[go: up one dir, main page]

0% found this document useful (0 votes)
75 views7 pages

Cloud Securityusing Hybrid Cryptography

The document discusses security issues in cloud computing and proposes a hybrid cryptography model using DES and RSA algorithms to encrypt and decrypt data at multiple levels for increased security. The model aims to provide transparency to cloud users and providers while reducing security threats. It is implemented using Java and CloudSim tools and increases security of data in cloud storage.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views7 pages

Cloud Securityusing Hybrid Cryptography

The document discusses security issues in cloud computing and proposes a hybrid cryptography model using DES and RSA algorithms to encrypt and decrypt data at multiple levels for increased security. The model aims to provide transparency to cloud users and providers while reducing security threats. It is implemented using Java and CloudSim tools and increases security of data in cloud storage.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/352145362

Cloud Security using Hybrid Cryptography Algorithms

Conference Paper · April 2021


DOI: 10.1109/ICIEM51511.2021.9445377

CITATIONS READS
53 4,340

4 authors, including:

Sanjeev Kumar Madhu Sharma Gaur


G L Bajaj Institute of Technology and Management G .L. Bajaj Institute of Technology and Management GB Nagar Delhi NCR INDIA
23 PUBLICATIONS 266 CITATIONS 18 PUBLICATIONS 174 CITATIONS

SEE PROFILE SEE PROFILE

Anju Mishra

9 PUBLICATIONS 71 CITATIONS

SEE PROFILE

All content following this page was uploaded by Sanjeev Kumar on 21 June 2021.

The user has requested enhancement of the downloaded file.


2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

Cloud Security using Hybrid Cryptography


Algorithms
Sanjeev Kumar Garima Karnani Madhu Sharma Gaur
Department of Computer Applications Department of Computer Applications Department of Computer Applications
G L Bajaj Institute of Technology & G L Bajaj Institute of Technology & G L Bajaj Institute of Technology &
Management Management Management
Greater Noida, India Greater Noida, India Greater Noida, India
sanjeevnmc83@gmail.com Garimakarnani2@gmail.com Madhu14nov@gmail.com

Anju Mishra
Department of Computer Applications
G L Bajaj Institute of Technology &
Management
Greater Noida, India
Anju.pandey.12@gmail.com
clients as a compensation for every utilization basis as per
Abstract— Security in cloud computing is the emerging research their need. Therefore, it has gained popularity as it provides
issues nowadays. A lot of organization are moving from their resources via internet, thus optimizing user’s time and cost.
traditional data storage to cloud storage, which provides an The various resources that can be accessed by users are
efficient way to access the data anywhere and anytime. But, the
networks, servers and storage [1]. The services that are
main hitch of organization to use cloud computing is data
security. This paper proposed a multilevel cryptography based provided by the Cloud are webmail, online business
security system for cloud computing. The model is hybrid applications, various social networking sites, and online file
approach of symmetric and asymmetric key cryptography storage. The user can access any of these services and
algorithms. In this Data Encryption Standard (DES) and RSA resources anywhere with just an Internet connection. Among
are implemented to provide the multilevel of encryption and the main benefits of Cloud Computing, one is that users do
decryption at both sender and receiver side which increase the not have to have any expertise in managing the infrastructure
security of the cloud storage. This security model gives the of Cloud as it provides abstraction. The various technologies
transparency to the cloud user as well as cloud service provider that can be credited for Cloud Computing being such a
in order to reduce the security threats. The proposed model is
success are Virtualization, Utility Computing, Service
implemented in java and cloudsim cloud simulator tool. This
model increases the data security up to a maximum extant and Oriented Computing, Multi-tenant environment and Load
it takes less time in uploading and downloading the text file as Balancing [2].
compare to existing system. Even though there are numerous advantages of Cloud
Keywords—cloud computing, Cryptography, Symmetric key, Computing, still a few road-blocks exist to it being accepted
asymmetric key, DES, RSA, Data Security. widely. Since, the data of users and business organizations
lies together on a platform that can be accessed by anyone as
I. INTRODUCTION they provide control to a third party over their data. So, it is
Security in Cloud Computing is an emerging research issue at a risk of being accessed by someone who is not authorized.
nowadays. Majority of the corporations are changing their old Thus leading to breach in data [3].
ways from traditional data storage to cloud storage, which
provides an efficient way for accessing the data anywhere, In cloud computing and outsourcing of resources, the
anytime. But, data security is one among the main hitches in information or data is distributed over a wide range of
adopting cloud computing for organizations. This paper resources which the clients cannot control. Now, there comes
proposes a multilevel cryptography based security model for a key concern in Cloud computing, the way that is used to
cloud computing. In this symmetric key cryptography secure client information and safely delegate process on a
algorithm is used for the encryption and decryption for remote cloud service provider. Since the information transmit
securing the data in cloud environments. This security model that occurs in between client and the cloud service provider
gives the transparency to the cloud user as well as cloud is achieved remotely; the security of the client's information
service provider so as to reduce the security threats. The becomes a concern as it can be effortlessly taken by
proposed model increases data security up to a maximum assailants. This environment ought to apply proper security
extent. measures, while playing out various scopes of harmful
activities, to shield client's information from the assailants.
There is a recent trend that has emerged in the computing Among the methods known to forestall security issues are key
system environment, known as Cloud Computing. sharing, use of some cryptography algorithms, blind
Technology’s advancement has led to an increased usage in processing and third party delegation. Security issues and
internet and also in cost of hardware and software. Cloud implementation of various mechanisms such as
Computing provides a pool of resources and services to encryption/decryption mechanisms are being discussed with

