SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 5, July 2012




  A SURVEY ON CLOUD DATA SECURITY
    USING ENCRYPTIOIN TECHNIQUE
                                              C.BAGYALAKSHMI
                             Research scholar, Department of Computer Science
                             NGM College, Pollachi, Coimbatore, India – 642001
                                     E-mail: bagyachithra@gmail.com

                                        DR.R.MANICKA CHEZIAN
                            Associate Professor, Department of Computer Science
                            NGM College, Pollachi, Coimbatore, India – 642001

                                                         ABSTRACT

         Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are
provided as services of the internet. It allows consumers and business to use application without installation and access their
personal files at any computer with internet access. It provides people the way to share distributed recourses and services
that belong to different organizations or sites. Since it share distributed resources via the network in the open environment,
thus it makes security problems important for us to develop the cloud computing application, when consumers shares their
data on cloud servers which is not within the same trusted domain data owners. To keep user data confidential against
trusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. This paper
explores various data encryption technique such as Hybrid algorithm, DES algorithm, Identity based encryption.

Key Terms: Cloud Computing, Encryption, Cryptography, Plaintext, Security.

                  I INTRODUCTION

Cloud computing is internet based computing where                           Protecting privacy in cloud providers is a
virtual    shared      servers   provide     software,            technical challenge. In cloud environment, this
infrastructure, platform, devices and other resources             challenge is complicated by distributed nature of
and hosting to computers on a pay-as-you-use basis.               clouds and lack of subscriber knowledge over where
The world of computation has changed from                         the data is stored i.e. about data center and
centralized to distributed systems and now we are                 accessibility of the users. In cloud computing have
getting back to the virtual centralization. During the            problem like security of data, file systems, backups,
past few years, cloud computing grown from being a                network traffic and host security. Cryptographic
promising [1], Business idea to one of the fastest                encryption is certainly the best practice. Encryption
growing parts of the IT industry. IT organizations                techniques should also be used for data in transit. In
have express concern about security issues that exist             addition authentication and integrity protection
with the widespread implementation of cloud                       ensure that data only goes where the user wants it to
computing. Cloud computing uses the internet as the               go and its’ not modified in transit. User
communication media. Cloud computing provides                     authentication is often the primary basis for access
three services are SaaS (Software as a service), PaaS             control. In the cloud environment authentication and
(Platform as a service), IaaS (Infrastructure as a                access control are more important than ever since the
service) [6]. A cloud computing system must make a                cloud and all of its data are accessible to anyone over
copy of all its clients’ information and store it on              the internet.
other devices. These copies are enabling to the
central server to access backup machines to retrieve
the data.


