SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221
2217 | P a g e
Ensuring Data Security for Secure Cloud Hybrid Framework
Smriti*
, Dr. Deepak Arora**
*
Department of Computer Science Amity University, Lucknow, India.
**
Professor, Department of Computer Science Amity University, Lucknow, India.
ABSTRACT
With increasing technology demand for
the cloud application is also increasing. Due to this
security demands are also increasing. A user can
access a cloud services from anywhere and at any
time or almost instantly. These features make
cloud computing so flexible and prone to risk.
Therefore there are possibilities of lacking
confidentiality, integrity and authentication
among the cloud users. So the key purpose of this
research is to investigate cloud securities and
build a framework using encryption algorithms to
provide data confidentiality, integrity and
authentication.
Keywords: Cloud Computing, Data Security,
Symmetric Encryption, Public Key Encryption, SHA.
I. INTRODUCTION
Cloud computing have became very popular
in today’s world. Since most of the work is done
through clouds these days and data is stored in it. So
information security has become one of the important
issues in cloud computing, because most of the work
is done through computerization and data is
transferred over the network. Information security is
a process of safeguarding information against
intentional and malicious attacks to ensure its CIA
triad [1] [2]. The CIA triad stands for three major
tenets to information security: confidentiality,
integrity and availability.
Confidentiality provides prevention from
unauthorized usage of sensitive information. Integrity
provides accuracy of information by preventing
unauthorized modification of data and information.
Availability ensures that information is available
whenever it is needed and it also includes prevention
from denial of service attack.
Therefore CIA triad is achieved through
encryption.
Encryption is the process of encoding a
information in such a way that it become unreadable
to unauthorized user. Encryption is done by applying
encryption algorithms to the plaintext, turning it into
cipher text. Encryption key is used by the encryption
algorithm which specifies the method of encoding
message. Any unauthorized user having a cipher text
cannot see the original message. An authorized user
can only be able to decode the cipher text to original
text using decryption algorithm, which requires a
decryption key. Generally secret key is generated by
using a key-generation algorithm.
There are two basic types of encryption
techniques: Symmetric-key and public-key
encryption [3]. In symmetric-key encryption
technique, encryption is done through same key.
Thus communicating parties must share secret key
before communication. In public-key encryption
technique, the encryption is done through
combination of public key and private key. Thus the
encrypted message and key is published for
everyone, but it can only be used by the receiving
party.
Figure1: Overview of encryption algorithms
Different combination of encryption
algorithms can be used to provide information
security. A framework had been proposed earlier
using AES (block cipher), but when compared to
stream cipher algorithms it is less energy efficient
and slow[8]. So a new framework is proposed in this
paper using RC4 (stream cipher) algorithm.
II. RELATED WORK
Sudha, [7] has proposed a simple security
network in this paper. They have used cryptographic
algorithms to provide data security in cloud
computing. A symmetric and asymmetric algorithms
are used to prepare a framework. Many security
issues had been explored in cloud data storage,
whenever a data vulnerability is perceived during the
storage process a precision verification across the
distributed servers are ensured by simultaneous
identification of the misbehaving nodes through
analysis in term of security malfunctioning, it is
proved that their scheme is effective to handle certain
Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221
2218 | P a g e
failures, malicious data modification attack, and even
server colluding attacks [5]. John Harauz et al. [6],
escribed the Security Content automation protocol
(SCAP) and benefits it can provide with latest cloud
computing paradigm with reference to the latest
report released by NIST, giving insight as to what
SCAP is trying to do, It states that many tools for
system security, such as patch management and
vulnerability management software, use proprietary
formats, nomenclatures, measurements, terminology,
and content.
III. ENCRYPTION ALGORITHMS
RC4
RC4 is a stream cipher symmetric key
encryption algorithm. It uses a variable key length 1 -
256 bytes to initialize a state table of 256 bytes. State
table is initialized in the form of array. So the array is
used for generating pseudo-random bytes and then
pseudo-random stream. Thus the pseudo-random
stream is XORed with the plain text to generate
