SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 397
“SURVEY OF CRYPTOGRAPHIC TECHNIQUES TO CERTIFY SHARING OF
INFORMATION IN CLOUD COMPUTING”
Nishigandha Sakharkar1
1
Assistant Professor, CMR Institute of Technology, Hyderabad, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Now the world becomes the world of data
where the large amount of data is shared over the Internet.
Cloud storage is availing this data sharing, still there is lot of
issues to get resolved to maintain the ACID properties of
data. The uniform solution to this is the use of efficient
encryption techniques which will provide cryptographic
approach. This paper presents a view of security folds and
analyses the feasibility of the application of encryption
techniques to make data secure and private over the cloud.
We also discussed about cloud security threats, workings
and challenges that cloud service provider faces in cloud
environment and presentingthestudyof efficient encryption
techniques enhancing security of data. This paper will
provide a broad view over these techniques.
Key Words: Cloud Computing, ACID, AES, Blowfish, DES,
RSA, IDEA.
1. INTRODUCTION
Cloud computing is a computing standard, where lot of
devices are connected privately or publicly in grid, to
provide dynamic and extensible framework forapplications,
storage, minimizing the cost of computation, application
development, data storage and speedy operations. Public,
private and hybrid cloud are the classifications of cloud.
Public clouds are managed as the whole responsibilityof the
cloud service provider. The same frameworks for
composition, surveillance, and possiblevariancesareshared
between all the customers. Private clouds are exclusively
limited to a single organization. Data surveillance and
solitude are not the concerns of public cloud as it is opened
to all the customers. Hybrid Clouds is merging of bothpublic
and private cloud models.
Cloud Providers provides three types of services.
1.1 Software as a Service (SaaS): This will provide a
readymade solution for the end users where they can
directly access the services. Multiple end users are serviced
by this single set of services over cloud.
1.2 Platform as a Service (Paas): This is a layered
architecture where the computing resources are together
proposed as a service, upon which other upper layers of
services can be erected. The user is free to create his own
practices, according to the provider’s prototype.
3. Infrastructure as a Service (Iaas): Over the network
IaaS provides basic storing and processing capabilities as
functional services. All computing resources are virtualized
and proposed for processing. The end user can develop his
own work practices on the framework.
Fig-1: Cloud Computing Architecture
2. CRITICAL THREATS TO CLOUD SECURITY
Cloud security is still a big challenge for application
developers; as individuals wants to store and accesstheirdata
more securely. With so many recent threats and technological
attacks, maintaining security has become all the more
important. The following threats may break the security of
cloud:
a) An unauthorized user can access data which leads to data
loss which can disturb businesses and consumers in a variety
of ways.
b) Absence of extensible integrity approach, on-going
computerized rotation of cryptographic keys, strong
passwords and certificates.
c) Spectre and Meltdown one most disturbing cloud safety
related issues, an erroneous set of design features in most
modern devices has the capacity to allow content to be read
from memory through the use of malignant JavaScript code.
d) Cloud customers also facing the problem of data loss and
understanding the solutions and which body is responsiblefor
data loss and under what circumstances is difficult.
e) High chances of DoS attacks which leads to shut down a
system or network, making it idle to its intended user, this is
accomplished by flooding the target with traffic, or sending
it information that triggers a crash.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 398
Fig-2: Threats to cloud security
3. RELATED WORK
Lot of research work has been presented recently on
procedures for data securityandprivacyincloudcomputing.
Many research works has been proposed on security and
privacy of data by authors, still the security of data is a big
concern as network capacity is increasing and needs to
transfer fromtraditional waytocloudcomputingtechniques.
