SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
133 
Security as a Service: Cryptology on Demand 
Venkatesh Ranga1, M.S.V. Sashi kumar2, Dr. C.R.K.Reddy3 
M.Tech CSE1 , Assistant Professor CSE2, Professor CSE3, Osmania University1,2,3 
venkuranga@gmail.com1, sashi.mamidanna@gmail.com2, crkreddy@gmail.com 
Abstract- Cloud Computing is becoming more and more popular today and is ever increasing in popularity with 
large organizations as they sharing valuable resources in a cost effective way. By doing like this increasing 
demand for more clouds there is an ever growing threat of security becoming a major issue. Achieving strong 
security would often require large IT resource and also result in difficulty of usage. To increase security while 
reducing the spending on IT & improving the ease of use, we require a security technique which can configure 
itself, as requested, for services offered in a Cloud environment. This paper mainly focus on by the usage of less 
resources how can we provide security to the end user. The security architecture is driven by security policies 
based on these inputs into consideration. 
1. Network Access Risk 
2. User Data. 
3. Key size 
With these inputs in place, the security policies can generate security parameters which in turn are used to 
configure mechanisms to alter security (including algorithms and protocols) at every domain for protection of 
specific security services. Security requirements from users and services in cloud computing in turn building 
trust for the end users via Security at their ease & also data control. 
Key words: Cloud; Encryption; Security. 
1. INTRODUCTION 
Cloud computing has been defined by NIST as a 
model for enabling ubiquitous, on- demand network 
access to a shared pool of configurable computing 
resources that can be rapidly provisioned and released 
with minimal management effort or service provider 
interaction . In simple words cloud computing is a 
accessing some one’s software in some one’ hardware 
in some one’s data centre .Cloud computing can be 
considered a new computing paradigm with 
implications for greater flexibility and availability at 
lower cost. Cloud computing is a promising 
computing paradigm which recently has drawn 
extensive attention from both academia and industry. 
The term itself is often used today with a range of 
meanings and interpretations. 
Three referenced service models have evolved: 
Software-as-a-Service (SaaS): Is a way of delivering 
applications over the Internet. Instead of installing 
and maintaining software, you simply access it via the 
Internet. SaaS applications are sometimes called Web-based 
software or hosted software. Whatever name we 
can call it as, SaaS applications run on a SaaS 
provider’s servers. The provider manages the access 
to the application, includes security, availability, and 
performance. It can reduce the total cost of hardware 
and software development and operations. 
Platform-as-a-Service (PaaS): Platform as a Service 
(PaaS) is a way to use some one’s hardware, operating 
systems, storage and network capacity over the 
Internet. The service delivery models are allows the 
customer to rent virtualized servers and associated 
services for running existing applications or 
developing and testing new ones. It can reduce the 
cost and managing hardware and software 
components of the platform. 
Infrastructure-as-a-Service (IaaS): Infrastructure as 
a Service is a provision model in which an 
organization outsources the equipment used to support 
operations, including storage, hardware, servers. The 
service provider maintains the equipment and is 
responsible for housing, running and managing it. The 
client typically pays on a how much they are use that 
much amount customers will pay to service providers 
pay per use basis. 
The most popular cloud types are namely 
private, public and hybrid clouds. In a private cloud, 
total infrastructure for implementing the cloud is 
controlled completely by the enterprise. Typically, 
private clouds are maintained and implemented in the 
enterprise data centre and managed by internal 
resources. A private cloud maintains all data in 
resources under the control of the legal and 
contractual umbrella of the organization. This 
eliminates the regulatory and legal security concerns 
represented with information being processed on third 
party computing resources. In a public cloud, external 
organization provides the infrastructure and 
management required to implement the cloud. Public 
clouds orderly simplify implementation and are 
typically billed based on usage of resources. This 
transfers the cost from a capital expenditure to an 
operational expense and can quickly be scaled to meet 