cipher text.
While initializing the state table there are two 256
bytes array are taken: S-Box and K- box. S-Box
contains linear numbers such as
S0=0,S1=1,S2=2,…S255=255 and K-Box contained
key to be used in repetition to fill the array. The key
setup and key generation is performed for every new
key to generate a unique key.
Figure 2: Block Diagram of RC4 Key generation
Phases
In key set up phase S-Box is modified using pseudo
random codes. It uses two counter i and j.
Key Setup phase:
j=0
for i from 0 to 255
j = ( j + S[i] + K[i] ) mode 256
swap ( S[i] , S[j] )
end for
Pseudo Random Key Generation Phase:
i = 0
j = 0
ptlen = length( plaintext )
while ( ptlen>0 )
i = ( i+1) mod 256
j = ( j+ S[i] ) mod 256
swap ( S[i], S[j] )
key = S [ ( S[i] + S[j] ) mod 256 ]
output key
ptlen = ptlen-1
end while
Once the pseudo random key is generated then plain
text is XORed with it to generate cipher text.
Figure 3: RC4 Working
SHA
Secure Hash Algorithm uses compression
function to convert a arbitrary size message to a fixed
size message. Hash function can be applied to any
size message and it produces a fixed size message.
As compared to other hashing algorithms, it is more
secure and easy to compute.
In our framework for the enhanced authentication the
message digest or the hash value of the message is
generated using secure hash algorithm which is of
fixed size. Then the hash value produced is
concatenated with the actual encrypted data and
digital signature. Later whole concatenated strings
are securely encrypted using RSA algorithm i.e.
public key of the receiver and then send to the cloud
to the requesting recipient. On the receiver side data
integrity is checked by the hash value generated by
deciphering message and sender authentication is
verified.
RSA
RSA stands for Rivest, Shamir & Adleman
of MIT, the one who introduced RSA. RSA is
asymmetric public key encryption technique which is
based on exponentiation in a finite field over integers
Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221
2219 | P a g e
modulo a prime numbers. In order to encrypt a
message M the sender should have a public key of
the receiver, PU={e,n} is the public key which is
used to compute the cipher message: C=Me
(mod n)
has to obtain public key of recipient, where 0≤M<n.
At the receiver end recipient uses their private key to
decrypt the message, PR={d,n} is the private key
which is used to compute the original message: M =
Cd
(mod n), where M < n.
RSA uses Euler's Theorem: aø(n)mod n = 1 where
gcd(a,n)=1 in RSA we have to initially calculate
n=p.q such that ø(n)=(p-1)(q-1) one has to carefully
chose e & d to be inverses mod ø(n) [7].
Figure 4: RSA key generation
IV. PROPOSED SECURITY
FRAMEWORK
Figure 5: Proposed Hybrid Framework
In this scenario we have considered that
interaction of cloud server and cloud client is the
initial step. Only a registered cloud client can avail
the services of the cloud. So the user has to be
registered cloud client, if the user is registered user
then only login and password is verified. If the user is
new then he needs to register in the cloud server. So
the user registers itself and the Certificate Authority
generates a certificate for the cloud client. After user
login authentication a random string is generated by
the server for the client and digital signature is
generated by sighing random string with client’s
private key.
The client can request for the data from the
cloud data centers after the user is authenticated by
the two step authentication. Then the proposed secure
hybrid framework is executed to ensure the
information security. The framework uses a
symmetric key algorithm for efficiency,
confidentiality and simplicity and along with it a
public key algorithm for secure key exchange. So the
hybrid is constructed with symmetric and asymmetric
encryption algorithm for the enhanced framework.
Step 1: Upon successful authentication of the client
by server, the data is encrypted using a symmetric
(RC4) algorithm to generate cipher text.
Step 2: Data hash code and key hash code is
generated using secure hash algorithm. A
concatenated string is generated by combining data
hash code, key hash code, symmetric key to generate
cipher text and cipher text.
Step 3: Then the concatenated string is encrypted
with the receiver’s public key by using RSA
algorithm.
Step 4: Apply the reverse process .i.e. the whole
string is decrypted at receiver end by the recipient
private key and the required symmetric key is
obtained on decryption.
Step 5: Original message is decrypted using
symmetric encryption algorithm (RC4) key, then the
validation and verification of the sender is done.
Step 6: Secure Hash Algorithm (SHA) is used of
generating hash value for checking integrity of the
message sent.
Step 7: Digital Signature is only validated when the
value of the message matches the hash code sent and
then data integrity accepted.
Step 8: Once data is transfer in the secure form then