Securing cloud does not include thesecurityofwholesystem
which is considered as another issue. Although so many
models are proposed that ensures security of data
exchanged between users and servers, but they do not
provide encryption on the data exchanged. For making it
tightly secure all the information needs to be coded so that
any unauthorized user is not able to grab the information
and its location. Some other secured models for cloud
computing environment are also being proposed. But, these
models also fail to solve some cloud computing security
issues.
4 SECURITY TECHNIQUES IN CLOUD COMPUTING
4.1 RSA ALGORITHM
RSA is most commonly used andbest encryption/decryption
algorithm which is categorized in Public Key Algorithm,
evolved by scientists Rivest, Shamir, and Adelman (RSA).
RSA is an asymmetric encryption/decryption algorithm.It is
asymmetric in a sense that it uses two separate keys for
coding and decoding respectively. One key is known as
public key used to perform an coding and it is known
publically and second key known as private key used for
decoding which is secretly used and not shared withanyone.
RSA algorithm is widely used forsecuredata communication
in cloud computing. It consists of plain textandciphertextin
the form of integers between 0 to n-1.This algorithm makes
the use of block cipher and each block has a value which is
less than n in binary format.
This algorithm is performed in three steps: Key generation,
Encryption, Decryption
Fig-3: RSA Encryption and Decryption
4.2 AES ALGORITHM
Advanced Encryption Standard (AES), is extensively used
algorithm to encrypt and secure the data transmission. AES
is a symmetric and block cipher method with 128 bits block
size. Three distinct key lengths can be used in AES: 128, 192,
or 256 bits. Mostly AES with 128 bit key length is popular.
Execution of AES on cloud states that, first user will demand
cloud services and the user data will be loaded on cloud.The
User also submits his requirements to Cloud Service
Provider (CSP) and chooses set of services that satisfy their
needs. In future whenever any request is received to store
information on cloud, this information will first encrypted
using AES algorithm and then delivered to CSP. After the
data is given to CSP if any application wants to access that
data will first decrypt it into its original form and made
available to the user.
Fig-4: AES Encryption
4.3 DES ALGORITHM
Data Encryption Standard is first encryption standard. It
uses block ciphers and each block of DES is of size 64 bits. It
is a symmetric key encryption procedure that uses a secret
key for encryption and decryption and also produces cipher
text of 64 bits. The length of key which is suppliedasinput to
the algorithm is of 56 bits. Thus there are 256 keys are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 399
possible making the attacks impractical. DES is popular for
satisfying the two properties of block cipher that is
avalanche effect and completeness making it efficient.
Fig-5: AES Encryption
4.4 BLOWFISH ALGORITHM
Blowfish is designed by Bruce Schneider which is much
faster than DES and IDEA and can be used as an option to
DES AND IDEA. It is block cipher procedure that can be
effectively used for secure data transmission and uses a
secret key for encryption and decryption.Itusesa 64-bit size
block and a variable-length key, from 32 bits to 448bits,
making it tight to secure data. Blowfish Algorithmisa Feistel
structure, which iterates a simple encryption functionfor16
times.
Fig-6: Blowfish Encryption
4.5 IDEA
In 1991 James Massey and XuejiaLai developed an
International Data Encryption Algorithm which is a popular
symmetric key algorithm. A 64 bits input data and key of
length of 128 bits is used in IDEA. The 64 bits of actual data
input is prorated into 4 blocks each of length 16 bits. Then
exercises like sum, multiplication, modular division and
bitwise exclusive OR (XOR) are tested on each block of 16
bits. Totally 52 number of keys are used to perform each
individual rounds. For the first round six sub keys are
generated termed as k1 to k6, sub key k1 has the first 16bits
of the actual key and k2 has the next 16 bits similarly for k3,
k4, k5 and k6. Thus (16*6=96) 96 bits of actual key is used
for the first round. This process is repeatedfor eachroundto
make the cipher text strong and to make data more