the organization’s needs. 
Security has been and is the biggest 
challenge to cloud computing. It is hard for the users
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
134 
to believe in cloud computing due to invisibility of the 
user’s data storage and how are they protected. 
Research says that as of now there is no way to know 
if the cloud providers properly remove a client’s data, 
or whether they have saved it for some unidentified 
reason. Currently, the study on cloud security still lies 
in the preliminary study. For data storage, a TPA 
(Third Party Auditor) is proposed to verify the 
integrity of the dynamic data stored in the cloud. 
In trust management field, some experts 
considered that multiple security policies should be 
used in user’s authentication and identity 
management, and those policies must be able to avoid 
intrusion of data by unauthorized users. 
2. PROBLEM DESCRIPTION: 
Security parameters even differ for a specific 
service for two different users depending on the 
sensitivity of the information. The solution for these 
issues can simply be the usage of a highly 
complicated and secure algorithm popularly used to 
safeguard all services in the network. Potentially, this 
might not be effective way for cloud service providers 
to use the same security mechanism throughout the 
services since it consumes a lot of IT resources every 
time. It would not be a solution to consume resources 
for security itself, as we counteract the advantage of 
cloud computing platform wasting the available 
resources. 
By considering all the applications in the 
cloud environment, all the applications are using Sha1 
for authentication.AES and DES security algorithms 
to secure the data. Most of the applications are using 
same symmetric key algorithm for encrypting the any 
amount data and providing security to the user’s data. 
By using same variable key length for the 
any amount of data it will take more time for 
encryption/decryption and processing of the data 
.Using the same key for encryption/ decryption take 
same time when the data size is differ. If the data size 
is small then it will take same time and increases the 
data size. In our approach we can change the 
algorithm key size. When the size of the data changes 
If we uploading large data we can use large for foe 
security. If transferring data is small than we can go 
for small key to encrypt the data. Depending on the 
size of the file we can change the algorithm key size. 
By doing like this we can boost the performance of 
the CPU. 
3. CRYPTOGRAPHIC ALGORITHM: 
As far we are saying that every application is 
using same encryption key for encrypting the data. 
Most of the applications are using SHA1 for 
providing the security for the user authentication and 
some symmetric key algorithm for the encrypting the 
users data. In this paper we are using other symmetric 
algorithm called Blowfish. As per Researches 
Blowfish has been shown better results compare to 
other encryption algorithms. So In my Application we 
are using blowfish algorithm for encrypting the data. 
Blowfish algorithm is a symmetric block cipher that 
can be effectively used for both encryption and 
safeguarding of data. Blowfish algorithm is a Feistel 
Network and 64-bit block size and a variable key 
length from 32 bits to 448 bits in length, to calculate 
sub keys, which are used in the actual encryption and 
decryption. The P-array consists of 18 32-bit values 
while the 4 s-boxes consist of 256 32-bit values. The 
P-array is initialized first and followed by the S-boxes. 
It is a 16-round Feistel network for encryption 
and decryption. The algorithm was developed to 64- 
bit plaintext into 64 bit cipher securely. 
ENCRYPTION: 
Blowfish has 16 rounds. 
The input is a 64-bit data element, X 
Divide x into 32-bit halves, XL, XR; 
Then i= 1 to 16; 
XL = XL XOR Pi 
XR = F (XL) XOR XR; 
Swap XL and XR; 
After the 16th round, swap XL and XR again to undo 
the last swap. 
Then, XR = XR XOR P17 and XL =XL 
XOR P18, Finally, recombine XL and XR to get the 
cipher. 
Decryption same as encryption, except that 
P1, P2, P3, P4…... and P18 are used in the reverse 
order. 
Blow fish is incorporated a bitwise 
exclusive-operation to be performed on the left 32 – 
bits before modified by the F function or propagated 
to the right 32-bits for the next round. Blowfish also 
incorporated two exclusive-or operations to be 
performed after the 16 rounds and a swap operation.
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
135 
F- Function: 
All the applications are using same 
encryption algorithm and same key large key for 
protecting the data. For providing the security to the 
users the application developers are using large key. 
