Professional Documents
Culture Documents
2016Congress
World Congress
on Computing
on Computing
and Communication
and Communication
Technologies
Technologies
(WCCCT)
Abstract— Cloud Computing is a distributed and centralized unauthorized party to alter the data which is stored by the
network of inter connected and inter related systems with one user. Many users acquire security by making their data very
or more IT resources provisioned based on pay-on-demand confidential. Cloud also allows the same technique towards
usage. Even though Cloud consumers or users are more the security concern. According to cloud environment,
flexible with cloud resources, there exist various issues which encrypting the users’ data can be done by either two parties,
bring down the usage of cloud resources. Security issue is the
major one among them. Data Security and Privacy, Identity
namely, Third Party Auditor (TPA) or Cloud Service
and Access Management, Disaster Recovery/Business Providers (CSP). Whenever the users rely on these parties,
Continuity Planning etc., are some of the crisis related to data there is no reliability of data which is stored on cloud. Thus,
stored on the cloud. Since the cloud users are more concerned now-a-days the users themselves get into the process of
with their data, its security is a major issue which has to be encrypting their own sensitive data before sending it to
dealt seriously. Securing the users’ data can be achieved by the cloud for storage.
conventional method of Cryptography. Encryption is done by
using any one of the popular symmetric or asymmetric key A. Confidentiality
algorithms such as AES, DES, RSA, Blowfish and Triple DES
etc., RSA algorithm which is a asymmetric key algorithm using
two different keys for encryption and decryption processes.
It is the characteristic of something being made accessible
The Key size can be varied to make the encryption process only to authorized parties. Security measures are used to
strong. Hence it is difficult for the attackers to intrude dthe prevent data from unauthorized access.
data. Increasing key size correspondingly increases the time
taken for encryption and decryption process. The proposed B. Integrity
algorithm reduces the time of encryption and decryption
processes by dividing the file into blocks and enhances the It is the characteristic of not having been altered by an
strength of the algorithm by increasing the key size. This unauthorized party. Integrity is also extended to hold how
strength paves the way to store data in cloud by the users data is
without any inconvenience.
a) stored
Keywords — Cloud Computing, Data Security, RSA, Key size,
b) processed and
Blocks. c) retrieved.
I. INTRODUCTION C. Availability
In the new evolutionary technology, cloud computing
forms an architecture provisioning many IT resources as It is the characteristic of being accessible and usable
operating systems, processing power, storage, software, during a specified time period [3].
platform etc., Services provided by this new technology are
Infrastructure, Software and Platform. Cloud consumers can Fig. 1 shows the types of data protection technology
access these services from any one of the types of cloud: which is often referred as CIA (Confidentiality, Integrity,
public, private, hybrid and community. Public Cloud users and Availability) triad [4].
can have more access control over Infrastructure than others
[1]. This new technology brings out many advantages like
cost efficiency, increased storage capacity, backup and DATA
recovery, continuous resource availability and location PROTECTION
independence [2]. Since users’ data are shared among
servers, the security of the sensitive data of the consumer is
a major concern in Cloud. This leads the importance of
storing data in a secured way. The conventional security
CONFIDENTIALITY INTEGRITY AVAILABILITY
mechanism in the normal network is Cryptography. It plays
a major role in the security concern. The major technology
used in cryptography is Encryption. This technology
preserves confidentiality and integrity of data. The
characteristic of confidentiality is data being made Fig. 1 CIA Triad of Data Protection Technology
accessible only to authorized parties. Integrity will not allow
Rebalanced RSA CRT [13] is a variant of RSA which Stage 3 : Decryption Process
balances both encryption and decryption sides. This scheme The Plain text can be found by using M = CD mod (N2).
is feasible in any RSA embedded protocol environments
173
The third step of the stage 1 calculates Euler Totient [18] It is perceived that proposed algorithm ERSA
value of r. The public key E is chosen in such a way that the outperforms the High Speed and Secure RSA algorithms in
GCD of E and the Euler Totient value of r is equal to 1. The encryption speed and decryption time.
final step of stage 1 computes the private key D. Fig. 2 and Fig. 3 represent the reduction in encryption and
decryption time according to ERSA than the High Speed
Stage 2 : This stage does the process of converting plain and Secure RSA.
text to cipher text. This process uses the Public key E and
N1 values, where N1 is a product of four prime numbers.
Thus the cipher text C is generated after the completion of
Stage 2.
TABLE I
Fig. 3 Comparison of Decryption Time with different Key Sizes
COMPARISON OF ENCRYPTION AND DECRYPTION TIME OF
TWO ALGORITHMS WITH DIFFERENT KEY SIZES Table II exposes the average time for encryption and
decryption processes of ERSA has been reduced in a greater
level than the High Speed and Secure RSA.
TABLE II
174
It is revealed that the average encryption time of ERSA is MD5 Algorithm for Resource Attestation and Sharing in Java
so much condensed than High Speed and Secure RSA. Environment”, IEEE, doi:10.1109/CONSEG.2012.6349503, pp. 1-8,
2016.