the request is terminated.
Following were the steps to transfer secure
data over clouds with the help of hybrid framework.
Proposed algorithm for Hybrid Framework.
1. RC4 key set up
a) Two arrays are initialized: S-Box and K-
Box, S-Box contains linear number such as
such as S0=0,S1=1,S2=2,…S255=255 and K-
Box contained key to be used in repetition to
fill the array.
Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221
2220 | P a g e
b) Select variable i, j as zero,
c) Calculate j=( j + S[i] + K[i] ) mod 256,
d) Swap S[i] , S[j],
e) Increment i by 1 i.e. i=i+1,
f) If i<256 goto step c else end.
2. RC4 key generation
a) S[i] is the modified S-Box during key set up
phase.
b) Select variable i, j as zero,
c) Calculate length of plaintext such that
ptlen= length ( plaintext ),
d) Calculate i= ( i+1 ) mod 256
j= ( j + S[i] ) mod 256
e) Swap S[i], S[j],
f) Calculate Key as
Key = S[ ( S[i] + S[j] ) mod 256]
g) Decrease plaintext length by 1 i.e.
ptlen = ptlen -1
h) If ptlen > 0 goto step d else end.
3. Encrypt datablock using RC4
Plaintext Xored with Key to produce Cipher text
4. Data Hash code and Key Hash code are
generated using Secure Hash Algorithm
5. RSA key generation
a) Select variable p and q where p and q both
are prime, p≠q,
b) Calculate integer n= p × q ,
c) Calculate function of
Such that ϕ(n) = (p-1) (q-1),
d) es a public key of server
Select integer es such that
gcd (ϕ(n), e )=1; 1<e< ϕ(n),
e) Calculate ds
ds = es
-1
(mod ϕ(n))
f) Server Public key (es, n)
Server Private key (ds, n)
g) Similar steps are followed to generate
receiver’s public and private key
h) Therefore Receiver Public key (er, n)
Receiver Private key (dr, n)
6. Encrypt key of RC4 using RSA(Server private
key)
Cipher key = (Key) power of ds mod n
7. Concatenate String = cipher text + data hash
code + key hash code + cipher key
8. Encrypt concatenated string using
RSA(receiver’s public key)
Encrypted text = (concatenated string) power of
er mod n.
V. CONCLUSION AND FUTURE
SCOPE
In this paper a simple hybrid framework is
proposed with the help of encryption algorithms. This
hybrid framework produces a secure data which can
be transferred over the clouds. The combination of
RC4, SHA and RSA is used to enhance data security
and to give more energy efficient and fast working
environment. A practical implementation of the
framework can be performed.
REFERENCES
[1] http://www.mhprofessional.com/downloads/
produ
cts/0072254238/0072254238_ch01.pdf
[2] Kinamik, “the CIA triad: have you thought
about integrity”, kinamik data integrity,
2007.
[3] Goldreich, Oded. Foundations of
Cryptography: Volume 2, Basic
Applications. Vol.2. Cambridge university
press, 2004.
[4] Nidhi Singhal, J.P.S.Raina “Comparative
Analysis of AES and RC4Algorithms for
Better Utilization”, International Journal of
Computer Trends and Technology- July to
Aug Issue 2011.
[5] M.Sudha and M.Monica “Enhanced Security
Framework to Ensure Data Security in
Cloud Computing Using Cryptography”,
Advances in Computer Science and its
Applications, Vol. 1, No. 1, March 2012.
[6] Cong Wang, Qian Wang and Kui Ren.
“Ensuring Data Storage Security in Cloud
computing”, IEEE 978-1-4244-3876-
1/2009.
[7] John Harauz, Lori M. Kaufman and Bruce
Potter, “Data security in the world of cloud
computing” IEEE CO Published by the
IEEE Computer and Reliability Societies,
2009.
[8] Bellare, Mihir, “Public-Key Encryption in a
Multi-user Setting: Security Proofs and
Improvements.” Springer Berlin Heidelberg,
2000.
[9] Sumedha Kaushik, Ankur Singhal,
“Network Security Using Cryptographic
Techniques”, International Journal of
Advanced Research in Computer Science
and Software Engineering, Volume 2, Issue
12, December 2012.
[10] Rashi Vohra, Brajesh Patel, “An Efficient
Chaos - Based Optimization Algorithm
Approach For Cryptography”, International
Journal of Communication Network
Security ISSN: 2231–1882, Volume-1,
Issue-4, 2012.
[11] Shashi Mehrotra Seth, Rajan Mishra
“Comparative Analysis Of Encryption
Algorithms For Data Communication”,
IJCST Vol. 2, Iss ue 2, June 2011.
[12] S. Subasree and N. K. Sakthivel, “Design Of
A New Security Protocol Using Hybrid
Cryptography Algorithms”, IJRRAS 2 (2),
February 2010.
Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221
2221 | P a g e
[13] Allam Mousa, Ahmad Hamad, “Evaluation
of the RC4 Algorithm for Data Encryption”,
International Journal of Computer Science
and Applications, Volume 12, Number.2,
June2006.
[14] Guang Gong, Kishan Chand Gupta, Martin
Hell and Yassir Nawaz, “Towards a General
RC4-like Keystream Generator”,
Information Security and Cryptology
Lecture Notes in Computer Science Volume
3822, 2005.
[15] Mihir Bellare, Phillip Rogaway, “Optimal
Asymmetric Encryption How to Encrypt
with RSA”, Advances in Cryptology
Eurocrypt 94 Proceedings, Lecture Notes in
Computer Science Vol. 950, A. De Santis
ed., Springer-Verlag, 1994.
[16] William Stallings, “Cryptography and
Network security”, 5e -Pearson education
publications.

