0% found this document useful (0 votes)
17 views17 pages

Cloud Computing

The document proposes a new security architecture for cloud computing that uses AES encryption for files, RSA encryption for communication, MD5 hashing to hide information, and one-time passwords for authentication. This distributed model aims to improve security by making it difficult for intruders to access information even if they take control of some servers.

Uploaded by

Rauf Wani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views17 pages

Cloud Computing

The document proposes a new security architecture for cloud computing that uses AES encryption for files, RSA encryption for communication, MD5 hashing to hide information, and one-time passwords for authentication. This distributed model aims to improve security by making it difficult for intruders to access information even if they take control of some servers.

Uploaded by

Rauf Wani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Multiple encryption in

cloud computing
BY
ABDUL RAOOF
HAKIM SHABER
Abstract:-
• The cloud computing platform gives people the opportunity for sharing resources,
services and information among the people of the whole world
• In private cloud system, information is shared among the persons who are in that
cloud.
• In this paper we have proposed new security architecture for cloud computing
platform
• AES based file encryption system and asynchronous key system for exchanging
information or data is included in this model.
• This ensures secure communication system and hiding information from others
Introduction:-
• Cloud computing is one the most important and developing concept for both
the developers and the users
• Resources are shared among all of the servers, users and individuals.
• In the area of cloud computing different security models and algorithms are
applied
• we have proposed new security architecture for cloud computing platform
• In this model high ranked security algorithms are used for giving secured
communication process
Contd.
• Our proposed model distributive server concept is used, thus ensuring
higher security
• It also helps to solve main security issues like malicious intruders,
hacking
• The RSA algorithm is used for secured communication between the
users and the servers.
Previous work
• Identification based cloud computing security model have been worked
out by different researchers
• Yao’s Garbled Circuit is used for secure data saving in cloud servers
• AES based file encryption system is used in some of these models. But
these models keep both the encryption key and encrypted file in one
database server
• Only one successful malicious attack in the server may open the whole
information files to the hacker.
Proposed model

secure Normal
connection connection
Contd.
• In our proposed model we have worked with the following security
algorithms:-
• RSA algorithm for secured communication
• AES for Secured file encryption
• MD5 hashing for cover the tables from user
• One time password for authentication
Cont.
RSA Algorithm

• The RSA algorithm is the most commonly used encryption and authentication
algorithm and is included as part of the Web browsers from Microsoft and Netscape
• RSA is an algorithm for public-key cryptography, involves a public key and a private
key
• The basic steps of RSA algorithm are:
• Key Generation
• Encryption and
• Decryption
AES Algorithm:

• AES is a symmetric block cipher


• It uses the same key for both encryption and decryption
• The algorithm can only accept a block size of 128 bits and a choice of
three keys - 128, 192, 256 bits
• Encryption consists of 10 rounds of processing for 128-bit keys, 12
rounds for 192-bit keys, and 14 rounds for 256-bit keys.
• Except for the last round in each case, all other rounds are identical.
Md5 hashing:-

• MD5 processes a variable-length message into a fixed-length output of 128 bits


• The input message is broken up into chunks of 512-bit blocks sixteen 32-bit words; the
message is padded so that its length is divisible by 512
• The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words
• The main algorithm then uses each 512-bit message block in turn to modify the state
• The processing of a message block consists of four similar stages, termed rounds
• Each round is composed of 16 similar operations based on a non-linear function F,
modular addition and left rotation
One time password

• Various approaches for the generation of OTPs are listed below:


• Based on time-synchronization between the authentication server and the client
providing the password (OTPs are valid only for a short period of time)
• Using a mathematical algorithm to generate a new password based on the
previous password (OTPs are effectively a chain and must be used in a
predefined order).
• Using a mathematical algorithm where the new password is based on a
challenge (e.g., a random number chosen by the authentication server or
transaction details) and/or a counter.
Conclusion:

• In this paper we have proposed a newer security structure for cloud computing
environment which includes AES file encryption system, RSA system for secure
communication, Onetime password to authenticate users and MD5 hashing for
hiding information. This model ensures security for whole cloud computing
structure
• In our proposed system, an intruder cannot easily get information and upload the
files because he needs to take control over all the servers, which is quite difficult.
The model, though it is developed in a cloud environment, individual servers’
operation has got priority here. So, decision taking is easy for each server, like
authenticate user, give access to a file etc.
Future work
• In our proposed model we have used RSA encryption system which is
deterministic. For this reason, it becomes fragile in long run process.
But the other algorithms make the model highly secured. In future we
want to work with ensuring secure communication system between users
and system, user to user. We also want to work with encryption
algorithms to find out more light and secure encryption system for
secured file information preserving system.
Acknowledgement:

• we are willing to express their profound gratitude and heartiest thanks


to all the researchers in the field of cloud computing architecture’s
security, specially to the developers of security algorithms, who have
made their research work easy to accomplish
References:

• Network security and cryptography by Himanshu Gupta


• Yashpal Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322
• “Cloud Computing: Silver Lining or Storm Ahead?”, Volume 13 Number 2, Spring 2010
• Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing”, CloudCom 2009, LNCS 5931, pp. 157–166, 2009
• Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider, “Twin Clouds: Secure Cloud Computing with Low Latency”, CASED, Germany, 2011
• Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider, “Twin Clouds: Secure Cloud Computing with Low Latency”- Extended Abstract, CASED, Germany, 2011
• Luis M. Vaquero, Luis Rodero-Merino, Daniel Morán, “Locking the sky: a survey on IaaS cloud security”, Computing (2011) 91:93–118
• Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman, “FADE:

• Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories
• Joan Daemen, Vincent Rijmen, “AES Proposal: Rijndael”, 1999
• Joan Daemen, Vincent Rijmen, “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication 197, November 26, 2001
• Joshua Holden, Mohammad Musa, Edward Schaefer, and Stephen Wedig, “A Simplified AES Algorithm”, January 2010
• Ronald Rivest, “MD5 Message-Digest Algorithm”, rfc 1321, April 1992
• Neil M.Haller, “THE S/KEY ONE-TIME PASSWORD SYSTEM”
THANK YOU

You might also like