Final Report Cloud Computing
Final Report Cloud Computing
Objective
Motivation
Introduction
Problem Statement
Literature Review
Research Gap
Existing Methodology
Proposed Methodology
Implementation
Conclusion
Future Scope
References
1
OBJECTIVE
Objective of this research work is to improve the public cloud user data security by increasing the
security of the data, such a change will affect the performance negatively thus to secure user data but
we will process our data with new key.
2
MOTIVATION
So many shared host provide cloud space to store data but user can’t know the where are the data
physically stored in cloud server and what is the securities provided by clous server. How to improve
the public cloud user data security.
The proposed work is to make the cloud data more secure, private and efficient by overcoming the
security risk of user privacy with the help of secure vault to store the personal document and
important data.
3
INTRODUCTION
Cloud Computing is the delivery of
computing services such as servers,
storage, databases, networking, software,
analytics, intelligence, and more, over the
Cloud (Internet).
The cloud environment provides an easily
accessible online portal that makes handy
for the user to manage the compute,
storage, network, and application
resources
4
Advantages of cloud computing
Cost: It reduces the huge capital costs of buying
hardware and software.
Speed: Resources can be accessed in minutes, typically
within a few clicks.
Scalability: We can increase or decrease the requirement
of resources according to the business requirements.
Productivity: While using cloud computing, we put less
operational effort. We do not need to apply patching, as
well as no need to maintain hardware and software. So, in
this way, the IT team can be more productive and focus on
achieving business goals.
Reliability: Backup and recovery of data are less
expensive and very fast for business continuity.
Security: Many cloud vendors offer a broad set of
policies, technologies, and controls that strengthen our
data security.
5
PROBLEM STATEMENT
There are various cryptographic algorithms that can be used. Ideally, a user needs a cryptographic
algorithm which is of low cost and high performance. However, in reality such algorithm which is a one
stop solution does not exist. There are several algorithms with a cost performance trade-off
Many researches are already carried out for AES & RSA, the main concern, to high performance and
encryption time increase without decreasing cloud speed is a challenging task.
6
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• Proposed work only
cloud simulated not
Islam SJ, implemented any
A Simple and Secured IEEE • Implemented on
1. (CCECE)
system.
Cryptography System of Chaudhury ZH, cloud simulation not
2019 • To improve data
Cloud Computing [1] any system or server
Islam S. A security and secure
login concept is used.
• Implemented all
• Compared DES,
Priyadarshini technics and compare
A comprehensive evaluation 3DES, AES, RSA &
Patil, Prashant Elsevier with each other but
2. of cryptographic algorithms: Blowfish.
Narayankar, (PCS) using single
DES, 3DES, AES, RSA and • AES is secure and
Narayan D G, 2016 encryption key.
Blowfish [2] faster then other.
Meena S M • AES faster then other
but single key used.
7
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• AES algorithm is
• AES & LSB using same but LSB using
Priyansha Garg, split algorithms for steganography
Security on cloud computing
Moolchand Springer along with and its not a provide
3. using split algorithm along
(ICICC) cryptography and key exchange
with cryptography and Sharma, Shivani 2019 steganography method to change
steganography [3]
Agrawal, Yastika • Hide the image for key every time to
security. improve more
Kumar
security.
• Compared Proposed
AES, Blowfish, RSA • Proposed AES
An optimized encryption & AES. security and
Ratha P, Swain D, ELSEVIER
4. technique using an arbitrary • Proposed AES faster performance issues
Paikaray B, (PCS)
matrix with probabilistic then other in heterogeneous
Sahoo S. (2015)
encryption.[4] algorithms. data type.
8
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• Modified the version
of AES and we • Proposed AES
proposed a new cryptosystem gives
Data security-modified AES ACM algorithm. The better encryption
5. algorithm and its applications S Mondal, (SIGARCH) modification is done results in terms of
[5] 2014 by randomized the security against
S Maitra
key values and statistical attacks
repositioning the only.
pixel values.
• Multiple encryption
for more secure data
• Double encryption
using DES.
Ralph C. Merkle and Triple
6. On the security of multiple ACM • Double encryption
Martin E. Encryption using
encryption [6] (1981) and Triple
Hellman only DES.