                                                                                                                          262

                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012


                  II RELATED WORKS                            The replacement remains the same throughout the
                                                              message, so the cipher is classed as a type of
         The cloud security conations a different sort        monoalphabetic substitution, as opposed to
of taxonomy based on fifteen security domains and             polyalphabetic substitution.
processes that need to be followed in an overall cloud
deployment. The security concerns can be                          B. DES ALGORITHM
categorized as Traditional security, Availability and
Third-party Data Control [5]. A user wants to login to                  In cloud computing have problem like
a secured cloud system. To login into a system must           security of data, file system, backups, network traffic,
provide a correct combination of user name and                and host security. A data security using encryption
password and it should be matched with the                    decryption with DES algorithm whiles us transferring
combination stored in the database whether in                 it over the network. The Data Encryption Standard
plaintext from or in encrypted form.                          (DES) [4] is the name of the Federal Information
                                                              Processing Standard (FIPS), which describes the Data
         III. ENCRYPTION TECHNIQUES                           Encryption Algorithm (DEA).DES Structure (Fig 1)
                                                              has a 64-bit block size and uses a 56 bit key during
    A. HYBRID ALGORITHM                                       execution. Its’ a symmetric cryptosystem, specifically
                                                              a 16-around Feistel Cipher, when used for
          A secured login user provides login                 communication, both sender and receiver must know
credentials and then to authenticate the user system          the same secret key, which can be used to encrypt
encrypts the provided password up to the number of            and decrypt the message or to generate and verify a
times defined to the system. Hybrid Algorithm [2] is          Message Authentication Code (MAC).It can also be
used to encrypt the message by which firstly the              used for Single user encryption, such as to store files
password will be encrypted by the Ceaser cipher then          on a hard disk in encrypted form.
the encrypted result will again be encrypted by using         In Cipher Block Chaining mode of operation of DES,
RSA substitution algorithm and finally the result will        each block of ECB encrypted cipher text is XORed
again be encrypted by the alphabetic substation               with the next plain text block to be encrypted, thus
method. Then password will be sent to the server              making all the blocks dependent on all the previous
with the plain text user name and if it matches only          blocks this means that in order to find the plaintext of
then the user get access to the system. For generation        a particular block, you need to know the cipher text,
of encryption key best encryption method by                   the key and the cipher text for the previous block.
combing algorithms is used.                                   The first block to be encrypted has no previous cipher
In this way privacy to the secured cloud is provided          text, so the plain text is XORed with 64-bit number
by which transactions can take place. Because                 called the initialization vector. This mode of
technique behind user name and password by                    operation is more secure then ECB (Electronic code
combining three algorithms that are RSA, Monotonic            book) because the extra XOR step adds one more
and Ceaser cipher by which security is provided.              layer to the encryption process.DES exhibits the
Firstly Password is encrypted by Ceaser cipher then           complementation property, namely that
the encrypted result is again be encrypted by using
RSA algorithm and finally the result is again be
encrypted by mono alphabetic substation method.
Developers can benefit from this technique in order           Where is the bitwise complement of
to provide security.
          The encryption can also be represented                   Denotes encryption with key
using modular arithmetic by first transforming the                And     denote plaintext and cipher text blocks
letters into numbers, according to the scheme, A = 0,         respectively.
B = 1,..., Z = 25.Encryption of a letter by a shift n
can be described mathematically as,                           The complementation property means that the work
                                                              for a brute force attack could be reduced by a factor
                                                              of 2 (or a single bit) under a chosen-plaintext
                                                              assumption. By definition, this property also applies
                                                              also to TDES cipher.

Decryption is performed similarly,




                                                                                                                 263

                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                           International Journal of Advanced Research in Computer Engineering & Technology
                                                                                Volume 1, Issue 5, July 2012


                                                                   C. INDENTITY BASED ENCRYPTION

                                                                         Identity based Encryption (IBE) is frequent
                                                               for the entities to communicate manually. To achieve
                                                               the security in the communication, it is important to
                                                               impose an encryption and signature schemes.IBE [3]
                                                               is a form of public key cryptography in which a third
                                                               party server uses a simple identifier, such as an e-
                                                               mail address, to generate a public key cryptography
                                                               that can be used for encrypting and decrypting
                                                               electronic messages. Compared with typical public
                                                               key cryptography, this greatly reduces the complexity
                                                               of the encryption process for both users and
                                                               administrators.      An added advantage is that a
                                                               message recipient doesn’t need advance preparation
                                                               or specified software to read the communication. IBE
                                                               depends upon the third-party IBE server that
                                                               generates private keys. The only information this
                                                               server stores permanently is a secret key a large
                                                               random number that is exclusive to the security
                                                               domain. The server uses this key to create a common
                                                               set of public key parameters that are given to each
                                                               user who installs the IBE software, and recipient’s
                                                               private keys are required.
                                                                         When sender creates an encrypted message,
                                                               the IBE software on his system uses three parameters
                                                               to generate the public key for the message a string
                                                               value, the current week number and the parameter’s
                                                               identity. A user who receives an IBE encrypted e-
                                                               mail message but has not used the process before can
                                                               request upon authentication a private key that allows
                                                               him to decrypt all e-mails encrypted using his e-mail
                                                               address as the public key.
                                                                         An identity based signature scheme is
                                                               deterministic if the signature on a message by the
                                                               same user is always the same. The private key
                                                               generator provides the security parameter as the input
                                                               to this algorithm, generates the systems parameters
                                                               and the master private key. This algorithm on input a
          Fig1. Structure of DES                               signature on message m by the user with identity ID,
                                                               parameters, checks whether signature is valid on
DES (Fig 1) also has four so-called weak keys.                 message m by ID.
Encryption (E) and decryption (D) under a weak key
have the same effect (see involution):                                IV. CONCLUSION & FUTURE SCOPE
                                  or     equivalently,
                                                                         Among the many IT giants driven by trends
                                                               in cloud computing has not doubtful. It gives almost
There are also six pairs of semi-weak keys.                    everyone has brought good news. Provision of
Encryption with one of the pair of semiweak                    security to the users data on the cloud will defiantly
keys,    operates identically to decryption with the           empowers the data owner to outsource to the cloud.
other,    :                                                    Data security has become the most important issue of
                                                               cloud computing security. The main contribution of
                                       or equivalently,        this paper is the new view of data security solution
                                                               with encryption, which is important and can be used
                                                               as reference for designing the complete security
                                                               solution.