597
978-1-6654-1450-0/21/$31.00 ©2021 IEEE
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

regards to information, its stockpiling, transmission and C. Community Cloud: In Community cloud, several
utilization. organizations that share same concerns share the cloud
The fundamental goal of this research paper is to provide infrastructure. Here, either a third party vendor or an
information security from different types of attackers by organization from the community can host the
using symmetric key cryptography algorithm to Encrypt and infrastructure. It can be said as a Private Cloud except
Decrypt the client information at cloud storage and client that it is accessible by a cluster of organizations.
side. D. Hybrid Cloud: A Hybrid Cloud is a combination of
Private and Public Cloud so that the benefits of both the
II. SERVICES OF CLOUD COMPUTING
models can be used. Here, the activities that are crucial
Cloud Computing offers basically three types of services [4]
are accomplished in Private cloud whereas the other non-
[5] [6].They are as follows and as shown in fig.1.
crucial ones are accomplished in the Public cloud.
A. Software as a Service (SaaS): In Software as a Service,
IV. SECURITY ISSUES IN CLOUD COMPUTING
the software and its associated data is hosted onto the
Cloud Computing has many merits such as it improves
cloud environment by the Cloud Service Provider (CSP).
flexibility, reduces capital cost and improves accessibility.
It is then provided to users in a pay-per-use manner.
But despite these it is not widely accepted. The sole reason of
However, users are not in control over the network,
this being security. When users store their data on cloud, they
servers, infrastructure, or even the operating systems.
give access to a third party and lose sole control over their
This helps in reducing cost for maintenance and support
data. The attackers can take advantage of this and tamper with
and also as licensing these traditional packages proves to
their data. These attackers may be internal (Cloud Service
be more expensive than renting cloud service. Its
Provider) or external. Since, Cloud Computing has various
examples include SalesForce CRM and Google Apps
technologies; it is prone to the security issues of those
among many others.
technologies as well. These technologies include databases,
B. Platform as a Service (PaaS): In Platform as a Service,
virtualization, resource scheduling, operating systems,
users are provided with a stage for them so that they can
concurrency control, networks, transaction management, and
develop, deploy as well as test their applications. Here,
memory management [7]. Therefore, data security is a
the clients manage applications and information whereas
primary concern, so proper enforcements should be done
the vendors are responsible for networking,
regarding to it. There are various security issues in Cloud
virtualization, runtime, storage, middleware, servers,
Computing [4] [7]. They are as follows:
operating systems, and networking. Google App Engine,
Windows Azure are some examples of PaaS. A. Data Integrity: Data Integrity is among the key concerns
C. Infrastructure as a Service (IaaS): In Infrastructure as a in Cloud Computing. The term Data Integrity is a
Service, Virtualization is used extensively. Here, various reference to the fact that data should be unchanged by
resources like servers, networking as well as storage are any unauthorized user or in a way that is not authorized.
issued to the users in a pay as you utilize manner. The This ensures that the data is not been tampered with. This
resource demand keeps growing or shrinking according can be achieved by Digital Signatures.
to the user’s needs, so to meet them Virtualization is B. Data Availability: Availability refers to the data being
needed. The various examples for IaaS include Amazon available and can be accessed by the user on demand.
Web Services (AWS), and Google Compute Engine. When data is stored at remote locations that are
maintained by third party users, there is a risk of service
III. DEPLOYMENT MODEL OF CLOUD MODEL
providers’ system failures. The data will be unavailable
There are four various types of Deployment models available
if the cloud is unable to provide service.
in the cloud environment [4], [5], [6]. These are presented in
C. Data Confidentiality: Confidentiality refers to the fact
fig.2.
that no one except the authorized user can get access to
A. Public Cloud: As is suggested by the name, in Public their data. Encryption is the technique that can be used
Cloud, public can access the services, that is, they can be to ensure this [6].
accessed by anyone and everyone. Clients share same D. Data Location: The Cloud providers have their
infrastructure. In other words, multiple customers make datacenters across the globe. Thus, making the users’
use of the computing resources that a single service unaware about the location where the data is stored. This
provider provides. Due to being publicly available, it is has a disadvantage as their data can be stored in any
less secure. country. There can be some important information in the
B. Private Cloud: Private cloud is limited, that is, accessible data and, it leaving the country could create issues in
only to a particular organization. Here, the computing some countries as it is illegal.
resources are available to this organization only and they E. Denial of Service: There is a definite number of requests
control it. Also, due to its private nature, it provides that a server can handle. Once this limit is reached, the
better security than that provided by Public cloud. server is overloaded, and we observe an error while
trying to access the site. The attackers use this technique
so that the authorized users are unable to get the services