impossible to decode.
5. COMPARATIVE STUDIES OF ALGORITHMS
Characteris
tics
RSA AES DES Blowfis
h
IDEA
Encryption
Type
Asymmet
ric
Symmet
ric
Symmet
ric
Symmet
ric
Symmet
ric
Cipher
Type
Neither
block nor
stream
Block
cipher
Block
cipher
Block
cipher
Block
cipher
Block size Minimum
512 bits
128,192
or 256
bits
64 bits 64 bits 64 bits
Data
Encryption
Capacity
Used for
encryptio
n of huge
amount
of data
Used for
encrypti
on of
less
Less
than
AES
Less
than
AES
encrypti
on of
small
data
Key Size >1024
bits
128,192
or 256
bits
56bits 32 to
448 bits
128 bits.
Memory
Usage
Low RAM
needed
Highest
memory
usage
algorith
m
Can
execute
in less
than 5
kb
More
than
AES
Highest
memory
usage
algorith
m
Execution
Time
Faster
than
others
Require
s
maximu
m time
Lesser
time to
execute
Equals
to AES
Require
s
maximu
m time
Table-1: Comparative Study of Algorithms
6. CONCLUSION
This paper offers the study of all efficientalgorithmsthatcan
be applied to cloud computing in order to do secure data
transmission by defeating the challenges that may arise
during data migration over the cloud. This paper also offers
the comparative study of various encryption algorithms so
that we can find the best choice of security algorithm. Each
algorithm is equally efficient in different situations, still by
applying single algorithm to secure data we can’t trust on
single level of security. So for making cloud based
applications more secure we need to apply multilevel
security architecture at each level of application.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 400
REFERENCES
[1] T. A. Mohanaprakash, A. Irudayapaulraj Vinod: A STUDY
OF SECURING CLOUD DATA USING ENCRYPTION
ALGORITHMS, 2018 IJSRCSEIT | Volume 3 | Issue 1 | ISSN:
2456-3307
[2] Harjot Kaur& Prof. Dinesh Kumar: DATA MIGRATION
FROM PRIVATE CLOUD TO PUBLIC CLOUD USING
ENCRYPTION AND STEGANOGRAPHY TECHNIQUE,
International journal of engineering sciences & research
technology, February 2018
[3] B. Deepthi: CLOUD DATA STORAGE FOR SECURITY BY
USING ATTRIBUTE-BASEDENCRYPTION”,IJCESR,VOLUME-
5, ISSUE-1, 2018
[4] Acqueela G Palathingal, Anmy George, Blessy Ann
Thomas, Ann Rija Paul: ENHANCED CLOUDDATASECURITY
USING COMBINED ENCRYPTION AND STEGANOGRAPHY,
International Research Journal of Engineering and
Technology (IRJET) 2395-0056 Volume: 05 Issue: 03 | Mar-
2018
[5] Omar G. Abood, Shawkat K. Guirguis,: A SURVEY ON
CRYPTOGRAPHY ALGORITHMS, International Journal of
Scientific and Research Publications, Volume 8, Issue 7, July
2018 ISSN 2250-3153
[6] Dr. V. Nandakumar: APPLICATION OF CO-OPERATIVE
ENCRYPTION TO CLOUDS FOR DATA SECURITY,
International Journal of Emerging Trends & Technology in
Computer Science (IJETTCS) Volume 7, Issue 1, January -
February 2018
[7] Prerna and Parul Agrawal: CRYPTOGRAPHY BASED
SECURITY FOR CLOUD COMPUTINGSYSTEM”,Volume8, No.
5, May-June 2017, International Journal of Advanced
Research in Computer Science.
[8] Eng. Hashem H. Ramadan, Moussa Adamou Djamilou,:
USING CRYPTOGRAPHY ALGORITHMS TO SECURE CLOUD
COMPUTING DATA AND SERVICES”, American Journal of
Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN :
2320-0936 Volume-6, Issue-10, pp-334-337
[9] NishaYadav and Dr. Amit Sharma,: IMPLEMENTATION
OF DATA SECURITY IN CLOUD COMPUTING”, International
journal of advanced technology in engineering and science,
vol. no. 4, issue no.4, April2016
[10] Ankit Dhamija: A NOVEL CRYPTOGRAPHIC AND
STEGNOGRAPHIC APPROACH FOR SECURE CLOUD DATA
MIGRATION,2015 International Conference on Green
Computing and Internet of Things (ICGCIoT).
[11] Akansha Deshmukh, Harneet KaurJanda, Sayalee
Bhusari, :SECURITY ON CLOUD USING CRYPTOGRAPHY,
Volume 5, Issue 3, March 2015,ISSN: 2277 128X,
International Journal of Advanced Research in Computer
Science and Software Engineering.
[12] V.Masthanamma, G.LakshmiPreya,: AN EFFICIENT
DATA SECURITY IN CLOUD COMPUTING USING THE RSA
ENCRYPTION PROCESS ALGORITHM, International Journal
of Innovative Research in Science, Engineering and
Technology (An ISO 3297: 2007 Certified Organization) Vol.
4, Issue 3, March 2015
[13] Abha Sachdev, Mohit Bhansali,: ENHANCING CLOUD
COMPUTING SECURITY USING AES ALGORITHM,
International Journal of Computer Applications (0975 –
8887) Volume 67– No.9, April 2013.
[14] Regil V Raju, M.Vasanth, Udaykumar P,: DATA
INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING,
Volume 4, No. 5, May 2013 Journal of Global Research in
Computer Science.