Regarding decryption time, the ERSA shows better results [7]Pachipala Yellapa, Challa Narasimham, Velagapudi Sreenivas, “Data
than the other. Security in Cloud using RSA”,IEEE, pp. 1-6, 2013.
Fig. 4 depicts the variation in average time of Encryption [8]Vishwanath S. Mahalle, Aniket K. Shahade, “Enhancing the data
and Decryption processes of two different algorithms security in Cloud by implementing Hybrid (Rsa & Aes) Encryption
Algorithm”, IEEE, doi: 10.1109/INPAC.2014.6981152, pp. 146-149,
namely, High Speed and Secure RSA and the proposed 2016.
algorithm ERSA. It is denoted that the average speed of [9]Atul Kahate, Cryptography and Network Security, Tata McGraw Hill
Encryption and Decryption processes of ERSA algorithm is Education Private Ltd., New Delhi, 2010.
higher than the High Speed and Secure RSA algorithm. [10]Nasrin Khanezaei, Zurina Mohd Hanapi, “A framework based on RSA
and AES encryption algorithms for cloud computing services”, IEEE,
doi: 10.1109/SPC.2014.7086230, pp. 58-62, 2016.
[11]Aayushi Priya, Y. K. Rana, B. P. Patel, “Design and Implementation of
an Algorithm to Enhance Cloud Security”, International Journal of
Computer Applications, Vol. 113, No. 12, pp. 41-46, 2015.
[12] Prakash G L , Dr. Manish Prateek, Dr. Inder Singh, “Data Encryption
and Decryption Algorithms using Key Rotations for Data Security in
Cloud System”, International Journal Of Engineering And Computer
Science, Vol. 3, No. 4, pp. 5216-5223, 2014.
[13]Seema Verma and Deepak Garg, “Improvement in Rebalanced CRT
RSA”, The International Arab Journal of Information Technology, Vol.
12, No. 6, pp. 524-531, 2015.
[14]Gayathri Devi P, “Overview of RSA and its enhancements”,
International Journal of Innovative Research and Development, Vol. 2,
No.11, pp. 306-310, 2013.
[15]Motasem A. Abu-Dawas, Abdulameer K. Hussain, “Enhancement of
RSA Scheme using Agreement Secure Information for Nearest
Parameters”, International Journal of Computer and Information
Technology, Vol. 4, No. 2, 2015.
[16]George Amalarethinam D I, Leena H M,“Enhanced RSA
Algoirithm for Data Security in Cloud”, International Journal of
Control Theory and Applications, ISSN 097-45-572. (Accepted).
[17]Sarthak R Patel, Khushbu Shah, “Security Enhancement and Speed
Fig. 4 Comparison of Average Time of Encryption and Decryption Monitoring of RSA Algorithm”, “International Journal of Engineering
Development and Research”, vol. 2, 2057-2063, 2014.
processes with different Key Sizes
[18]http://www.doc.ic.ac.uk/~mrh/330tutor/ch05s02.html
[19]George Amalarethinam D I, Sai Geetha J, and Mani K, “Analysis and
IV. CONCLUSION AND FUTURE WORK Enhancement of speed in Public Key Cryptography using Message
Encoding Algorithm”, Indian Journal of Science and Technology, Vol.
The usage of prime numbers instead of random numbers 8, pp. 1-7, 2015.
in the proposed system improves the speed of encryption
and decryption. This speed is still enhanced in the proposed
algorithm ERSA by dividing the file into several blocks.
Apart from increasing the speed, the implementation of
ERSA algorithm also makes the computation complex one
and increases the strength of security. In future, the time
spent for encryption and decryption can still be improved by
using the concept of Addition chaining. The security level
of the algorithm can also be tested using statistical methods
to find the strength of security.
REFERENCES
[1] Dimpi Rani, Rajiv Kumar Ranjan, “A Comparative Study of SaaS, PaaS
and IaaS in Cloud Computing”, International Journal of Advanced
Research in Computer Science and Software Engineering, Vol. 4,
No. 6, 2014.
[2]M.Arun Fera, C. Manikandaprabhu, Ilakiya Natarajan, K.Brinda,
R.Darathiprincy, “Enhancing security in Cloud using Trusted
Monitoring Framework”, Elsevier Procedia Computer Science 48, pp.
198 – 203, 2015.
[3]Thomas Erl, Zaigham Mahmood and Ricardo Puttini, “ Cloud
Computing Concepts, Technology & Architecture”, Prentice Hall,
Service Technology Press, 2013.
[4]Ronald L. Krutz and Russell Dean Vines, “ Cloud Security – A
Comprehensive Guide to Secure Cloud Computing”,Wiley
Publishing,Inc., 2010.
[5]Srinivasan Nagaraj, Dr.G.S.V.P.Raju, V.Srinadth, “Data Encryption
and Authentication Using Public Key Approach”, Elsevier Procedia
Computer Science 48, pp. 126 – 132, 2015.
[6]Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev,
Shiv Shakti Shrivastava, “Cloud-User Security Based on RSA and
175