By using the large key it will more computation and 
time. So In my approach we are differentiating the 
users considering the network from where the user is 
accessing the application and user computation. By 
considering these two factors we can provide security 
to the users. We can differentiate the user’s security 
type by writing the policies in the application.” 
4. APPLICATION SCENARIO: 
In this paper am trying to show the 
application which it is self configure the security by 
taking the above parameters into the consideration. As 
per my knowledge all the existing applications are 
using same security mechanism in the applications for 
all the users. So by this there is a chance of wastage of 
resources. As we already know in the cloud security is 
the biggest challenge. For transmitting the data 
between the two users we can not the transfer the data 
directly. We are using some encryption mechanism to 
transfer the data. For that we have to choose best 
encryption algorithm to give better results. If the 
conversation between the two friends i.e. normal 
information there is no need usage of large bit key 
.Whenever we are transmitting secret information 
(confidential) then we need more security so there we 
can use large key to encrypt the data. By considering 
the user’s network we can change the algorithm key 
bit length. If the two user’s are from same network 
then we can use small encryption key to transfer the 
data and if the user’s are from different and untrusted 
network then we can increase the bit size. By using 
same key for everytime the system is more 
computation for encrypting and decrypting the data. 
So differcting the key lenth we can reduce the usage 
of computation in the system and time as well as we 
can also reduce the power. 
For Example: 
In an Enterprise the users are connected to 
each other then they are considered to be internal 
network. From the figure we can observe that User1, 
User2 and User3 are in same private ntework 
acessing the application hosted some where in the 
cloud environment, User4 and User5(mobile user) 
with different processing power devices are from 
public network and accessing the same application 
from the outside other than the office network. 
Whenever User1 is tranferring the data to the User2 
then we can provide security with 128-bit(small) 
key. 
User 1 
User User 
Proxy 
server 
In the internal network the users can access 
the application through the proxy server which is 
mainted in the internal network. The internal network 
users are access the application which is loacated in 
the cloud with the help of proxy server( which 
maitains the cloud application) . If the users are 
intrating in the public network users then increse 
the algorithm bit size to 256-bit key for encrypting the 
data. If the user is trying to access the application 
from the public network then we can increase the 
algorithm bit size i.e to 448-bit key to encrypt the data 
to incearse the security. In our approach we are tested 
our application with two symmetric encryption 
algorithms i.e blowfish and AES. Most of the 
application developers are using AES for encrypting 
the data . In our approach we are replacing the AES 
with Blowfish.We use blowfish for 
encryption/decryption of data.From the study learnt 
that blowfish performance is better when compare to 
other algorithms. So we can change the encryption 
algorithm according to the user requirement. We are 
tested two algorithms with different files size of data 
by using changing the algorithm key sizes . We got 
below results when tested with different algorithm 
key sizes. 
5. RESULTS: 
Application 
Server 
Public Network 
Public Network 
Amazon EC2 
Public Network
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
136 
Table 1 Encryption and decryption times(in milli sec) using 
with 128 –bit key 
Table 2 Encryption and decryption times(in milli sec) using 
with 192 –bit key 
Input 
In KB 
Encryption 
time for 
blowfish 
with 192- 
bit key 
Encryption 
time for 
AES with 
192-bit 
key 
Decryption 
times for 
Blowfish 
192-bit 
key 
Decryption 
times for 
AES 192- 
bit key 
312 46.87 147.995 436.715 1594.123 
512 60.087 156.341 447.156 1900.74 
1536 142.58 283.82 423.55 1237.054 
2048 184.984 391.643 440.152 1429.581 
5120 409.484 761.41 417.677 1215.91 
10240 725.4906 748.392 721.291 1194.154 
Table 3 Encryption and decryption times(in milli sec) using 
with 256 –bit key 
Input 
in KB 
Encryption 
time for 
blowfish 
with 256- 
bit key 
Encryption 
time for 
AES with 
256-bit 
key 
Decryption 
times for 
Blowfish 
256-bit 
key 
Decryption 
times for 
AES 256- 
bit key 
312 47.187 160.1749 450.955 1966.08 
512 58.975 176.32 428.948 1646.9 
1536 136.563 301.1285 425.802 1254.111 