Más contenido relacionado

La actualidad más candente

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitAngelo Corsaro
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemCSCJournals
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 

La actualidad más candente (20)

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Secry poster
Secry posterSecry poster
Secry poster
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter Kit
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
 
50120140507006
5012014050700650120140507006
50120140507006
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 

Similar a IRJET- Survey of Cryptographic Techniques to Certify Sharing of Information in Cloud Computing

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...IRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 

Similar a IRJET- Survey of Cryptographic Techniques to Certify Sharing of Information in Cloud Computing (20)

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
El35782786
El35782786El35782786
El35782786
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptxAdityaGoogle
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Amil baba
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 

Último (20)

10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
Uk-NO1 kala jadu karne wale ka contact number kala jadu karne wale baba kala ...
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Information in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 397 “SURVEY OF CRYPTOGRAPHIC TECHNIQUES TO CERTIFY SHARING OF INFORMATION IN CLOUD COMPUTING” Nishigandha Sakharkar1 1 Assistant Professor, CMR Institute of Technology, Hyderabad, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Now the world becomes the world of data where the large amount of data is shared over the Internet. Cloud storage is availing this data sharing, still there is lot of issues to get resolved to maintain the ACID properties of data. The uniform solution to this is the use of efficient encryption techniques which will provide cryptographic approach. This paper presents a view of security folds and analyses the feasibility of the application of encryption techniques to make data secure and private over the cloud. We also discussed about cloud security threats, workings and challenges that cloud service provider faces in cloud environment and presentingthestudyof efficient encryption techniques enhancing security of data. This paper will provide a broad view over these techniques. Key Words: Cloud Computing, ACID, AES, Blowfish, DES, RSA, IDEA. 1. INTRODUCTION Cloud computing is a computing standard, where lot of devices are connected privately or publicly in grid, to provide dynamic and extensible framework forapplications, storage, minimizing the cost of computation, application development, data storage and speedy operations. Public, private and hybrid cloud are the classifications of cloud. Public clouds are managed as the whole responsibilityof the cloud service provider. The same frameworks for composition, surveillance, and possiblevariancesareshared between all the customers. Private clouds are exclusively limited to a single organization. Data surveillance and solitude are not the concerns of public cloud as it is opened to all the customers. Hybrid Clouds is merging of bothpublic and private cloud models. Cloud Providers provides three types of services. 1.1 Software as a Service (SaaS): This will provide a readymade solution for the end users where they can directly access the services. Multiple end users are serviced by this single set of services over cloud. 1.2 Platform as a Service (Paas): This is a layered architecture where the computing resources are together proposed as a service, upon which other upper layers of services can be erected. The user is free to create his own practices, according to the provider’s prototype. 3. Infrastructure as a Service (Iaas): Over the network IaaS provides basic storing and processing capabilities as functional services. All computing resources are virtualized and proposed for processing. The end user can develop his own work practices on the framework. Fig-1: Cloud Computing Architecture 2. CRITICAL THREATS TO CLOUD SECURITY Cloud security is still a big challenge for application developers; as individuals wants to store and accesstheirdata more securely. With so many recent threats and technological attacks, maintaining security has become all the more important. The following threats may break the security of cloud: a) An unauthorized user can access data which leads to data loss which can disturb businesses and consumers in a variety of ways. b) Absence of extensible integrity approach, on-going computerized rotation of cryptographic keys, strong passwords and certificates. c) Spectre and Meltdown one most disturbing cloud safety related issues, an erroneous set of design features in most modern devices has the capacity to allow content to be read from memory through the use of malignant JavaScript code. d) Cloud customers also facing the problem of data loss and understanding the solutions and which body is responsiblefor data loss and under what circumstances is difficult. e) High chances of DoS attacks which leads to shut down a system or network, making it idle to its intended user, this is accomplished by flooding the target with traffic, or sending it information that triggers a crash.