advanced Encryption Standard for securing data
bestows benefits of less computation time and less memory consumption in contrast to other
algorithms.

Dept. of CSE SKSVMACET - Lakshmeshwar Page 21


REFERENCE

1. Leena Khanna, Anant Jaiswal, “Cloud Computing: Security Issues and Description
of Encryption Based Algorithms to Overcome Them”, IJARCSSE 2013
2. G Devi, Pramod Kumar “Cloud Computing: A CRM Service Based on a Separate
Encryption and Decryption using Blowfish algorithm” IJCTT 2012
3. Simarjeet Kaur “Cryptography and Encryption in Cloud Computing”, VSRD
International Journal of CS and IT, 2012
4. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza
Carvalho, Mats Naslund, Makan Pourzandi “A quantitativeanalysis of current
security concerns and solutions for cloud computing”, Springer 2012.
5. Ronald Krutz, Russell Vines, “Cloud Security: A Comprehensive Guide to Secure
Cloud Computing” Wiley Publishing 2010
6. Behrouz Forouzan, “Cryptography and Network Security”, McGraw-Hill Special
Indian Edition 2007
7. Wayne Jansen, Timothy Grance “Guidelines on Security and Privacy in Public Cloud
Computing”, National Institute of Standards andTechnology 2011
8. Akhil Behl “Emerging Security Challenges in Cloud Computing”, IEEE 2011
9. Maha Tebba, Saïd Haji Abdellatif Ghazi, “Homomorphic Encryption Applied to the
Cloud Computing Security”, World Congress onEngineering 2012
10. Cloud Security Alliance (CSA), “Security Guidance for critical Areas of Focus in
cloud computing V3.0” CSA 2015

Dept. of CSE SKSVMACET - Lakshmeshwar Page 22


SEMINAR PRESENTATION

Dept. of CSE SKSVMACET - Lakshmeshwar Page 23


Dept. of CSE SKSVMACET - Lakshmeshwar Page 24
Dept. of CSE SKSVMACET - Lakshmeshwar Page 25
Dept. of CSE SKSVMACET - Lakshmeshwar Page 26
Dept. of CSE SKSVMACET - Lakshmeshwar Page 27
Dept. of CSE SKSVMACET - Lakshmeshwar Page 28

You might also like