2048 183.296 435.471 424.453 1418.943 
5120 401.911 759.309 389.548 1117.111 
10240 752.497 717.192 784.397 958.822 
Table 4. Encryption and decryption times(in milli sec) using 
AES 256-bit key and 448-bit key 
Figure :1 Encryption and Decryption times for Blowfish and 
AES with 128-bit Key 
2000 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
312 KB 
512 KB 
1536 KB 
2048 KB 
5120 KB 
10240 KB 
Encrypeion time in milli seconds 
File Size in KB 
Encryption time 
for blowfish 
with 128-bit 
key 
Encryption time 
AES with 128- 
bit key 
Decryption timr 
for Blowfish 
128 -bit key 
Decryption time 
for AES 128 -bit 
key 
Input 
in KB 
Encryption 
time for 
blowfish 
with 128- 
bit key 
Encryption 
time for 
AES with 
128-bit 
key 
Decryption 
times for 
Blowfish 
128-bit 
key 
Decryption 
time for 
AES with 
128 -bit 
key 
312 46.46 146.544 405.75 1316.767 
512 47.187 147.921 433 1776 
1536 128.288 212.455 413.253 1152.631 
2048 194.824 284.029 440.054 1133.744 
5120 401.911 698.02 389.548 1412.936 
10240 686.988 671.422 674.928 1277.063 
Input 
In KB 
Encryption 
time for 
AES 256- 
bit key 
Encryption 
time for 
Blowfish 
448-bit key 
Decryption 
time for 
AES 256- 
bit key 
Decryption 
time for 
Blowfish 
448-bit key 
512 176.32 64.608 1646.9 771.544 
1536 301.1285 143.8252 1254.111 846.725 
2048 435.471 196.234 1418.943 465.208 
5120 759.309 414.739 117.111 738.094 
10240 717.192 808.402 958.822 717.601
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
137 
Figure 2. Encryption and Decryption times for Blowfish and 
AES with 192-bit Key 
2000 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
Encryption tomes in milli seconds 
Input file sizes in KB 
Encryption 
time for 
blowfish 
with 192- 
bit key 
Encryption 
time for 
AES with 
192-bit key 
Decryption 
tims for 
Blowfish 
192-bit key 
Decryption 
tims for 
AES 192- 
bit key 
Figure 3. Encryption and Decryption times for Blowfish and 
AES with 256-bit Key 
2500 
2000 
1500 
1000 
500 
0 
312 KB 
512 KB 
1536 KB 
2048 KB 
5120 KB 
10240 KB 
Encryption times in milli seconds 
Input file size in KB 
Encryption time 
for blowfish with 
256-bit key 
Encryption time 
for AES with 256- 
bit key 
Decryption tims 
for Blowfish 256- 
bit key 
Decryption tims 
for AES 256-bit 
key 
Figure 4 Comparision Between the Encryption and Decryption 
Times with AES 256 and Blowfish 448- bit 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
Encryption times in milli seconds 
Input file size in KB 
Encryption 
time for AES 
256-bit key 
Encryption 
time for 
Blowfish 448- 
bit key 
Decryption 
time for AES 
256-bit key 
Decryption 
time for 
Blowfish 448- 
bit key
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
138 
6. CONCLUSION : 
In this paper we conclude that depending on 
the network users are being a part of, type of the 
application working on & the compute system used, 
we can provide the required security strengh by using 
best suited algorithm and varied key size. Transferring 
files from one network to another can be provided 
with on demand security level by increasing the bit 
size of the key. This feature can be provided on varied 
applications and deploying right security policy, the 
performance of the systems can be improved. From 
the comparision of two algorithms we found that 
blowfish performs well in all situations, but the key 
establishment still remains the concern. In traditional 
applications for encrypting any size of data, 
developers are using same key size for cryptography. 
In our scenario , we have varied the key size of the 
algorithm and the chosen algorithm depends on file 
size, user requirement and type of network. Usage of 
same key for encrypting and decrypting any amount 
of data, the allocation time for encryption and 
decryption taken more resouces in hardware and 
more time for processing the data will decrease the 
performance of the CPU. Applying right algorithm in 
the requirement will boost the performence of the 
CPU, reduce the usage hardware inturn reduce the 
processing time. 
REFERENCES: 
[1] P. Mell, T. Grance (2009), The NIST Definition 
of Cloud Computing, Version 15, National 
Institute of Standards and Technology. 
[2] Jianyong Chen, Yang Wang, Xiaomin Wang 
(2011), On demand security architecture for 
Cloud Computing, Dept.of Computer science 
and Technology, China. 
[3]M. Anand Kumar and Dr.S.Karthikeyan (2012), 
“Investigating the Efficiency Blowfish and 
Rejineal (AES)Algorithms”, I.J computer 
network and Information Technology. 
[4] Pratap Chandra Mandal (2012),”Superiority of 
Blowfish Algorithm” IJARCSSE, 
WestBengal,India. 
[5]http://docs.aws.amazon.com/gettingstarted/latest/C 
ompute basis/web-app-hosting-intro.html 
[6] http://en.wikipedia.org/wiki/Blowfish (cipher).