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 398 Fig-2: Threats to cloud security 3. RELATED WORK Lot of research work has been presented recently on procedures for data securityandprivacyincloudcomputing. Many research works has been proposed on security and privacy of data by authors, still the security of data is a big concern as network capacity is increasing and needs to transfer fromtraditional waytocloudcomputingtechniques. Securing cloud does not include thesecurityofwholesystem which is considered as another issue. Although so many models are proposed that ensures security of data exchanged between users and servers, but they do not provide encryption on the data exchanged. For making it tightly secure all the information needs to be coded so that any unauthorized user is not able to grab the information and its location. Some other secured models for cloud computing environment are also being proposed. But, these models also fail to solve some cloud computing security issues. 4 SECURITY TECHNIQUES IN CLOUD COMPUTING 4.1 RSA ALGORITHM RSA is most commonly used andbest encryption/decryption algorithm which is categorized in Public Key Algorithm, evolved by scientists Rivest, Shamir, and Adelman (RSA). RSA is an asymmetric encryption/decryption algorithm.It is asymmetric in a sense that it uses two separate keys for coding and decoding respectively. One key is known as public key used to perform an coding and it is known publically and second key known as private key used for decoding which is secretly used and not shared withanyone. RSA algorithm is widely used forsecuredata communication in cloud computing. It consists of plain textandciphertextin the form of integers between 0 to n-1.This algorithm makes the use of block cipher and each block has a value which is less than n in binary format. This algorithm is performed in three steps: Key generation, Encryption, Decryption Fig-3: RSA Encryption and Decryption 4.2 AES ALGORITHM Advanced Encryption Standard (AES), is extensively used algorithm to encrypt and secure the data transmission. AES is a symmetric and block cipher method with 128 bits block size. Three distinct key lengths can be used in AES: 128, 192, or 256 bits. Mostly AES with 128 bit key length is popular. Execution of AES on cloud states that, first user will demand cloud services and the user data will be loaded on cloud.The User also submits his requirements to Cloud Service Provider (CSP) and chooses set of services that satisfy their needs. In future whenever any request is received to store information on cloud, this information will first encrypted using AES algorithm and then delivered to CSP. After the data is given to CSP if any application wants to access that data will first decrypt it into its original form and made available to the user. Fig-4: AES Encryption 4.3 DES ALGORITHM Data Encryption Standard is first encryption standard. It uses block ciphers and each block of DES is of size 64 bits. It is a symmetric key encryption procedure that uses a secret key for encryption and decryption and also produces cipher text of 64 bits. The length of key which is suppliedasinput to the algorithm is of 56 bits. Thus there are 256 keys are
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 399 possible making the attacks impractical. DES is popular for satisfying the two properties of block cipher that is avalanche effect and completeness making it efficient. Fig-5: AES Encryption 4.4 BLOWFISH ALGORITHM Blowfish is designed by Bruce Schneider which is much faster than DES and IDEA and can be used as an option to DES AND IDEA. It is block cipher procedure that can be effectively used for secure data transmission and uses a secret key for encryption and decryption.Itusesa 64-bit size block and a variable-length key, from 32 bits to 448bits, making it tight to secure data. Blowfish Algorithmisa Feistel structure, which iterates a simple encryption functionfor16 times. Fig-6: Blowfish Encryption 4.5 IDEA In 1991 James Massey and XuejiaLai developed an International Data Encryption Algorithm which is a popular symmetric key algorithm. A 64 bits input data and key of length of 128 bits is used in IDEA. The 64 bits of actual data input is prorated into 4 blocks each of length 16 bits. Then exercises like sum, multiplication, modular division and bitwise exclusive OR (XOR) are tested on each block of 16 bits. Totally 52 number of keys are used to perform each individual rounds. For the first round six sub keys are generated termed as k1 to k6, sub key k1 has the first 16bits of the actual key and k2 has the next 16 bits similarly for k3, k4, k5 and k6. Thus (16*6=96) 96 bits of actual key is used for the first round. This process is repeatedfor eachroundto make the cipher text strong and to make data more impossible to decode. 