Más contenido relacionado

La actualidad más candente

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)IJERA Editor
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-mainkalachandru
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationIRJET Journal
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 

La actualidad más candente (20)

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
50120140507006
5012014050700650120140507006
50120140507006
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 

Destacado (9)

Eventosejirjqicmqtuxqi (3)
Eventosejirjqicmqtuxqi (3)Eventosejirjqicmqtuxqi (3)
Eventosejirjqicmqtuxqi (3)
 
Historia de flash
Historia de flashHistoria de flash
Historia de flash
 
Curso blog
Curso blogCurso blog
Curso blog
 
Trabajo en equipo
Trabajo en equipoTrabajo en equipo
Trabajo en equipo
 
Tips para evitar problemas al usar una computadora
Tips para evitar problemas al usar una computadoraTips para evitar problemas al usar una computadora
Tips para evitar problemas al usar una computadora
 
Recadinhos+bem+humorados+de+deus
Recadinhos+bem+humorados+de+deusRecadinhos+bem+humorados+de+deus
Recadinhos+bem+humorados+de+deus
 
Aviso convocatoria n° 2 agosto 4
Aviso convocatoria n° 2 agosto 4Aviso convocatoria n° 2 agosto 4
Aviso convocatoria n° 2 agosto 4
 
Resume_3
Resume_3Resume_3
Resume_3
 
CENTRO DE FORMACIÓN Y CAPACITACIÓN EN EL DEPORTE.
CENTRO DE  FORMACIÓN Y CAPACITACIÓN EN EL DEPORTE.CENTRO DE  FORMACIÓN Y CAPACITACIÓN EN EL DEPORTE.
CENTRO DE FORMACIÓN Y CAPACITACIÓN EN EL DEPORTE.
 

Similar a Mj3422172221

IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 

Similar a Mj3422172221 (20)

IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Mj3422172221

  • 1. Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221 2217 | P a g e Ensuring Data Security for Secure Cloud Hybrid Framework Smriti* , Dr. Deepak Arora** * Department of Computer Science Amity University, Lucknow, India. ** Professor, Department of Computer Science Amity University, Lucknow, India. ABSTRACT With increasing technology demand for the cloud application is also increasing. Due to this security demands are also increasing. A user can access a cloud services from anywhere and at any time or almost instantly. These features make cloud computing so flexible and prone to risk. Therefore there are possibilities of lacking confidentiality, integrity and authentication among the cloud users. So the key purpose of this research is to investigate cloud securities and build a framework using encryption algorithms to provide data confidentiality, integrity and authentication. Keywords: Cloud Computing, Data Security, Symmetric Encryption, Public Key Encryption, SHA. I. INTRODUCTION Cloud computing have became very popular in today’s world. Since most of the work is done through clouds these days and data is stored in it. So information security has become one of the important issues in cloud computing, because most of the work is done through computerization and data is transferred over the network. Information security is a process of safeguarding information against intentional and malicious attacks to ensure its CIA triad [1] [2]. The CIA triad stands for three major tenets to information security: confidentiality, integrity and availability. Confidentiality provides prevention from unauthorized usage of sensitive information. Integrity provides accuracy of information by preventing unauthorized modification of data and information. Availability ensures that information is available whenever it is needed and it also includes prevention from denial of service attack. Therefore CIA triad is achieved through encryption. Encryption is the process of encoding a information in such a way that it become unreadable to unauthorized user. Encryption is done by applying encryption algorithms to the plaintext, turning it into cipher text. Encryption key is used by the encryption algorithm which specifies the method of encoding message. Any unauthorized user having a cipher text cannot see the original message. An authorized user can only be able to decode the cipher text to original text using decryption algorithm, which requires a decryption key. Generally secret key is generated by using a key-generation algorithm. There are two basic types of encryption techniques: Symmetric-key and public-key encryption [3]. In symmetric-key encryption technique, encryption is done through same key. Thus communicating parties must share secret key before communication. In public-key encryption technique, the encryption is done through combination of public key and private key. Thus the encrypted message and key is published for everyone, but it can only be used by the receiving party. Figure1: Overview of encryption algorithms Different combination of encryption algorithms can be used to provide information security. A framework had been proposed earlier using AES (block cipher), but when compared to stream cipher algorithms it is less energy efficient and slow[8]. So a new framework is proposed in this paper using RC4 (stream cipher) algorithm. II. RELATED WORK Sudha, [7] has proposed a simple security network in this paper. They have used cryptographic algorithms to provide data security in cloud computing. A symmetric and asymmetric algorithms are used to prepare a framework. Many security issues had been explored in cloud data storage, whenever a data vulnerability is perceived during the storage process a precision verification across the distributed servers are ensured by simultaneous identification of the misbehaving nodes through analysis in term of security malfunctioning, it is proved that their scheme is effective to handle certain
  • 2. Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221 2218 | P a g e failures, malicious data modification attack, and even server colluding attacks [5]. John Harauz et al. [6], escribed the Security Content automation protocol (SCAP) and benefits it can provide with latest cloud computing paradigm with reference to the latest report released by NIST, giving insight as to what SCAP is trying to do, It states that many tools for system security, such as patch management and vulnerability management software, use proprietary formats, nomenclatures, measurements, terminology, and content. III. ENCRYPTION ALGORITHMS RC4 RC4 is a stream cipher symmetric key encryption algorithm. It uses a variable key length 1 - 256 bytes to initialize a state table of 256 bytes. State table is initialized in the form of array. So the array is used for generating pseudo-random