Más contenido relacionado

La actualidad más candente

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 

La actualidad más candente (20)

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Secry poster
Secry posterSecry poster
Secry poster
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
El35782786
El35782786El35782786
El35782786
 
H1803035056
H1803035056H1803035056
H1803035056
 
J018145862
J018145862J018145862
J018145862
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
262 265
262 265262 265
262 265
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 

Destacado

Paper id 252014121
Paper id 252014121Paper id 252014121
Paper id 252014121IJRAT
 
Paper id 26201493
Paper id 26201493Paper id 26201493
Paper id 26201493IJRAT
 
Paper id 27201419
Paper id 27201419Paper id 27201419
Paper id 27201419IJRAT
 
Paper id 21201495
Paper id 21201495Paper id 21201495
Paper id 21201495IJRAT
 
Paper id 24201467
Paper id 24201467Paper id 24201467
Paper id 24201467IJRAT
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232IJRAT
 
Paper id 24201474
Paper id 24201474Paper id 24201474
Paper id 24201474IJRAT
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107IJRAT
 
Paper id 252014144
Paper id 252014144Paper id 252014144
Paper id 252014144IJRAT
 
Paper id 21201481
Paper id 21201481Paper id 21201481
Paper id 21201481IJRAT
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422IJRAT
 
Paper id 28201438
Paper id 28201438Paper id 28201438
Paper id 28201438IJRAT
 
Paper id 27201434
Paper id 27201434Paper id 27201434
Paper id 27201434IJRAT
 
Paper id 25201433
Paper id 25201433Paper id 25201433
Paper id 25201433IJRAT
 
地方財政、預算經驗談-陳錦稷(2014.09.23)
地方財政、預算經驗談-陳錦稷(2014.09.23)地方財政、預算經驗談-陳錦稷(2014.09.23)
地方財政、預算經驗談-陳錦稷(2014.09.23)平台 青
 
Paper id 24201453
Paper id 24201453Paper id 24201453
Paper id 24201453IJRAT
 
Paper id 21201475
Paper id 21201475Paper id 21201475
Paper id 21201475IJRAT
 
Paper id 21201429
Paper id 21201429Paper id 21201429
Paper id 21201429IJRAT
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126IJRAT
 
Paper id 2120143
Paper id 2120143Paper id 2120143
Paper id 2120143IJRAT
 

Destacado (20)

Paper id 252014121
Paper id 252014121Paper id 252014121
Paper id 252014121
 
Paper id 26201493
Paper id 26201493Paper id 26201493
Paper id 26201493
 
Paper id 27201419
Paper id 27201419Paper id 27201419
Paper id 27201419
 
Paper id 21201495
Paper id 21201495Paper id 21201495
Paper id 21201495
 
Paper id 24201467
Paper id 24201467Paper id 24201467
Paper id 24201467
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 
Paper id 24201474
Paper id 24201474Paper id 24201474
Paper id 24201474
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 
Paper id 252014144
Paper id 252014144Paper id 252014144
Paper id 252014144
 
Paper id 21201481
Paper id 21201481Paper id 21201481
Paper id 21201481
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422
 
Paper id 28201438
Paper id 28201438Paper id 28201438
Paper id 28201438
 
Paper id 27201434
Paper id 27201434Paper id 27201434
Paper id 27201434
 
Paper id 25201433
Paper id 25201433Paper id 25201433
Paper id 25201433
 
地方財政、預算經驗談-陳錦稷(2014.09.23)
地方財政、預算經驗談-陳錦稷(2014.09.23)地方財政、預算經驗談-陳錦稷(2014.09.23)
地方財政、預算經驗談-陳錦稷(2014.09.23)
 
Paper id 24201453
Paper id 24201453Paper id 24201453
Paper id 24201453
 
Paper id 21201475
Paper id 21201475Paper id 21201475
Paper id 21201475
 
Paper id 21201429
Paper id 21201429Paper id 21201429
Paper id 21201429
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126
 
Paper id 2120143
Paper id 2120143Paper id 2120143
Paper id 2120143
 

Similar a Paper id 27201448

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 

Similar a Paper id 27201448 (20)

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
C017421624
C017421624C017421624
C017421624
 

Más de IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

Más de IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Último

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Último (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Paper id 27201448