598
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

that are assigned to them. An Intrusion Detection System improving the strength of the encryption keys by using
(IDS) is used to defend against this type of attack [8]. chaotic random noise as the strength relies on the random
F. Data Breaches: The information which is reserved on nature of input noise rather than the length of the key.
Cloud can be some crucial or sensitive information.
K. Raja et al. [12] propose a symmetric based encryption
Some unauthorized user can steal the data and use
algorithm for Cloud data security. An alphanumeric
against the users targeted. This is one of the principal
encryption table is used to generate keys. These keys are used
threats in Cloud security as someone can get access to
for primary authentication by users. The usage of this
the data that is kept in cloud. The more the data is
algorithm ensures that data is secured from intruders.
exposed, the more the threat.
G. Data Loss: Due to some financial problem or natural Reshma Suryawanshi et al. in [13] deal with availability,
disasters, the servers can be shut down, leading to the integrity and security of data by introducing two schemes.
data either being lost or corrupted in cloud. If there is no Public auditing is their first scheme. They use Homomorphic
backup of the data, it might as well be lost forever. Linear Authenticator as Third Party Authenticator (TPA) in
H. Cloud Service Abuse: Here, the hackers can use social this scheme. Their second scheme, on the other hand, is
media services to disturb the cloud environment by some threshold cryptography. While the first scheme ensures that
understanding and extraction of codes. This might lead no knowledge is gained during the auditing process about the
to the organizations using cloud to face issues. important data by TPA; the second scheme ensures that the
V. RELATED WORK stored data cannot be misused by any unauthorized user.
A lot of researches have been made considering security in
Divya Prathana Timothy et al. in [14] proposed a hybrid
cloud computing so far. Different authors have suggested
model that uses Blowfish, RSA, and SHA-2 algorithms. It is
different techniques to achieve security considering as the
a union of both symmetric as well as asymmetric algorithms.
primary concern for the users.
Data confidentiality is handled by Blowfish, authentication is
In, [2] Anshika Negi et al. proposed a model where the dealt with RSA and the integrity of data is handled by SHA-
encryption as well as the decryption method is performed by 2 algorithm. A high security is provided in this model during
making use of counter propagation neural (CPN) networks. It data transmission over the internet.
is an enhancement on the traditional security system. It
Manju Khari et al. in [15] proposed a Hybrid Encryption
discusses about three level authentication mechanisms to
Scheme. For user identification and verification, they use a
improve information security. It does not talk about the
biometric process. The various algorithms used in this paper
performance. The real time monitoring of the system and
are Secure Hash Algorithm (SHA), Rivest-Shamir-Adleman
functioning of the forensic virtual machine is also included in
(RSA), 3 DES (Data Encryption Standard) algorithms. For
the solution proposed.
uploading the information securely, SHA and RSA
Shakeeba S. Khan et al. in [10] proposed a multilevel algorithms are used whereas 3DES cryptography algorithm is
encryption and decryption algorithm to improve the security used for data transmission to be done securely. This
with respect to cloud. According to this technique, the architecture will create a highly secure environment and also
attacker or some unauthorized user would have to perform prevent from unauthorized access.
decryption of data at every level, which proves to be a more
Shilpi Singh et al. in [16] propose a scheme that uses Elliptic
troublesome task than decrypting it at a single level. The three
Curve Cryptography. Here, the data is encrypted at the client
levels have three different algorithms namely Rivest-Shamir-
side and can only be decrypted after downloading. Also, at
Adleman (RSA), Data Encryption Standard (DES), and
the time of login, the user authenticates themselves via
Advanced Encryption Standard (AES) respectively. This
different input parameters. For further security, Elliptic curve
aims at shielding the data from an unauthorized access.
cryptosystem (ECC) and Elliptic Curve Diffie-Hellman
Li Chunlin et al. in [11] have addressed the privacy and
(ECDH) algorithms are used. They are efficient because key
security issues that exist in cloud computing. They have
size is less here, and security is much more efficient.
proposed the use of Ubuntu Enterprise Cloud (UEC) to solve
security and privacy issues in cloud computing. This K.Brindha et al. in [17] propose Visual Cryptography as a
algorithm uses encryption and decryption of data in order to technique for data storage security issue. The data is kept at
achieve it. UEC ensures the administrators are not getting data servers in encrypted form. The service provider allows
totally unrestricted access to the client’s data in the name of the keys to the shared image only after authentication of user.
fulfilling their duties. It ensures that the schema of cloud Now, user must superimpose the shared image by this
prevents user’s data from exposure, thus, maintaining encrypted key to get the secret key which, in turn, is the key
privacy. to the information.
H.S. Venter et al. [9] propose a model to reduce the cyber- Priyanka Ora et al. in [18] propose a scheme that is a fusion
attacks that target the data confidentiality in cloud. To of RSA Partial homomorphic and MD5 hashing algorithm.
achieve this, they propose client-end encryption and key RSA Partial algorithm is responsible for encryption of data
management. They use chaos and neural cryptography to previous to it being uploaded on cloud server and later for its
form a novel cryptography scheme. This scheme is used for

