Security in Cloud Computing Using AES & DES
Security in Cloud Computing Using AES & DES
Security in Cloud Computing Using AES & DES
Abstract- Cloud Computing has been visualized as the heirframework of IT consortium. Cloud Computing moves the application software and
databases to the large data centers, where the management of the data and services may not be fully trustworthy. This in turnimposes many new
security challenges which are not clear yet. This paper gives a brief introduction of cloud computing its types and security issue and
approachesto secure the data in the cloud environment. Cloud computing security is the set of control-based technologies and policies designed
to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.
Keywords: Cloud Computing, security algorithm, AES, DES, RSA security issues
________________________________________________*****_________________________________________________
194
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 194 200
_______________________________________________________________________________________________
data. Considering various kinds of data for each user stored in
the cloud and the demand of long term continuous assurance
of their data safety, the problem of verifying correctness of
data storage in the cloud becomes even more challenging.
Secondly, Cloud Computing is not just a third party data
warehouse. The data stored in the cloud may be frequently
updated by the users, including insertion, deletion,
modication, appending, reordering, etc. To ensure storage
correctness under dynamic data update is hence of paramount
importance. However, this dynamic feature also makes
traditional integrity insurance techniques futile and entails new
solutions. Last but not the least, the deployment of Cloud Fig.1:-Deployment models
Computing is powered by data centers running in a
simultaneous, cooperated and distributed manner. Individual PUBLIC CLOUD
users data is redundantly stored in multiple physical locations The Public Cloud allows systems and services to be easily
to further reduce the data integrity threats. Therefore, accessible to the general public. Public cloud may be less
distributed protocols for storage correctness assurance will be secure because of its openness, e.g., e-mail. The cloud
of most importance in achieving a robust and secure cloud infrastructure is made available to the general public or a large
data storage system in the real world. However, such industry group and is owned by an organization selling cloud
important area remains to be fully explored in the literature. services.
Recently, the importance of ensuring the remote data integrity PRIVATE CLOUD
has been highlighted by the following research works [3][7]. The Private Cloud allows systems and services to be
These techniques, while can be useful to ensure the storage accessible within an organization. It offers increased security
correctness without having users possessing data, can not because of its private nature. The cloud infrastructure is
address all the security threats in cloud data storage, since they operated solely for an organization. It may be managed by the
are all focusing on single server scenario and most of them do organization or a third party and may exist on premise or off
not consider dynamic data operations. As an complementary premise.
approach, researchers have also proposed distributed protocols COMMUNITY CLOUD
[8][10] for ensuring storage correctness across multiple The Community Cloud allows systems and services to be
servers or peers. Again, none of these distributed schemes is accessible by group of organizations. The cloud infrastructure
aware of dynamic data operations. As a result, their is shared by several organizations and supports a specific
applicability in cloud data storage can be drastically limited. community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). It may
1.3 Basic Concepts be managed by the organizations or a third party and may exist
There are certain services and models working behind the on premise or off premise.
scene making the cloud computing feasible and accessible to HYBRID CLOUD
end users. Following are the working models for cloud The Hybrid Cloud is mixture of public and private cloud.
computing: However, the critical activities are performed using private
cloud while the non-critical activities are performed using
1.3.1 DEPLOYMENT MODELS public cloud. The cloud infrastructure is a composition of two
Deployment models define the type of access to the cloud, i.e., or more clouds (private, community, or public) that remain
how the cloud is located? Cloud can have any of the four types unique entities but are bound together by standardized or
of access: Public, Private, Hybrid and Community. proprietary technology that enables data and application
portability.
197
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 194 200
_______________________________________________________________________________________________
3.6 Reliability & Availability of Service: The challenge of Structure of DES is depicted in the following illustration
reliability comes into the picture when a cloud provider
delivers on-demand software as a service. The software needs
to have a reliability quality factor so that users can access it
under any network conditions (such as during slow network
connections). There are a few cases identified due to the
unreliability of on demand software. One of the examples is
Apple's MobileMe cloud service, which stores and
synchronizes data across multiple devices. It began with an
embarrassing start when many users were not able to access
mail and synchronize data correctly
198
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 194 200
_______________________________________________________________________________________________
uploads any data on cloud, the data will first encrypted using Disadvantages:
AES algorithm and then sent to provider. Once encrypted, data - The major drawback is that it could not withstand with the
is uploaded on the cloud, any request to read the data will attacks like Brute Force, Linear crypt Analysis,because during
occur after it is decrypted on the users end and then plain text its design this attack wasn't invented.
data can be read by user. The plain text data is never written
anywhere on cloud. This includes all types of data. This V. IMPLEMENTATION AND RESULTS
encryption solution is transparent to the application and can be
integrated quickly and easily without any changes to
application. The key is never stored next to the encrypted data,
since it may compromise the key also. To store the keys, a
physical key management server can be installed in the users
premises. This encryption protects data and keys and
guarantees that they remain under users control and will never
be exposed in storage or in transit. AES has replaced the DES
as approved standard for wide range of applications.