  • 1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 133 Security as a Service: Cryptology on Demand Venkatesh Ranga1, M.S.V. Sashi kumar2, Dr. C.R.K.Reddy3 M.Tech CSE1 , Assistant Professor CSE2, Professor CSE3, Osmania University1,2,3 venkuranga@gmail.com1, sashi.mamidanna@gmail.com2, crkreddy@gmail.com Abstract- Cloud Computing is becoming more and more popular today and is ever increasing in popularity with large organizations as they sharing valuable resources in a cost effective way. By doing like this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. Achieving strong security would often require large IT resource and also result in difficulty of usage. To increase security while reducing the spending on IT & improving the ease of use, we require a security technique which can configure itself, as requested, for services offered in a Cloud environment. This paper mainly focus on by the usage of less resources how can we provide security to the end user. The security architecture is driven by security policies based on these inputs into consideration. 1. Network Access Risk 2. User Data. 3. Key size With these inputs in place, the security policies can generate security parameters which in turn are used to configure mechanisms to alter security (including algorithms and protocols) at every domain for protection of specific security services. Security requirements from users and services in cloud computing in turn building trust for the end users via Security at their ease & also data control. Key words: Cloud; Encryption; Security. 1. INTRODUCTION Cloud computing has been defined by NIST as a model for enabling ubiquitous, on- demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction . In simple words cloud computing is a accessing some one’s software in some one’ hardware in some one’s data centre .Cloud computing can be considered a new computing paradigm with implications for greater flexibility and availability at lower cost. Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. The term itself is often used today with a range of meanings and interpretations. Three referenced service models have evolved: Software-as-a-Service (SaaS): Is a way of delivering applications over the Internet. Instead of installing and maintaining software, you simply access it via the Internet. SaaS applications are sometimes called Web-based software or hosted software. Whatever name we can call it as, SaaS applications run on a SaaS provider’s servers. The provider manages the access to the application, includes security, availability, and performance. It can reduce the total cost of hardware and software development and operations. Platform-as-a-Service (PaaS): Platform as a Service (PaaS) is a way to use some one’s hardware, operating systems, storage and network capacity over the Internet. The service delivery models are allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. It can reduce the cost and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS): Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers. The service provider maintains the equipment and is responsible for housing, running and managing it. The client typically pays on a how much they are use that much amount customers will pay to service providers pay per use basis. The most popular cloud types are namely private, public and hybrid clouds. In a private cloud, total infrastructure for implementing the cloud is controlled completely by the enterprise. Typically, private clouds are maintained and implemented in the enterprise data centre and managed by internal resources. A private cloud maintains all data in resources under the control of the legal and contractual umbrella of the organization. This eliminates the regulatory and legal security concerns represented with information being processed on third party computing resources. In a public cloud, external organization provides the infrastructure and management required to implement the cloud. Public clouds orderly simplify implementation and are typically billed based on usage of resources. This transfers the cost from a capital expenditure to an operational expense and can quickly be scaled to meet the organization’s needs. Security has been and is the biggest challenge to cloud computing. It is hard for the users
  • 2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 134 to believe in cloud computing due to invisibility of the user’s data storage and how are they protected. Research says that as of now there is no way to know if the cloud providers properly remove a client’s data, or whether they have saved it for some unidentified reason. Currently, the study on cloud security still lies in the preliminary study. For data storage, a TPA (Third Party Auditor) is proposed to verify the integrity of the dynamic data stored in the cloud. In trust management field, some experts considered that multiple security policies should be used in user’s authentication and identity management, and those policies must be able to avoid intrusion of data by unauthorized users. 2. PROBLEM DESCRIPTION: Security parameters even differ for a specific service for two different users depending on the sensitivity of the information. The solution for these issues can simply be the usage of a highly complicated and secure algorithm popularly used to safeguard all services in the network. Potentially, this might not be effective way for cloud service providers to use the same security mechanism throughout the services since it consumes a lot of IT resources every time. It would not be a solution to consume resources for security itself, as we counteract the advantage of cloud computing platform wasting the available resources. By considering all the applications in the cloud environment, all the applications are using Sha1 for authentication.AES and DES security algorithms to secure the data. Most of the applications are using same symmetric key algorithm for encrypting the any amount data and