5. COMPARATIVE STUDIES OF ALGORITHMS Characteris tics RSA AES DES Blowfis h IDEA Encryption Type Asymmet ric Symmet ric Symmet ric Symmet ric Symmet ric Cipher Type Neither block nor stream Block cipher Block cipher Block cipher Block cipher Block size Minimum 512 bits 128,192 or 256 bits 64 bits 64 bits 64 bits Data Encryption Capacity Used for encryptio n of huge amount of data Used for encrypti on of less Less than AES Less than AES encrypti on of small data Key Size >1024 bits 128,192 or 256 bits 56bits 32 to 448 bits 128 bits. Memory Usage Low RAM needed Highest memory usage algorith m Can execute in less than 5 kb More than AES Highest memory usage algorith m Execution Time Faster than others Require s maximu m time Lesser time to execute Equals to AES Require s maximu m time Table-1: Comparative Study of Algorithms 6. CONCLUSION This paper offers the study of all efficientalgorithmsthatcan be applied to cloud computing in order to do secure data transmission by defeating the challenges that may arise during data migration over the cloud. This paper also offers the comparative study of various encryption algorithms so that we can find the best choice of security algorithm. Each algorithm is equally efficient in different situations, still by applying single algorithm to secure data we can’t trust on single level of security. So for making cloud based applications more secure we need to apply multilevel security architecture at each level of application.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 400 REFERENCES [1] T. A. Mohanaprakash, A. Irudayapaulraj Vinod: A STUDY OF SECURING CLOUD DATA USING ENCRYPTION ALGORITHMS, 2018 IJSRCSEIT | Volume 3 | Issue 1 | ISSN: 2456-3307 [2] Harjot Kaur& Prof. Dinesh Kumar: DATA MIGRATION FROM PRIVATE CLOUD TO PUBLIC CLOUD USING ENCRYPTION AND STEGANOGRAPHY TECHNIQUE, International journal of engineering sciences & research technology, February 2018 [3] B. Deepthi: CLOUD DATA STORAGE FOR SECURITY BY USING ATTRIBUTE-BASEDENCRYPTION”,IJCESR,VOLUME- 5, ISSUE-1, 2018 [4] Acqueela G Palathingal, Anmy George, Blessy Ann Thomas, Ann Rija Paul: ENHANCED CLOUDDATASECURITY USING COMBINED ENCRYPTION AND STEGANOGRAPHY, International Research Journal of Engineering and Technology (IRJET) 2395-0056 Volume: 05 Issue: 03 | Mar- 2018 [5] Omar G. Abood, Shawkat K. Guirguis,: A SURVEY ON CRYPTOGRAPHY ALGORITHMS, International Journal of Scientific and Research Publications, Volume 8, Issue 7, July 2018 ISSN 2250-3153 [6] Dr. V. Nandakumar: APPLICATION OF CO-OPERATIVE ENCRYPTION TO CLOUDS FOR DATA SECURITY, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 7, Issue 1, January - February 2018 [7] Prerna and Parul Agrawal: CRYPTOGRAPHY BASED SECURITY FOR CLOUD COMPUTINGSYSTEM”,Volume8, No. 5, May-June 2017, International Journal of Advanced Research in Computer Science. [8] Eng. Hashem H. Ramadan, Moussa Adamou Djamilou,: USING CRYPTOGRAPHY ALGORITHMS TO SECURE CLOUD COMPUTING DATA AND SERVICES”, American Journal of Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN : 2320-0936 Volume-6, Issue-10, pp-334-337 [9] NishaYadav and Dr. Amit Sharma,: IMPLEMENTATION OF DATA SECURITY IN CLOUD COMPUTING”, International journal of advanced technology in engineering and science, vol. no. 4, issue no.4, April2016 [10] Ankit Dhamija: A NOVEL CRYPTOGRAPHIC AND STEGNOGRAPHIC APPROACH FOR SECURE CLOUD DATA MIGRATION,2015 International Conference on Green Computing and Internet of Things (ICGCIoT). [11] Akansha Deshmukh, Harneet KaurJanda, Sayalee Bhusari, :SECURITY ON CLOUD USING CRYPTOGRAPHY, Volume 5, Issue 3, March 2015,ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering. [12] V.Masthanamma, G.LakshmiPreya,: AN EFFICIENT DATA SECURITY IN CLOUD COMPUTING USING THE RSA ENCRYPTION PROCESS ALGORITHM, International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 3, March 2015 [13] Abha Sachdev, Mohit Bhansali,: ENHANCING CLOUD COMPUTING SECURITY USING AES ALGORITHM, International Journal of Computer Applications (0975 – 8887) Volume 67– No.9, April 2013. [14] Regil V Raju, M.Vasanth, Udaykumar P,: DATA INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING, Volume 4, No. 5, May 2013 Journal of Global Research in Computer Science.