Encryption using
DES.
9
RESERCH GAP
Cloud security provided by CSP (cloud service provider) but user can’t know about the
cloud securities. In the share cloud service user can’t know about data security.
Improve public cloud data security and provide more security in existing system on
public cloud.
1
0
EXISTING METHODOLOGY
1 NO
ID & PASSWORD Valid
U
S Generate Key1 from Stored YES
E KEY using a Hash Function and 2
R send to Clients/Users vie a
Secure channel
/
3 NO
KEY 1 Valid END
Has user
logged out?
2 Yes
Generate Key 2 using a hash
function from Key 1
3
Encrypt files/chunk that user
has accessed and store Key 2
4
END
1
Fig.2 Encryption Process & new key generate 2
Existing Methodology
ALGORITHM 1
1
3
Existing Methodology
ALGORITHM 2
1
4
PROPOSED METHODOLOGY
1
Fig.3 Secure Login authentication process 5
Encryption Process
3) Create blocks.
1
Fig.4 Encryption process 6
Decryption Process
1
Fig.5 Decryption Process 7
Logout Time auto encryption
1
Fig.6 Encryption and new Key Generate 8
PROPOSED METHODOLOGY
ALGORITHM 1
1
9
ALGORITHM 2
2
0
SOFTWARE
1. PHP 7.4.7 version (CodeIgniter Web Framework).
2. Server version 10.4.13 ( MariaDB)
3. Database version 5.0.2 (phpmyadmin)
2
1
Hardware Tools
Table 1 : Our Tested Hardware Tools
Parameters Details
RAM 4 GB
Cache 0 MB
2
2
IMPLEMENTATION
Step 1 : User Login Page.
(Fig.11
Fig.10 Secure
locker dashboard.)
Dashboard 2
6
IMPLEMENTATION
Step 5 : Upload 1MB file
2
9
AES & SHA - 256 comparison of Xeon Processer and i3 Processer File Encryption time in Seconds.
Table 3. Encrypt File Elapsed Time in seconds
3
0
Compare Existing and Proposed Work.
3
1
Compare Existing and Proposed Work.
0.12 0.117
0.113
0.1
Time per Seconds
0.08
0.06
0.051
0.047
0.039
0.04 0.036
0.026
0.022
0.02 0.016
0.013
0
1.019 1.92 3.115 4.194 10.08
Size per MB
3
5
Compare Existing and Proposed Work.
0.249
0.25 0.242
0.2
Time per Seconds
0.15
0.123 0.118
0.097 0.092
0.1
0.069 0.065
0.05 0.044 0.04
0
1.019 1.92 3.115 4.194 10.08
Size per MB
3
7
Comparison Key Generation of algorithms time in Secs. .
0.01
Time per Seconds
0.008
0.006
0.004
0
AES - 256 BF-CBC Blowfish
MD 5 SHA256 SHA512
3
9
Comparison Encryption file time in Secs..
0.12
Time per Seconds
0.1
0.08
0.0658
0.0601
0.06
0.0424 0.0397
0.04
0.0286
0.02 0.0153 0.0146 0.0123 0.014 0.0171
0.0043 0.0066 0.0018
0
101kb 1011kb 2977kb 5016kb 10675kb
Size per KB
4
1
Future Scope
In the future, we will work with a parallel AES algorithm for better Encryption and decryption time,
whether it is possible to use a large scale environment? Then, from here it is possible to measure the time
how many users will access at one time.
We will run this proposed model in a large scale cloud environment to measure the encryption and
decryption time, whether it is possible to use a large scale environment. This research will help providers
of systems like Cloud to readily use this system in their environment. With the assurance of successful
usage by a defined number of users. They will have calculated resource requirements that may be
required on the basis of the number of users.
4
2
References
[1] Islam, S. J., Chaudhury, Z. H., & Islam, S. (2019, May). A Simple and Secured Cryptography System of Cloud Computing. In 2019
IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (pp. 1-3). IEEE.
[2] Patil, Priyadarshini, et al. "A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish."
Procedia Computer Science 78.1 (2016): 617-624.