providing security to the user’s data. By using same variable key length for the any amount of data it will take more time for encryption/decryption and processing of the data .Using the same key for encryption/ decryption take same time when the data size is differ. If the data size is small then it will take same time and increases the data size. In our approach we can change the algorithm key size. When the size of the data changes If we uploading large data we can use large for foe security. If transferring data is small than we can go for small key to encrypt the data. Depending on the size of the file we can change the algorithm key size. By doing like this we can boost the performance of the CPU. 3. CRYPTOGRAPHIC ALGORITHM: As far we are saying that every application is using same encryption key for encrypting the data. Most of the applications are using SHA1 for providing the security for the user authentication and some symmetric key algorithm for the encrypting the users data. In this paper we are using other symmetric algorithm called Blowfish. As per Researches Blowfish has been shown better results compare to other encryption algorithms. So In my Application we are using blowfish algorithm for encrypting the data. Blowfish algorithm is a symmetric block cipher that can be effectively used for both encryption and safeguarding of data. Blowfish algorithm is a Feistel Network and 64-bit block size and a variable key length from 32 bits to 448 bits in length, to calculate sub keys, which are used in the actual encryption and decryption. The P-array consists of 18 32-bit values while the 4 s-boxes consist of 256 32-bit values. The P-array is initialized first and followed by the S-boxes. It is a 16-round Feistel network for encryption and decryption. The algorithm was developed to 64- bit plaintext into 64 bit cipher securely. ENCRYPTION: Blowfish has 16 rounds. The input is a 64-bit data element, X Divide x into 32-bit halves, XL, XR; Then i= 1 to 16; XL = XL XOR Pi XR = F (XL) XOR XR; Swap XL and XR; After the 16th round, swap XL and XR again to undo the last swap. Then, XR = XR XOR P17 and XL =XL XOR P18, Finally, recombine XL and XR to get the cipher. Decryption same as encryption, except that P1, P2, P3, P4…... and P18 are used in the reverse order. Blow fish is incorporated a bitwise exclusive-operation to be performed on the left 32 – bits before modified by the F function or propagated to the right 32-bits for the next round. Blowfish also incorporated two exclusive-or operations to be performed after the 16 rounds and a swap operation.
  • 3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 135 F- Function: All the applications are using same encryption algorithm and same key large key for protecting the data. For providing the security to the users the application developers are using large key. By using the large key it will more computation and time. So In my approach we are differentiating the users considering the network from where the user is accessing the application and user computation. By considering these two factors we can provide security to the users. We can differentiate the user’s security type by writing the policies in the application.” 4. APPLICATION SCENARIO: In this paper am trying to show the application which it is self configure the security by taking the above parameters into the consideration. As per my knowledge all the existing applications are using same security mechanism in the applications for all the users. So by this there is a chance of wastage of resources. As we already know in the cloud security is the biggest challenge. For transmitting the data between the two users we can not the transfer the data directly. We are using some encryption mechanism to transfer the data. For that we have to choose best encryption algorithm to give better results. If the conversation between the two friends i.e. normal information there is no need usage of large bit key .Whenever we are transmitting secret information (confidential) then we need more security so there we can use large key to encrypt the data. By considering the user’s network we can change the algorithm key bit length. If the two user’s are from same network then we can use small encryption key to transfer the data and if the user’s are from different and untrusted network then we can increase the bit size. By using same key for everytime the system is more computation for encrypting and decrypting the data. So differcting the key lenth we can reduce the usage of computation in the system and time as well as we can also reduce the power. For Example: In an Enterprise the users are connected to each other then they are considered to be internal network. From the figure we can observe that User1, User2 and User3 are in same private ntework acessing the application hosted some where in the cloud environment, User4 and User5(mobile user) with different processing power devices are from public network and accessing the same application from the outside other than the office network. Whenever User1 is tranferring the data to the User2 then we can provide security with 128-bit(small) key. User 1 User User Proxy server In the internal network the users can access the application through the proxy server which is mainted in the internal network. The internal network users are access the application which is loacated in the cloud with the help of proxy server( which maitains the cloud application) . If the users are intrating in the public network users then increse the algorithm bit size to 256-bit key for encrypting the data. If the user is trying to access the application from the public network then we can increase the algorithm bit size i.e to 448-bit key to encrypt the data to incearse the security. In our approach we are tested our application with two symmetric encryption algorithms i.e blowfish and AES. Most of the application developers are using AES for encrypting the data . In our approach we are replacing the AES with Blowfish.We use blowfish for encryption/decryption of data.From the study learnt that blowfish performance is better when compare to other algorithms. So we can change the encryption algorithm according to the user requirement. We are tested two algorithms with different files size of data by using changing the algorithm key sizes . We got below results when tested with different algorithm key sizes. 5. RESULTS: Application Server Public Network Public Network Amazon EC2 Public Network