bytes and then pseudo-random stream. Thus the pseudo-random stream is XORed with the plain text to generate cipher text. While initializing the state table there are two 256 bytes array are taken: S-Box and K- box. S-Box contains linear numbers such as S0=0,S1=1,S2=2,…S255=255 and K-Box contained key to be used in repetition to fill the array. The key setup and key generation is performed for every new key to generate a unique key. Figure 2: Block Diagram of RC4 Key generation Phases In key set up phase S-Box is modified using pseudo random codes. It uses two counter i and j. Key Setup phase: j=0 for i from 0 to 255 j = ( j + S[i] + K[i] ) mode 256 swap ( S[i] , S[j] ) end for Pseudo Random Key Generation Phase: i = 0 j = 0 ptlen = length( plaintext ) while ( ptlen>0 ) i = ( i+1) mod 256 j = ( j+ S[i] ) mod 256 swap ( S[i], S[j] ) key = S [ ( S[i] + S[j] ) mod 256 ] output key ptlen = ptlen-1 end while Once the pseudo random key is generated then plain text is XORed with it to generate cipher text. Figure 3: RC4 Working SHA Secure Hash Algorithm uses compression function to convert a arbitrary size message to a fixed size message. Hash function can be applied to any size message and it produces a fixed size message. As compared to other hashing algorithms, it is more secure and easy to compute. In our framework for the enhanced authentication the message digest or the hash value of the message is generated using secure hash algorithm which is of fixed size. Then the hash value produced is concatenated with the actual encrypted data and digital signature. Later whole concatenated strings are securely encrypted using RSA algorithm i.e. public key of the receiver and then send to the cloud to the requesting recipient. On the receiver side data integrity is checked by the hash value generated by deciphering message and sender authentication is verified. RSA RSA stands for Rivest, Shamir & Adleman of MIT, the one who introduced RSA. RSA is asymmetric public key encryption technique which is based on exponentiation in a finite field over integers
  • 3. Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221 2219 | P a g e modulo a prime numbers. In order to encrypt a message M the sender should have a public key of the receiver, PU={e,n} is the public key which is used to compute the cipher message: C=Me (mod n) has to obtain public key of recipient, where 0≤M<n. At the receiver end recipient uses their private key to decrypt the message, PR={d,n} is the private key which is used to compute the original message: M = Cd (mod n), where M < n. RSA uses Euler's Theorem: aø(n)mod n = 1 where gcd(a,n)=1 in RSA we have to initially calculate n=p.q such that ø(n)=(p-1)(q-1) one has to carefully chose e & d to be inverses mod ø(n) [7]. Figure 4: RSA key generation IV. PROPOSED SECURITY FRAMEWORK Figure 5: Proposed Hybrid Framework In this scenario we have considered that interaction of cloud server and cloud client is the initial step. Only a registered cloud client can avail the services of the cloud. So the user has to be registered cloud client, if the user is registered user then only login and password is verified. If the user is new then he needs to register in the cloud server. So the user registers itself and the Certificate Authority generates a certificate for the cloud client. After user login authentication a random string is generated by the server for the client and digital signature is generated by sighing random string with client’s private key. The client can request for the data from the cloud data centers after the user is authenticated by the two step authentication. Then the proposed secure hybrid framework is executed to ensure the information security. The framework uses a symmetric key algorithm for efficiency, confidentiality and simplicity and along with it a public key algorithm for secure key exchange. So the hybrid is constructed with symmetric and asymmetric encryption algorithm for the enhanced framework. Step 1: Upon successful authentication of the client by server, the data is encrypted using a symmetric (RC4) algorithm to generate cipher text. Step 2: Data hash code and key hash code is generated using secure hash algorithm. A concatenated string is generated by combining data hash code, key hash code, symmetric key to generate cipher text and cipher text. Step 3: Then the concatenated string is encrypted with the receiver’s public key by using RSA algorithm. Step 4: Apply the reverse process .i.e. the whole string is decrypted at receiver end by the recipient private key and the required symmetric key is obtained on decryption. Step 5: Original message is decrypted using symmetric encryption algorithm (RC4) key, then the validation and verification of the sender is done. Step 6: Secure Hash Algorithm (SHA) is used of generating hash value for checking integrity of the message sent. Step 7: Digital Signature is only validated when the value of the message matches the hash code sent and then data integrity accepted. Step 8: Once data is transfer in the secure form then the request is terminated. Following were the steps to transfer secure data over clouds with the help of hybrid framework. Proposed algorithm for Hybrid Framework. 1. RC4 key set up a) Two arrays are initialized: S-Box and K- Box, S-Box contains linear number such as such as S0=0,S1=1,S2=2,…S255=255 and K- Box contained key to be used in repetition to fill the array.