[3] Garg, Priyansha, et al. "Security on cloud computing using split algorithm along with cryptography and steganography." International
Conference on Innovative Computing and Communications. Springer, Singapore, 2019.
[4] Ratha, Paresh, et al. "An optimized encryption technique using an arbitrary matrix with probabilistic encryption." Procedia Computer
Science 57 (2015): 1235-1241.
[5] Mondal, Subijit, and Subhashis Maitra. "Data security-modified AES algorithm and its applications." ACM SIGARCH Computer
Architecture News 42.2 (2014): 1-8.
[6] Merkle, Ralph C., and Martin E. Hellman. "On the security of multiple encryption." Communications of the ACM 24.7 (1981): 465-
467.
[7] Kaur, Randeep, and Supriya Kinger. "Analysis of security algorithms in cloud computing." International Journal of Application or
Innovation in Engineering and Management 3.3 (2014): 171-6.
[8] P Varaprasada Rao, S Govinda Rao , P Chandrasekhar Reddy, G R Sakthidharan , Y Manoj Kumar.(2019,May). Improve the Integrity
of Data Using Hashing Algorithms. In 2019 International Journal of Innovative Technology and Exploring Engineering (IJITEE).
[9] Osman, H., Ibrahim, S. M., & Ali, E. S. (2018).Performance of Symmetric Key Cryptography Algorithms in Cloud Storage. World
Scientific News, 112, 244-251.
[10] Jadhav, Mr Santosh P., and B. R. Nandwalkar. "Efficient Cloud Computing with Secure Data Storage using AES."
43
References
[11] Bhardwaj, Akashdeep, et al. "Security Algorithms for Cloud Computing." Procedia Computer Science 85 (2016): 535-542.
[12] Vyakaranal, S., &Kengond, S. (2018, April).Performance Analysis of Symmetric Key Cryptographic Algorithms.In 2018 International Conference on
Communication and Signal Processing (ICCSP) (pp. 0411-0415).IEEE.
[13] Patil, P., Narayankar, P., Narayan, D. G., &Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and
Blowfish. Procedia Computer Science, 78, 617-624.
[14] Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January).Cloud security ecosystem for data security and privacy.In 2017 7th International
Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292).IEEE.
[15] HARRAN, M., FARRELLY, W., & CURRAN, K. (2018).A METHOD FOR VERIFYING INTEGRITY & UTHENTICATING DIGITAL MEDIA.APPLIED
COMPUTING AND INFORMATICS, 14(2), 145-158.
[16] AbdElminaam, D. S. (2018).Improving the security of cloud computing by building new hybrid cryptography algorithms. International Journal of
Electronics and Information Engineering, 8(1), 40-48.
[17] Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R., &Viguier, B. (2018, July). K angarooTwelve: Fast Hashing Based on $${\textsc
{Keccak}\text {-} p}{} $$. In International Conference on Applied Cryptography and Network Security (pp. 400-418).Springer, Cham.
[18] Rachmat, N. (2019, March). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. In Journal of Physics: Conference
Series (Vol. 1196, No. 1, p. 012049). IOP Publishing
[19] Y. Sharma, H. Gupta and S. K. Khatri, "A Security Model for the Enhancement of Data Privacy in Cloud Computing," 2019 Amity International
Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, pp. 898-902.
[20] Xue, C. T. S., & Xin, F. T. W. (2016).Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing:
Services and Architecture (IJCCSA), 6(6).
[21] Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016, August). Data security in cloud computing. In 2016 Fifth International Conference on
Future Generation Communication Technologies (FGCT) (pp. 55-59).IEEE.
[22] Sachdev Abha, Mohit Bhansali.”Enhancing Cloud Computing Security using AES Algorithm.” International Journal of Computer Applications
67.9(2013).
44
References
Website
[18] https://www.wikipedia.org/
[19] https://crypto.stackexchange.com/questions/8405/how-to-calculate-cycles-per byte
[20] Php.net
[21] www.google.com
[22] https://automationrhapsody.com/md5-sha-1-sha-256-sha-512-speed-performance
[23] https://www.w3schools.com/
45
!! Thank You !!