599
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

decryption. MD5 Hashing algorithm, then, calculates the difficult task [21]. In this paper symmetric key encryption
hash value. It is responsible for data backup security. method is used, where only a single key used for the
encryption and decryption at the sender and receiver side.
VI. CRYPTOGRAPHY
Secure and confidential communication or data transmission In the research work only two encryption algorithm is used
is one of the necessities of the social life. Cryptography from the number of symmetric key encryption algorithm as
manages the security of data which may be stored or discussed follow
communicate over the cloud network. Cryptography in cloud
1. Data Encryption Standard (DES) Algorithm
uses the encryption methods to secure data, from
One of the famous symmetric-key block cipher known as the
unauthorized access, which is stored in the cloud. It gives the
Data Encryption Standard (DES) had been published in 1977
permission to the users of cloud for acquiring the shared
by NIST. The encryption method of DES is very unique, as it
cloud data easily and safely. The shared data that the cloud
received a receive a 64-bit plaintext at sender end and
service provider hosts is secured by encryption technique.
generates a 64 cipher text at receiver ends. In DES, although
Cryptography techniques can secure tactful data without
the key size is 64 bits but only 54 bits key size is used for
waiting information exchange in cloud. A huge number of
encryption and decryption. DES is based on the concept of
security algorithm for cloud computing have been developed
Feistel Cipher implementation and used 16 round of Feistel
using cryptography techniques, which have become very
structure which helps to generates 48-bit unique key form the
important for the security of data in cloud environment.
cipher as per the predefined DES algorithm as discussed in
Cryptography carried out into two different phases’ figure 1 [10].
encryption and decryption. Encryption as well as decryption
Initially 64 bit permutation is performed on 64 bit block of
both is important aspects of security. In encryption process,
data, then it is divided into two halves (i.e.32 bit sub-blocks)
plain text or secret message converted into a weird message
represented as L0 and R0 that are passed into the Feistel
or scrambled one known as cipher text with the assistance of
rounds. This process will repeat till 16 round of the
a secret key and, in the decryption process, cipher text is an
encryption method, as the number of twofold is increased the
input which is changed over back to plain text with the
security level is also increased. In the last round (at 16th
assistance of same secret key used in encryption procedure.
round) the pre-output is generated by swapping of L15 and
The combinations of same plaintext with different key
R15 bit quantities. Finally, the inverse function of the initial
generate different cipher text hence secret key should keep
permutation is calculated by concatenating of [R15, L15].
secret to provide security. There are many different types of
schemes available which are used for encryption constitute of
area of study known as cryptography [6], [19].
When two parties communicate, secrecy can be provided via
symmetric key encryption. The encryption methods, wherein
the sender as well as the receiver both is sharing the same key,
are known as symmetric key cryptography, whereas in
asymmetric key encryption two different keys are used at
sender and receiver side [20].
A. Existing cryptography algorithm for cloud security Fig. 1: Encryption with DES
In cloud environments the organization usually stored their B. RSA Algorithm
data and this data can be accessed anywhere any time, but the RSA is asymmetric algorithm that work on two separate keys
data security is the main concern for the organizations in the considered as public and private key, where public key is
cloud storage model. In order to offer secure data shared with all, but private key is kept secret. Rivest, Shamir
transmission and communication over the heterogeneous and and Adleman are known as the father of the RSA algorithm.
connected network, encryption models plays an important RSA is popularly known for its secure encryption procedure.
role [6]. Encryption algorithm used the key for the secure data RSA basically works on positive integer prime numbers that
communication. A key is first agreed upon by the are exponentially used for the encryption and decryption
communicating parties and kept secret. Now, the key and the process. The procedure of RSA algorithm is shown in fig. 2
encryption algorithms are utilized for encrypting the message as follow
previous to sending it from one party to another. This text
obtained, known as cipher text, is received by the other party
who then decrypts it taking use of the same key and the
decryption algorithm. Here, the key is kept as secret while the
encryption and decryption algorithms are the known
elements. As we now know, the key is known to both the
sender and the receiver in this cryptography method, but this
key distribution is of great importance and proves to be a very Fig. 2: RSA Algorithm

