www.ijcait.
com International Journal of Computer Applications & Information Technology
Vol. 1, No., 2012
Secure File Storage in Cloud Computing Using Hybrid
Encryption Algorithm
Mehul Batra Prayas Dixit Lalit Rawat
Department of Computer Department of Computer Department of Computer
Engineering, Bharati Engineering, Bharati Engineering, Bharati
Vidyapeeth (Deemed to be) Vidyapeeth (Deemed to be) Vidyapeeth (Deemed to be)
University College of University College of University College of
Engineering Pune Engineering Pune Engineering Pune
[email protected] [email protected] [email protected] Rohini Khalkar
Department of Computer
Engineering, Bharati
Vidyapeeth (Deemed to be)
University College of
Engineering Pune
rohini.khalkar@bharatividyape
eth.edu
ABSTRACT which experiences tortuous failure occasionally, may decide
Data transmitted through internet is getting larger every to hide the data errors from the clients for the benefit of their
day .Therefore an algorithm is required by which our data can own.
be transferred speedily and securely. The main aim of this Cloud Service Providers (CSP) needs to convince their clients
particular research is to protect the transmitted data with the that their data has remained unaltered and it is kept safe from
help of encryption and decryption techniques. This research corruption, remoulding or unauthorized disclosure by using
paper presents a model for encrypting the data transmitted these techniques.
through cloud. The algorithms used in this model are: AES,
DES, RC4 and Steganography. This hybrid algorithm will
1.2 ENCRYPTION
help users and cloud service provider to transmit their data One of the most prime method for providing data security,
without being stolen or affected. especially for end-to-end transmission of data over the
networks. Encryption is the method by which a data or plain
Keywords text is transformed to an encoded form that can only be
Cloud Security, Cloud computing, Hybrid Encryption, AES, decoded by one who has the key. The data which is
DES, RC4, Steganography unencrypted is called plain text and the data which is
encrypted is referred as cipher text. There are two main types
1. INTRODUCTION of encryption asymmetric and symmetric encryption.
Cloud computing is a term used for providing services over
the internet. Basically it is a technique which is used to store, 1.3 ALGORITHMS
process and manage data over the remote servers and network.
Services are divided into three categories: Infrastructure as a 1.3.1 RC4
service (IaaS), Software as a service (SaaS) and Platform as a
service (PaaS). RC4 is a shared key stream algorithm requires a unassailable
exchange of shared key. In this algorithm stream of random
characters is fully unconventional of plain text used. An 8*8
1.1 Data Integrity in cloud storage S-Box in which each of the entries is a permutation of the
As a ground-breaking technology with earnest implications, numbers from 0 to 255 and permutation is method of the
cloud computing is transforming the whole business and mutable length key. The two counters I and j are both set to
information technology sectors. Cloud computing has many zero in this algorithm. Mostly used for successive generation
benefits such as: mobility, backup and recovery, universal of pseudo arbitrary bytes and after that generates a random
data access with independent geographical locations. stream which is a XORED with the plaintext to provide the
The consistency, accuracy, validity and precision of remotely cipher text.
stored data are called data integrity and it is a fundamental
component of information security.
Cloud Computing makes these advantages more alluring than
ever, some challenging security threats towards the user’s
outsourced data is it’s side effects. One of the biggest
concerns with cloud storage is of data integrity verification at
unknown servers. For example, the service provider (storage),
Page| 1 y
www.ijcait.com International Journal of Computer Applications & Information Technology
Vol. 1, No., 2012
Therefore, cryptography where the data is protected,
steganography The data and the communicating party can
both be defended.
2. ISSUES AND APPLICATIONS OF
CLOUD COMPUTING
Even with various benefits of cloud computing users and
consumers are unwilling to adopt this technology. Security is
a broad topic in cloud computing. It has basically two broad
categories i.e security issues faced by cloud users and issues
faced by cloud providers. Therefore, there are new
requirements for security in cloud compared to traditional
environments.