                                                                                                                264

                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012


         In future work, that data storage security in            3.  Neha       Jain     and     Gurpreet    Kaur
cloud computing, an area full of challenges and of                    “Implementing DES Algorithm in Cloud for
paramount importance, are still in its infancy now,                   Data Security” VSRD International Journal
and many research problems are yet to be identified                   of Computer Science & Information
is to enhance the more security features by using                     Technology- vol 2(4), ISSN: 2231-2471,
other enhanced techniques of data security through                    2012.
cryptosystems and other technique. A best technique               4. D.H.       Patil     “Data    Security   over
for securing cloud by mixture of algorithms, in this                  Cloud“International Journal of Computer
analysis fully delivers on the promise of merging the                 Applications 2012.
best aspects of dynamic and static testing into a                 5. G. Jai Arul Jose “Implementation of Data
tightly interwoven approach for rapidly resolving                     Security in cloud Computing” International
security vulnerabilities in software.                                 Journal of P2P Network Trends and
                                                                      Technology – vol 1, Issue1- 2011.
                                                                  6. Sriram Ramanujam “Data Security in Cloud
                  V. REFERENCES                                       Computing” J.Comp. & Math. Sci –
                                                                      vol 2(1),2011.
    1.   Sunia Rani, Ambrish Gangal “Cloud                        7. M.Rashid and F. Saeed, “Integfrating
         Security with Encryption using Hybrid                        Classical      Encryption     with    Modern
         Algorithm”     International Journal of                      Technique”
         Computer      Science    and   Information                   International Journal of Computer Science
         Technologies, vol. 3(3), ISSN: 0975-9646,                    and Network Security, Vol.10 No.5 2010.
         2012.                                                    8. http://en.kipedia.org/wiki/cloud_computing
    2.   Simarjeet     Kaur    “Cryptography   and                9. http://www.cs./~crypto/historical/caesar.htm
         Encryption in Cloud Computing” VSRD                          l
         International Journal of Computer Science                10. http://crypto.stanford.edu/ibe/
         & Information Technology- vol 2(3), ISSN:                11. http://eprint.iacr.org/2010/010.pdf
         2231-2471, 2012.                                         12. http://en.wikipedia.org/wiki/Block_cipher_
                                                                      modes_of_operation




                                                                                                             265

                                         All Rights Reserved © 2012 IJARCET

Más contenido relacionado

La actualidad más candente

Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 

La actualidad más candente (20)

Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
El35782786
El35782786El35782786
El35782786
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
E031102034039
E031102034039E031102034039
E031102034039
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
H1803035056
H1803035056H1803035056
H1803035056
 

Similar a 262 265

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534IJRAT
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
 

Similar a 262 265 (20)

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
489 493
489 493489 493
489 493
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
J018145862
J018145862J018145862
J018145862
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
Q01725110114
Q01725110114Q01725110114
Q01725110114
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
R180203114117
R180203114117R180203114117
R180203114117
 

Más de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Más de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