600
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

In this algorithm two exponents variables are used namely e 3. Finally the plain text is available for the user.
for public and d for private. Here M and C are used as
The working of the proposed model is shown in fig.3.
plaintext and cipher text respectively to define the encryption
According to fig. 3 the proposed model is implemented with
and decryption procedure given as follow
two separate cryptography algorithms i.e DES, symmetric
Encryption: C=Me mod n and RSA asymmetric in order to increase the security of the
Decryption: M=Cd mod n. Where n is a large number, used cloud. At the sender side DES and RSA encryption are used
at key generation time. to encode the uploaded text file. After uploading the test file
DES is applied that breaks the data into the blocks of bits and
Shakeeba S. Khan et. al [10] have used the combination of
this b64 bits plain text becomes the input of DES that produce
DES and RSA for the secure data storage and
64 bits of cipher text, but the actual key size of DES is 56 bits.
communication, but it has some limitation. In this paper a
hybrid multilevel encryption and decryption method is
proposed to enhance security performance of the existing
model.
VII. PROPOSED CRYPTOGRAPHY MODEL
In the current situations the cyber criminals are very active
and always wants to hack important data, files and records for
the cloud storage, because most of the organizations are using
third party cloud services, so cloud security becomes the main
concern . In this paper a hybrid multilevel symmetric key and
asymmetric key algorithm is developed and implemented Fig. 3: Flowchart of the proposed Encryption and Decryption techniques
where at client side the data encryption is done and then it is In DES the encryption sixteen Feistel rounds and two
uploaded to a web-based cloud storage service. Many service permutations (P- boxes) are used to produce the initial and
providers, while moving data between their own datacenters final permutation [24]. The use of 16 iterations in DES means
do not encrypt it, which may lead to data loss, privacy risks, the encryption algorithm is repeated 16 times to generates the
government intrusions, risk of intellectual property theft issue cipher text. The security is increased exponentially as the
[23] and spying efforts. Therefore, to deal with such threats, number of iteration increased. Now RSA is applied to
we can encrypt data at client side before we go on to upload generate 2nd level of encryption. After completion of 1st and
it to the cloud storage service. Even though, SSL (Secure 2nd level of encryption the cipher text is produced and stored
Sockets Layer) comes to use for keeping data private as it into the database.
establishes a link that is encrypted, between a web server and
browser while data is in transit [22], data encryption before Once the encryption process is over the multilevel decryption
being sent adds an extra layer of security to it. Thus, fulfilling process is started at receiver side by applying inverse DES
the main aim of this algorithm, i.e., to secure data while in and RSA algorithms. First inverse RSA is applies to generate
transit. 1st level of decryption and then DES is applied to generate 2nd
level of decryption, and after successful completion of the
In the proposed model DES and RSA is used for securing the decryption process the plain text is ready for display to the
text data during the transmission over the network using users.
encryption and decryption. Whenever any user wants to send
the text file, first of all the use has to upload the text file in VIII. IMPLEMENTATION
cloud storage and then in order to increase the security DES We have implement the encryption and decryption algorithm
and RSA techniques are applied for the decryption on the in Java language as shown in figure 4 and we have also used
receiver side when this file is downloaded from the cloud cloudSim cloud simulator tool. In this we applied encryption
storage. The working of the proposed system is discussed as and decryption process only on textile.
follow
Sender: Encryption
1. Sender unload the text file on the cloud storage.
2. DES is applied for the first level of encryption and after
that RSA is applied for the next level of encryption.
3. Finally the plain text is converted into the Cipher Text,
which is stored into the database.
Fig. 4. Encryption and Decryption model
Receiver: Decryption
The performance of the system is tested with different size of
1. The receiver read the Cipher Text form the database.
file that are stored in the cloud environment. The proposed
2. Now, the RSA algorithm is applied to for the first level
model takes very less time to encrypt and decrypt the test file.
of decryption and after that DES is applied for the second
The file size range is lies between 10 KB to 1000 Bytes. We
level of decryption.
have compare our model with the existing model as discussed

601
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)