We often use snapchat, Instagram, google drive bottom line is,
Figure 1. RC4 working flow if we use any social networking program or data storage we
are almost using cloud computing. we also use cloud services
1.3.2 AES such as email offloading that helps a lot in reducing the
companies cost of development and maintenance despite the
Popular and widely used symmetric encryption algorithm immense benefits of the cloud computing the privacy of the
“Advanced Encryption Standard”. It is six times rapid than data is the biggest concern of the organizations and individual
DES. It is considered as a replacement of DES because key users have. current technologies used to protect the data
size of DES was too small. It is a iterative approach based on include firewalls, a technology developed by IBM called
substitution-permutation network. It is made of series of airavat. In a research project, we are leading our aim is to
linked operations, which involves substituting inputs with provide cloud data security and privacy protection. Although
cloud computing has many advantages there are still many
specific outputs and others involve mixing bits around. It
problems that need to be solved and in our research project we
basically computes on bytes rather than bits. AES considers
have created a suite of algorithms for scalable control and
the 128 bits of plain text block as 16 bytes. These 16 bytes are computation of encrypted data in the cloud. This will go to
arranged in 4 attributes and 4 tuples for processing as a help the cloud providers to control and manage the physical
matrix. Number of rounds in AES is mutable and changes infrastructure and make sure the data on the cloud remains
with respect to the length of the key. For example: For 128 bit secure. There can be data vulnerabilities the susceptible to
keys AES uses 10 rounds , 12 for 192 bit keys and 14 rounds attackers looking to exploit and attack the data to gain
for 256 bit keys. complete control over it or steal it but our hybrid encryption
will help in getting over it.
1.3.3 DES
3. PROPOSED MODEL
A symmetric key block cipher DES(Data Encryption Proposed System works on Hybrid encryption which is
Standard) based on Feistel Cipher. Works on 16 round Fiestel comprised of four encryption algorithms .basically the
Structure and with a block size of 64 bit. It has a effective key concept of hybrid encryption is to mix the different encryption
length of 56 bits. As 8 of the 64 bits of the key are not used by algorithm for making cloud robust and to secure the data or
the algorithm(8 of those bits are used for parity checks). It can privacy. The mere introduction of the algorithms used in
run in four different modes by encrypting blocks individually hybrid encryption. first one to come is RC4 is a shared key
or by making cipher block dependent on previous blocks. But stream algorithm requires a unassailable exchange of shared
it is very easy to crack the key with the brute force which key . In this algorithm stream of random characters is fully
involves trying every possible key until you find the right one unconventional of plain text used. An 8*8 S-Box in which
each of the entries is a permutation of the numbers from 0 to
and maximum it would take 2^56. So company came with the
255 and permutation is method of the mutable length key.
successor to DES which is 3DES IN which we perform three
Then comes the DES a symmetric key block cipher DES
iterations of the DES algorithm to increase key length from 56 (Data Encryption Standard) based on Feistel Cipher. Works
bit to 168 bits but it’s comparatively slower than DES. on 16 round Fiestel Structure and with a block size of 64 bit.
It has a effective key length of 56 bits. As 8 of the 64 bits of
1.3.4 STEGANOGRAPHY the key are not used by the algorithm (8 of those bits are used
for parity checks). Third one is the successor of the DES
Steganography is a process in which the secret message is Popular and widely used symmetric encryption algorithm
written in something in this manner that no one other than the “Advanced Encryption Standard”. It is six times rapid than
sender and intended recipient has doubts about the existence DES. It is considered as a replacement of DES because key
of the message, which is a security through uncertainty. size of DES was too small. It is a iterative approach based on
Steganography (secret writing). In this messages are present substitution-permutation network. It is made of series of
in different way: images, articles or some other co-text and, linked operations, which involves substituting inputs with
ideally, secret messages, are in invisible ink between visual specific outputs and others involve mixing bits around. It
lines of a private letter. The advantage of steganography basically computes on bytes rather than bits. AES considers
compared to cryptography is that the message does not draw the 128 bits of plain text block as 16 bytes. Last one is
attention to itself. Clearly visible encrypted messages - no Steganography which will be used to hide key it is a process
matter how unobtrusive - will create suspicion and trap in which the secret message is written in something in this
manner that no one other than the sender and intended
themselves in countries where encryption is illegal.