262 265

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE C.BAGYALAKSHMI Research scholar, Department of Computer Science NGM College, Pollachi, Coimbatore, India – 642001 E-mail: bagyachithra@gmail.com DR.R.MANICKA CHEZIAN Associate Professor, Department of Computer Science NGM College, Pollachi, Coimbatore, India – 642001 ABSTRACT Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are provided as services of the internet. It allows consumers and business to use application without installation and access their personal files at any computer with internet access. It provides people the way to share distributed recourses and services that belong to different organizations or sites. Since it share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application, when consumers shares their data on cloud servers which is not within the same trusted domain data owners. To keep user data confidential against trusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. This paper explores various data encryption technique such as Hybrid algorithm, DES algorithm, Identity based encryption. Key Terms: Cloud Computing, Encryption, Cryptography, Plaintext, Security. I INTRODUCTION Cloud computing is internet based computing where Protecting privacy in cloud providers is a virtual shared servers provide software, technical challenge. In cloud environment, this infrastructure, platform, devices and other resources challenge is complicated by distributed nature of and hosting to computers on a pay-as-you-use basis. clouds and lack of subscriber knowledge over where The world of computation has changed from the data is stored i.e. about data center and centralized to distributed systems and now we are accessibility of the users. In cloud computing have getting back to the virtual centralization. During the problem like security of data, file systems, backups, past few years, cloud computing grown from being a network traffic and host security. Cryptographic promising [1], Business idea to one of the fastest encryption is certainly the best practice. Encryption growing parts of the IT industry. IT organizations techniques should also be used for data in transit. In have express concern about security issues that exist addition authentication and integrity protection with the widespread implementation of cloud ensure that data only goes where the user wants it to computing. Cloud computing uses the internet as the go and its’ not modified in transit. User communication media. Cloud computing provides authentication is often the primary basis for access three services are SaaS (Software as a service), PaaS control. In the cloud environment authentication and (Platform as a service), IaaS (Infrastructure as a access control are more important than ever since the service) [6]. A cloud computing system must make a cloud and all of its data are accessible to anyone over copy of all its clients’ information and store it on the internet. other devices. These copies are enabling to the central server to access backup machines to retrieve the data. 262 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 II RELATED WORKS The replacement remains the same throughout the message, so the cipher is classed as a type of The cloud security conations a different sort monoalphabetic substitution, as opposed to of taxonomy based on fifteen security domains and polyalphabetic substitution. processes that need to be followed in an overall cloud deployment. The security concerns can be B. DES ALGORITHM categorized as Traditional security, Availability and Third-party Data Control [5]. A user wants to login to In cloud computing have problem like a secured cloud system. To login into a system must security of data, file system, backups, network traffic, provide a correct combination of user name and and host security. A data security using encryption password and it should be matched with the decryption with DES algorithm whiles us transferring combination stored in the database whether in it over the network. The Data Encryption Standard plaintext from or in encrypted form. (DES) [4] is the name of the Federal Information Processing Standard (FIPS), which describes the Data III. ENCRYPTION TECHNIQUES Encryption Algorithm (DEA).DES Structure (Fig 1) has a 64-bit block size and uses a 56 bit key during A. HYBRID ALGORITHM execution. Its’ a symmetric cryptosystem, specifically a 16-around Feistel Cipher, when used for A secured login user provides login communication, both sender and receiver must know credentials and then to authenticate the user system the same secret key, which can be used to encrypt encrypts the provided password up to the number of and decrypt the message or to generate and verify a times defined to the system. Hybrid Algorithm [2] is Message Authentication Code (MAC).It can also be used to encrypt the message by which firstly the used for Single user encryption, such as to store files password will be encrypted by the Ceaser cipher then on a hard disk in encrypted form. the encrypted result will again be encrypted by using In Cipher Block Chaining mode of operation of DES, RSA substitution algorithm and finally the result will each block of ECB encrypted cipher text is XORed again be encrypted by the alphabetic substation with the next plain text block to be encrypted, thus method. Then password will be sent to the server making all the blocks dependent on all the previous with the plain text user name and if it matches only blocks this means that in order to find the plaintext of then the user get access to the system. For generation a particular block, you need to know the cipher text, of encryption key best encryption method by the key and the cipher text for the previous block. combing algorithms is used. The first block to be encrypted has no previous cipher In this way privacy to the secured cloud is provided text, so the plain text is XORed with 64-bit number by which transactions can take place. Because called the initialization vector. This mode of technique behind user name and password