in [12]. Our proposed model takes less time as shown in fig. Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume 7, Issue 4, ISSN: 2278 – 1323
5 and 6 with different file size.
(2018).
[8] Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal,
“A Survey on Security Issues in Cloud Computing” in ACTA
TEHNICA CORVINIENSIS – Bulletin of Engineering Tome VII
[2014] Fascicule 4 ISSN: 2067 – 3809.
[9] N.N Mosola, M.T Dlamini, J.M Blackledge, J.H.P Eloff, H.S Venter,
“Chaos-based Encryption Keys and Neural Key-store for Cloud-
hosted Data Confidentiality”, in Southern Africa Telecommunication
Fig.5: Size Vs Time for file uploading
Networks and Applications Conference (SATNAC) (2017)
[10] Shakeeba S. Khan, Prof.R.R. Tuteja, “Security in Cloud Computing
using Cryptographic Algorithms”, in International Journal of
Innovative Research in Computer and Communication Engineering
(An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 1, (2015)
[11] AL-Museelem Waleed, Li Chunlin, “User Privacy and Security in
Cloud Computing”, in International Journal of Security and Its
Fig. 6. Size Vs Time for file downloading Applications Vol. 10, No. 2 (2016), pp.341-352
[12] Dr. Ramalingam Sugumar, K. Raja, “EDSMCCE: Enhanced Data
IX. CONCLUSION Security Methodology for Cloud Computing Environment” in
Today's, every organization is moving towards cloud International Journal of Scientific Research in Computer Science,
Engineering and Information Technology, Volume 3 | Issue 3 | ISSN:
environment to store their data, but data security is the 2456-3307(2018).
principle issue in cloud. This paper shows various aspects of [13] Reshma Suryawanshi, Santosh Shelke, “Improving Data Storage
security issues associated with cloud environments at Security in Cloud Environment Using Public Auditing and Threshold
different level. In this paper, we propose multilevel Cryptography Scheme”, in International Conference on Computing
Communication Control and Automation (ICCUBEA),( 2016).
encryption and decryption cryptography algorithm that [14] Timothy, Divya Prathana and Ajit Kumar Santra. “A hybrid
encrypt the data at client side after uploading it to the cloud cryptography algorithm for cloud computing security.” 2017
server and decrypt it at receiver side which provides an extra International conference on Microelectronic Devices, Circuits and
layer of data security. In this paper DES and RSA encryption Systems (ICMDCS) (2017): 1-5.
[15] Khari, Manju, Manoj Kumar and Vaishali. “Secure data transference
and decryption cryptography algorithm are implemented to architecture for cloud computing using cryptography algorithms.” 3rd
increase the security of cloud storage. It also enhancing the International Conference on Computing for Sustainable Global
data security in cloud environments as compare to existing Development (INDIACom) (2016): 2141-2146.
cryptography based models. In this only the text file has been [16] S. Singh and V. Kumar, "Secured user's authentication and private
data storage- access scheme in cloud computing using Elliptic curve
used for encryption and decryption but other file formats cryptography," 2015 2nd International Conference on Computing for