Advantages:
- It provides strong security from the attackers.
- But as the years passed by it was prone to a few attacks
which were lesser when compared to DES, till datethe only
attack on it was Brute Force attack.
199
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 4 194 200
_______________________________________________________________________________________________
VI. CONCLUSION Businesses,Retrieved March 13th, 2015 from
The strength of cloud computing is the ability to manage risks http://www.zdnet.com/blog/hinchcliffe/eight-waysthat-
in particular to security issues. Security algorithms mentioned Cloud-computing-will-changebusiness/488
[7] International Data Corporation (IDC) (2012). White Paper:
or encryption and decryption can be implementing in future to
Cloud Computings Role in JobCreation, 2012. Retrieved 9th
enhance security over the network. In this,
February, 2015 from
we will extend our research by providing algorithm http://people.uwec.edu/HiltonTS/ITConf2012/NetApp2012Pa
implementations and producing results to justify our concepts per.pdf
of security for cloud computing. Cloud computing is defined [8] Jinzy, Z. (2010). Cloud Computing Technologies and
as the set of resources or services offered through the internet Applications, Handbook of Cloud Computing, 2010,
to the users on their demand by cloud providers. As each and retrieved 6th March, 2015 from
every organization is moving its data to the cloud, means it http://www.springer.com/978-1-4419-6523-3
uses the storage service provided by the cloud provider. So [9] Kim, W. (2009). Cloud Computing: Today and
Tomorrow.Journal of Object Technology. 8(1):p. 65-72.
there is a need to protect that data against unauthorized access,
[10] J. Baek, R. Safavi-Naini, and W. Susilo. Public key
modification or denial of services etc.
encryption with keyword search revisited. In International
conference on Computational Science and Its Applications,
REFERENCES pages 1249-1259. Springer-Verlag, 2008.
[1] LeenaKhanna, AnantJaiswal, Cloud Computing: Security [11] Q.Wang, C.Wang, J. Li, K. Ren, and W. Lou. Enabling
Issues and Description of Encryption Based Algorithms to public verifiability and data dynamics for storage security in
Overcome Them, IJARCSSE 2013. cloud computing. In European Symposium on Research in
[2] G Devi, Pramod Kumar Cloud Computing: A CRM Service Computer Security (ESORICS '09), volume 5789 of Lecture
Based on a Separate Encryption and Decryption Notes in Computer Science, pages 355{370.Springer, 2009.
using Blowfish algorithm IJCTT 2012 . [12] MIT International Journal of Computer Science and
[3] Burton, H. (2014). Cloud computing - Separating fact from Information Technology, Vol. 6, No. 1, January 2016, pp. 1-6
fiction. The Guardian, 2014.Retrieved 10th January, 2015 6 ISSN 2230-7621MIT Publications .
from http://www.theguardian.com/medianetwork/partner- [13] International Journal of Latest Trends in Engineering and
zone-microsoft/cloud-computingseparating-fact. Technology (IJLTET) ISSN: 2278-621X.
[4] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J. and [14] International Journal of Engineering Research ISSN:2319-
Brandic, I. (2009). Cloud Computing and Emerging IT 6890)(online),2347-5013(print) Volume No.3, Issue No.4, pp
Platforms: Vision, Hype, and Reality for Delivering : 221-225 01 April 2014.
Computing as the 5th Utility, Future Generation Computer
Systems (25)6.
ACKNOWLEDGEMENT
[5] Cisco (2013). The Cloud in Africa: Reality Check. Retrieved
I would like to thank my guide Ms. ShabnamKumari for her
December 15th, 2014 from
http://www.cisco.com/web/ZA/press/2013/112813.html.Com indispensible ideas and continuous support, encouragement,
pTIA (August, 2013). Trends in Cloud Computing: Full advice and understanding me through my difficult times and
Report, August 2013. Retrieved 17th March, 2015 from keeping up my enthusiasm, encouraging me andfor showing
www.comptia.org great interest in my dissertation work, this work could not
[6] Heiser, J. and Nicolett, M. (2008). Assessing the Security finished without her valuable comments and inspiring
Risks of Cloud Computing. Gartner.Hinchcliffe, D. (5th June, guidance.
2009). Eight ways that Cloud Computing will Change
200
IJRITCC | April 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________