  • 4. Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221 2220 | P a g e b) Select variable i, j as zero, c) Calculate j=( j + S[i] + K[i] ) mod 256, d) Swap S[i] , S[j], e) Increment i by 1 i.e. i=i+1, f) If i<256 goto step c else end. 2. RC4 key generation a) S[i] is the modified S-Box during key set up phase. b) Select variable i, j as zero, c) Calculate length of plaintext such that ptlen= length ( plaintext ), d) Calculate i= ( i+1 ) mod 256 j= ( j + S[i] ) mod 256 e) Swap S[i], S[j], f) Calculate Key as Key = S[ ( S[i] + S[j] ) mod 256] g) Decrease plaintext length by 1 i.e. ptlen = ptlen -1 h) If ptlen > 0 goto step d else end. 3. Encrypt datablock using RC4 Plaintext Xored with Key to produce Cipher text 4. Data Hash code and Key Hash code are generated using Secure Hash Algorithm 5. RSA key generation a) Select variable p and q where p and q both are prime, p≠q, b) Calculate integer n= p × q , c) Calculate function of Such that ϕ(n) = (p-1) (q-1), d) es a public key of server Select integer es such that gcd (ϕ(n), e )=1; 1<e< ϕ(n), e) Calculate ds ds = es -1 (mod ϕ(n)) f) Server Public key (es, n) Server Private key (ds, n) g) Similar steps are followed to generate receiver’s public and private key h) Therefore Receiver Public key (er, n) Receiver Private key (dr, n) 6. Encrypt key of RC4 using RSA(Server private key) Cipher key = (Key) power of ds mod n 7. Concatenate String = cipher text + data hash code + key hash code + cipher key 8. Encrypt concatenated string using RSA(receiver’s public key) Encrypted text = (concatenated string) power of er mod n. V. CONCLUSION AND FUTURE SCOPE In this paper a simple hybrid framework is proposed with the help of encryption algorithms. This hybrid framework produces a secure data which can be transferred over the clouds. The combination of RC4, SHA and RSA is used to enhance data security and to give more energy efficient and fast working environment. A practical implementation of the framework can be performed. REFERENCES [1] http://www.mhprofessional.com/downloads/ produ cts/0072254238/0072254238_ch01.pdf [2] Kinamik, “the CIA triad: have you thought about integrity”, kinamik data integrity, 2007. [3] Goldreich, Oded. Foundations of Cryptography: Volume 2, Basic Applications. Vol.2. Cambridge university press, 2004. [4] Nidhi Singhal, J.P.S.Raina “Comparative Analysis of AES and RC4Algorithms for Better Utilization”, International Journal of Computer Trends and Technology- July to Aug Issue 2011. [5] M.Sudha and M.Monica “Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography”, Advances in Computer Science and its Applications, Vol. 1, No. 1, March 2012. [6] Cong Wang, Qian Wang and Kui Ren. “Ensuring Data Storage Security in Cloud computing”, IEEE 978-1-4244-3876- 1/2009. [7] John Harauz, Lori M. Kaufman and Bruce Potter, “Data security in the world of cloud computing” IEEE CO Published by the IEEE Computer and Reliability Societies, 2009. [8] Bellare, Mihir, “Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.” Springer Berlin Heidelberg, 2000. [9] Sumedha Kaushik, Ankur Singhal, “Network Security Using Cryptographic Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 12, December 2012. [10] Rashi Vohra, Brajesh Patel, “An Efficient Chaos - Based Optimization Algorithm Approach For Cryptography”, International Journal of Communication Network Security ISSN: 2231–1882, Volume-1, Issue-4, 2012. [11] Shashi Mehrotra Seth, Rajan Mishra “Comparative Analysis Of Encryption Algorithms For Data Communication”, IJCST Vol. 2, Iss ue 2, June 2011. [12] S. Subasree and N. K. Sakthivel, “Design Of A New Security Protocol Using Hybrid Cryptography Algorithms”, IJRRAS 2 (2), February 2010.
  • 5. Smriti, Dr. Deepak Arora / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2217-2221 2221 | P a g e [13] Allam Mousa, Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science and Applications, Volume 12, Number.2, June2006. [14] Guang Gong, Kishan Chand Gupta, Martin Hell and Yassir Nawaz, “Towards a General RC4-like Keystream Generator”, Information Security and Cryptology Lecture Notes in Computer Science Volume 3822, 2005. [15] Mihir Bellare, Phillip Rogaway, “Optimal Asymmetric Encryption How to Encrypt with RSA”, Advances in Cryptology Eurocrypt 94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994. [16] William Stallings, “Cryptography and Network security”, 5e -Pearson education publications.