by operation is more secure then ECB (Electronic code combining three algorithms that are RSA, Monotonic book) because the extra XOR step adds one more and Ceaser cipher by which security is provided. layer to the encryption process.DES exhibits the Firstly Password is encrypted by Ceaser cipher then complementation property, namely that the encrypted result is again be encrypted by using RSA algorithm and finally the result is again be encrypted by mono alphabetic substation method. Developers can benefit from this technique in order Where is the bitwise complement of to provide security. The encryption can also be represented Denotes encryption with key using modular arithmetic by first transforming the And denote plaintext and cipher text blocks letters into numbers, according to the scheme, A = 0, respectively. B = 1,..., Z = 25.Encryption of a letter by a shift n can be described mathematically as, The complementation property means that the work for a brute force attack could be reduced by a factor of 2 (or a single bit) under a chosen-plaintext assumption. By definition, this property also applies also to TDES cipher. Decryption is performed similarly, 263 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 C. INDENTITY BASED ENCRYPTION Identity based Encryption (IBE) is frequent for the entities to communicate manually. To achieve the security in the communication, it is important to impose an encryption and signature schemes.IBE [3] is a form of public key cryptography in which a third party server uses a simple identifier, such as an e- mail address, to generate a public key cryptography that can be used for encrypting and decrypting electronic messages. Compared with typical public key cryptography, this greatly reduces the complexity of the encryption process for both users and administrators. An added advantage is that a message recipient doesn’t need advance preparation or specified software to read the communication. IBE depends upon the third-party IBE server that generates private keys. The only information this server stores permanently is a secret key a large random number that is exclusive to the security domain. The server uses this key to create a common set of public key parameters that are given to each user who installs the IBE software, and recipient’s private keys are required. When sender creates an encrypted message, the IBE software on his system uses three parameters to generate the public key for the message a string value, the current week number and the parameter’s identity. A user who receives an IBE encrypted e- mail message but has not used the process before can request upon authentication a private key that allows him to decrypt all e-mails encrypted using his e-mail address as the public key. An identity based signature scheme is deterministic if the signature on a message by the same user is always the same. The private key generator provides the security parameter as the input to this algorithm, generates the systems parameters and the master private key. This algorithm on input a Fig1. Structure of DES signature on message m by the user with identity ID, parameters, checks whether signature is valid on DES (Fig 1) also has four so-called weak keys. message m by ID. Encryption (E) and decryption (D) under a weak key have the same effect (see involution): IV. CONCLUSION & FUTURE SCOPE or equivalently, Among the many IT giants driven by trends in cloud computing has not doubtful. It gives almost There are also six pairs of semi-weak keys. everyone has brought good news. Provision of Encryption with one of the pair of semiweak security to the users data on the cloud will defiantly keys, operates identically to decryption with the empowers the data owner to outsource to the cloud. other, : Data security has become the most important issue of cloud computing security. The main contribution of or equivalently, this paper is the new view of data security solution with encryption, which is important and can be used as reference for designing the complete security solution. 264 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 In future work, that data storage security in 3. Neha Jain and Gurpreet Kaur cloud computing, an area full of challenges and of “Implementing DES Algorithm in Cloud for paramount importance, are still in its infancy now, Data Security” VSRD International Journal and many research problems are yet to be identified of Computer Science & Information is to enhance the more security features by using Technology- vol 2(4), ISSN: 2231-2471, other enhanced techniques of data security through 2012. cryptosystems and other technique. A best technique 4. D.H. Patil “Data Security over for securing cloud by mixture of algorithms, in this Cloud“International Journal of Computer analysis fully delivers on the promise of merging the Applications 2012. best aspects of dynamic and static testing into a 5. G. Jai Arul Jose “Implementation of Data tightly interwoven approach for rapidly resolving Security in cloud Computing” International security vulnerabilities in software. Journal of P2P Network Trends and Technology – vol 1, Issue1- 2011. 6. Sriram Ramanujam “Data Security in Cloud V. REFERENCES Computing” J.Comp. & Math. Sci – vol 2(1),2011. 1. Sunia Rani, Ambrish Gangal “Cloud 7. M.Rashid and F. Saeed, “Integfrating Security with Encryption using Hybrid Classical Encryption with Modern Algorithm” International Journal of Technique” Computer Science and Information International Journal of Computer Science Technologies, vol. 3(3), ISSN: 0975-9646, and Network Security, Vol.10 No.5 2010. 2012. 8. http://en.kipedia.org/wiki/cloud_computing 2. Simarjeet Kaur “Cryptography and 9. http://www.cs./~crypto/historical/caesar.htm Encryption in Cloud Computing” VSRD l International Journal of Computer Science 10. http://crypto.stanford.edu/ibe/ & Information Technology- vol 2(3), ISSN: 11. http://eprint.iacr.org/2010/010.pdf 2231-2471, 2012. 12. http://en.wikipedia.org/wiki/Block_cipher_ modes_of_operation 265 All Rights Reserved © 2012 IJARCET