Professional Documents
Culture Documents
MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, er.aman_jot@yahoo.co.in
Assistant Professor, Computer Science Department, LPU, Jalandhar, Punjab, India, ermanisha.cse@gmail.com
Abstract
In cloud computing environment the new data management model is in use now a days that enables data integration and access on a
large scale cloud computing as a service termed as Database-as-a-service (DAAS). Through which service provider offers customer
management functionalities as well as the expensive hardware. Data privacy is the major security determinant in DAAS because data
1-2 will be shared with a third party; an un-trusted server is dangerous and unsafe for the user. This paper shows a concern on the
2 notes:
security element in cloud environment. It suggests a technique to enhance the security of cloud database. This technique provides the
flexible multilevel and hybrid security. It uses RSA, Triple DES and Random Number generator algorithms as an encrypting tool.
1.1 3DES
DES was superseded by triple DES (3DES) in November
1998. 3DES is exactly what it is namedit performs 3
12/2/2013
by: Terry Cl.iterations of DES encryption on each block. It can do this in a
number of ways, but the most common method is the Minus
06 Encrypt-Decrypt-Encrypt (-EDE) method. Each iteration of
12/2/2013
3DES using EDE will encrypt a block using a 56-bit key.
by: Terry Cl.
After encryption, use a different 56-bit key to decrypt the
block. On the last pass, a 56-bit key is used to encrypt the data
05
1.3 RSA
RSA is a commonly adopted public key cryptography
algorithm. The first, and still most commonly used asymmetric
algorithm RSA is named for the three mathematicians who
developed it, Rivest, Shamir, and Adleman. RSA today is used
737
ISSN: 22503676
User Interface
3.
PRACTICAL
PROCEDURE
TO
BE
3.
4.
Programming
738
ISSN: 22503676
4. RESULTS
12/2/2013
by: Terry Cl.
739
ISSN: 22503676
5. CONCLUSION
09
12/2/2013
by: Terry Cl.
6. FUTURE WORK
When the size of data is increased then its computation time is
increased, one can decrease computation time by using
appropriate methods. In ADO.NET, when decryption process
is carried down then private key corrupts occasionally. To
resolve this problem one can generate ones own code without
using any encoding method built in .net framework.
REFERENCES
Fig 9: Connect SQL server with windows Azure
740
ISSN: 22503676
Volume-2, Issue-3, 737 741
BIOGRAPHIES
Amanjot Kaur received her B.Tech
degree in Computer Science
&
Engineering from Punjab Technical
University, Punjab, India, in 2009.
Currently she is pursuing M.E degree in
Computer Science & Engineering from
Lovely Professional University Phagwara,
India.
Manisha Bhardwaj received her
M.E. degree in Computer Science &
Engineering from Punjab University
Campus, Chandigarh, India in 2010,
working on grid security systems
architecture. Currently she is working
as assistant professor in Computer
Science & Engineering Department at
Lovely
Professional
University
Jalandhar, India. She has 3years of
Teaching Experience and her research interests include
parallel and distributed systems, distributed security
architectures, distributed services like grid and web services,
privacy and trust related issues in distributes environments.
741
Annotations
Terry Clement
Page no. 1
2/12/2013 9:28
01. Scope - The main concern of this paper is about the security elemnet in the cloud environment
especially in the cloud database. Since the Database-as-a-service is a third party server, the data
privacy becomes a major security issue.
02
Terry Clement
Page no. 1
2/12/2013 10:01
02. Method - The paper suggests a technique using three types of encryption tools which are the RSA,
3DES and Random Number Generator Algorithm to enchance the security of cloud database.
03
Terry Clement
Page no. 1
2/12/2013 10:07
03. Problem - Cloud computing is still considered as a new technology to some organizations. The are
no set standards for the data storage and application communication. Therefore, changing the service
provider is impossible at the moment as the data privacy is a main issue.
04
Terry Clement
Page no. 1
2/12/2013 10:30
05. Method - Another method in the proposed technique is the Random Number Generator. The
cryptography machanism lot of random numbers is used to create random keys.
05
Terry Clement
Page no. 1
2/12/2013 10:16
04. Method - One of the methodology in this paper is the Triple DES (3DES). It performs 3 iterations of
DES encryption of each block. The most common methods used are the Minus Encryt-Decrypt-Encrypt
(-EDE) and Minus Encrypt-Encrypt-Encrypt (-EEE).
06
Terry Clement
Page no. 1
2/12/2013 10:35
06. Method - The last method in the technique called RSA; a commonly adopted public key
cryptography algorithm. It uses a variable size encryption block and a variable size key. In the
authentication scheme, the server implements public key authentication with client by signing a unique
message from the client with its private key, thus creating what is called a digital signature.
07
Terry Clement
Page no. 2
2/12/2013 10:42
07. Method - In the methodology and tools, the writers implement their system by using Microsoft
Window Azure Service to demonstrate the functionality.
08
Terry Clement
Page no. 3
2/12/2013 10:47
08. Achievement - The writers show the result and provide the step-by -step on using the system. They
also provide diagrams for reference.
09
Terry Clement
Page no. 4
2/12/2013 10:57
09. Achievement - With the implementation of the technique, the database security has been enchaced.
User can apply all or omit any encryption tools in any order. Even if the user does not select any
encryption technique, then random number algorithm will be implemented by default thus providing
atleast a single level security.