could also be tested. This model increases the data security Sustainable Global Development (INDIACom), New Delhi, (2015),
up to a maximum extant and it takes less time in uploading pp. 791-795.
and downloading the text file as compare to existing system. [17] K. Brindha and N. Jeyanthi, "Securing cloud data using visual
cryptography," International Confernce on Innovation Information in
In future this model can be implemented using artificial Computing Technologies, Chennai, (2015), pp. 1-5.
intelligence techniques to enhance the security of cloud [18] Priyanka Ora, Dr.P.R.Pal, “Data Security and Integrity in Cloud
services. Computing Based on RSA Partial Homomorphic and MD5
REFERENCES Cryptography”, in IEEE International Conference on Computer,
Communication and Control (2015).
[1] Moulika Bollinadi, Vijay Kumar Damera, “Cloud Computing:
Security Issues and Research Challenges” in Journal of Network [19] Prerna and Parul Agarwal, “Cryptography Based Security for Cloud
Computing System”, International Journal of Advanced Research in
Communications and Emerging Technologies (JNCET) Volume 7,
Computer Science, Volume 8, No. 5, (2017).
Issue 11, (2017).
[2] Anshika Negi, Mayank Singh, Sanjeev Kumar, “An Efficient Security [20] Dharitri Talukdar, “Study on symmetric key encryption: An
Overview”, International Journal of Applied Research. (2015); 1(10):
Framework Design for Cloud Computing using Artificial Neural
543-546.
Networks” in International Journal of Computer Applications (0975
– 8887) Volume 129 – No.4, (2015). [21] Gary C. Kessler, “an Overview of Cryptography”, Embry-Riddle
Aeronautical University - Daytona Beach, (2016)
[3] A Venkatesh, Marrynal S Eastaff, “A Study of Data Storage Security
[22] David G. Rosado, Eduardo Fernandez-Medina, Eduardo B
Issues in Cloud Computing”, in International Journal of Scientific
Research in Computer Science, Engineering and Information Fernandez, “An analysis of security issues for cloud computing”,
Journal of Internet Services and Applications, (2013).
Technology, Volume 3-No 1, (2018).
[23] Dr. Tomislav Nad,”Advances and Trends in Cryptography”, SIGS
[4] Y Z An, Z F Zaaba & N F Samsudin, “Reviews on Security Issues
and Challenges in Cloud Computing”, International Engineering Technology Summit, (2015).
[24] G. Devi, M. Pramod Kumar, “Cloud Computing: A CRM Service
Research and Innovation Symposium (IRIS), Conf. Series: Materials
Based on a Separate Encryption and Decryption using Blowfish
Science and Engineering 160 (2016).
algorithm “, International Journal of Computer Trends and
[5] J. Yang and Z. Chen, "Cloud Computing Research and Security
Technology Volume 3 Issue 4, ISSN: 2231-2803, pp. 592-596, 2012
Issues," 2010 International Conference on Computational
Intelligence and Software Engineering, Wuhan, 2010, pp. 1-3.doi:
10.1109/CISE.2010.5677076.
[6] Deepanshi Nanda, Sonia Sharma, “Security in Cloud Computing
using Cryptographic Techniques”, International Journal of Computer
Science and Technology Vol. 8, Issue 2, (2017).
[7] Adnaan Arbaaz Ahmed, Dr.M.I.Thariq Hussan, “Cloud Computing:
Study of Security Issues and Research Challenges” in International

602

View publication stats

You might also like