recipient has doubts about the existence of the message, which
Page| 2 y
www.ijcait.com International Journal of Computer Applications & Information Technology
Vol. 1, No., 2012
is a security through uncertainty. Steganography (secret encryption algorithm. These algorithms uses the 128 bit key
writing). The text file will be taken as an input that text file size and to hide the data into image using LSB technique. The
will be divided into three equal parts first half of the text will encoding and the decoding time of the encryption is calculated
be encrypted with the help of RC4 . the second half of the text with the help of the java program. All the operations will be
will be encrypted with the help of the AES and the remaining performed on the single text file which will be further divided
text will be encrypted with the DES . The key produced will into the three parts.
hide in some image with the help of the steganography (It is a
simple approach to hide message or key into the image with
the help of the LSB). The encrypted file and the hidden key to
decrypt the file will be sent to the user. User has to first
decrypt the image to get to know the key and then that key
will be used to decrypt the secured file. This technique will
help to maintain the confidentiality and Authentication of the
User and will help to gain the access control. That key further
will be used to decrypt the data for the authorized user. For
decryption of file the reverse process of encryption is applied
shown in figure 6.
Figure 4: Encryption time with AES and proposed
system
As shown in figure 4 proposed system need less time for file
encoding. It is so because in proposed model combination of
symmetric key encryption algorithms are run concurrently.
Hybrid algorithm needs 18% to 20% less time for text file in
comparison with the existing technologies. With single
algorithm u cannot provide high security to cloud data.
Figure 2. Architecture of hybrid encryption
Figure 5: Decryption time with AES and proposed
system
As shown in figure 5 current system require 14% to 16%
maximum time for decryption of file compared to hybrid
algorithm . AES algorithm takes less time for decryption but
doesn’t provide good security to data . As in AES if size of
key increases then directly the number of rounds increases
than encoding and decoding time also increases.
Figure 3. Architecture of hybrid decryption
5. CONCLUSION
4. RESULT Issues of cloud storage are solved using encryption and
In this proposed model of RC4, AES, DES and steganography techniques. Data security is achieved
Steganography algorithms are used for securing the data. using RC4, AES, DES and key security is accomplished
Proposed system is a collection RC4, AES, DES, and using the LSB technique. Delay is kept low using
Steganography. All these algorithms are symmetric key multithreading technique with the help of this security
Page| 3 y
www.ijcait.com International Journal of Computer Applications & Information Technology
Vol. 1, No., 2012
technique data integrity, confidentiality, authentication solution will help the users to overcome the fraudulence
is achieved. While the proposed text file encryption and will help in secure transmission of data.
takes 17% to 20% less time than AES and even more
less than DES and RC4. So finally the proposed
6. REFERENCES
[1] Dr. S.H Patil and Rohini Khalkar, “Data Security Technique In Cloud Storage”, International Journal of Computer
Engineering and Technology, vol. 4, Issue. 2, pp:373-375, June 2013.
[2] Rohini Khalkar and Dr. S.H Patil, “Data Integrity Proof Techniques In Cloud Storage”, International Journal of
Computer Engineering and Technology, vol. 4, Issue.2, pp:454-458, April 2013.
[3] V.S. Mahalle and A. K. Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes)
Encryption Algorithm”, IEEE , INPAC,pp 146-149,Oct. 2014.
[4] P. S. Bhendwade and R. T. Patil, “Steganographic Secure Data Communication”,IEEE, International Conference on
Communication and Signal Processing, pages 953-956,April 2014.
Page| 4 y