  • 4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 136 Table 1 Encryption and decryption times(in milli sec) using with 128 –bit key Table 2 Encryption and decryption times(in milli sec) using with 192 –bit key Input In KB Encryption time for blowfish with 192- bit key Encryption time for AES with 192-bit key Decryption times for Blowfish 192-bit key Decryption times for AES 192- bit key 312 46.87 147.995 436.715 1594.123 512 60.087 156.341 447.156 1900.74 1536 142.58 283.82 423.55 1237.054 2048 184.984 391.643 440.152 1429.581 5120 409.484 761.41 417.677 1215.91 10240 725.4906 748.392 721.291 1194.154 Table 3 Encryption and decryption times(in milli sec) using with 256 –bit key Input in KB Encryption time for blowfish with 256- bit key Encryption time for AES with 256-bit key Decryption times for Blowfish 256-bit key Decryption times for AES 256- bit key 312 47.187 160.1749 450.955 1966.08 512 58.975 176.32 428.948 1646.9 1536 136.563 301.1285 425.802 1254.111 2048 183.296 435.471 424.453 1418.943 5120 401.911 759.309 389.548 1117.111 10240 752.497 717.192 784.397 958.822 Table 4. Encryption and decryption times(in milli sec) using AES 256-bit key and 448-bit key Figure :1 Encryption and Decryption times for Blowfish and AES with 128-bit Key 2000 1800 1600 1400 1200 1000 800 600 400 200 0 312 KB 512 KB 1536 KB 2048 KB 5120 KB 10240 KB Encrypeion time in milli seconds File Size in KB Encryption time for blowfish with 128-bit key Encryption time AES with 128- bit key Decryption timr for Blowfish 128 -bit key Decryption time for AES 128 -bit key Input in KB Encryption time for blowfish with 128- bit key Encryption time for AES with 128-bit key Decryption times for Blowfish 128-bit key Decryption time for AES with 128 -bit key 312 46.46 146.544 405.75 1316.767 512 47.187 147.921 433 1776 1536 128.288 212.455 413.253 1152.631 2048 194.824 284.029 440.054 1133.744 5120 401.911 698.02 389.548 1412.936 10240 686.988 671.422 674.928 1277.063 Input In KB Encryption time for AES 256- bit key Encryption time for Blowfish 448-bit key Decryption time for AES 256- bit key Decryption time for Blowfish 448-bit key 512 176.32 64.608 1646.9 771.544 1536 301.1285 143.8252 1254.111 846.725 2048 435.471 196.234 1418.943 465.208 5120 759.309 414.739 117.111 738.094 10240 717.192 808.402 958.822 717.601
  • 5. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 137 Figure 2. Encryption and Decryption times for Blowfish and AES with 192-bit Key 2000 1800 1600 1400 1200 1000 800 600 400 200 0 Encryption tomes in milli seconds Input file sizes in KB Encryption time for blowfish with 192- bit key Encryption time for AES with 192-bit key Decryption tims for Blowfish 192-bit key Decryption tims for AES 192- bit key Figure 3. Encryption and Decryption times for Blowfish and AES with 256-bit Key 2500 2000 1500 1000 500 0 312 KB 512 KB 1536 KB 2048 KB 5120 KB 10240 KB Encryption times in milli seconds Input file size in KB Encryption time for blowfish with 256-bit key Encryption time for AES with 256- bit key Decryption tims for Blowfish 256- bit key Decryption tims for AES 256-bit key Figure 4 Comparision Between the Encryption and Decryption Times with AES 256 and Blowfish 448- bit 1800 1600 1400 1200 1000 800 600 400 200 0 Encryption times in milli seconds Input file size in KB Encryption time for AES 256-bit key Encryption time for Blowfish 448- bit key Decryption time for AES 256-bit key Decryption time for Blowfish 448- bit key
  • 6. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 138 6. CONCLUSION : In this paper we conclude that depending on the network users are being a part of, type of the application working on & the compute system used, we can provide the required security strengh by using best suited algorithm and varied key size. Transferring files from one network to another can be provided with on demand security level by increasing the bit size of the key. This feature can be provided on varied applications and deploying right security policy, the performance of the systems can be improved. From the comparision of two algorithms we found that blowfish performs well in all situations, but the key establishment still remains the concern. In traditional applications for encrypting any size of data, developers are using same key size for cryptography. In our scenario , we have varied the key size of the algorithm and the chosen algorithm depends on file size, user requirement and type of network. Usage of same key for encrypting and decrypting any amount of data, the allocation time for encryption and decryption taken more resouces in hardware and more time for processing the data will decrease the performance of the CPU. Applying right algorithm in the requirement will boost the performence of the CPU, reduce the usage hardware inturn reduce the processing time. REFERENCES: [1] P. Mell, T. Grance (2009), The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology. [2] Jianyong Chen, Yang Wang, Xiaomin Wang (2011), On demand security architecture for Cloud Computing, Dept.of Computer science and Technology, China. [3]M. Anand Kumar and Dr.S.Karthikeyan (2012), “Investigating the Efficiency Blowfish and Rejineal (AES)Algorithms”, I.J computer network and Information Technology. [4] Pratap Chandra Mandal (2012),”Superiority of Blowfish Algorithm” IJARCSSE, WestBengal,India. [5]http://docs.aws.amazon.com/gettingstarted/latest/C ompute basis/web-app-hosting-intro.html [6] http://en.wikipedia.org/wiki/Blowfish (cipher).