Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views46 pages

Final Report Cloud Computing

The document discusses various techniques for securing data in cloud computing including AES, RSA, Blowfish and DES algorithms. It analyzes their performance and security. It also proposes modifications to AES and use of multiple encryption methods to further improve security.

Uploaded by

Rajesh Baradiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views46 pages

Final Report Cloud Computing

The document discusses various techniques for securing data in cloud computing including AES, RSA, Blowfish and DES algorithms. It analyzes their performance and security. It also proposes modifications to AES and use of multiple encryption methods to further improve security.

Uploaded by

Rajesh Baradiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

Flow of Presentation

 Objective
 Motivation
 Introduction
 Problem Statement
 Literature Review
 Research Gap
 Existing Methodology
 Proposed Methodology
 Implementation
 Conclusion
 Future Scope
 References
1
OBJECTIVE
 Objective of this research work is to improve the public cloud user data security by increasing the
security of the data, such a change will affect the performance negatively thus to secure user data but
we will process our data with new key.

2
MOTIVATION
 So many shared host provide cloud space to store data but user can’t know the where are the data
physically stored in cloud server and what is the securities provided by clous server. How to improve
the public cloud user data security.
 The proposed work is to make the cloud data more secure, private and efficient by overcoming the
security risk of user privacy with the help of secure vault to store the personal document and
important data.

3
INTRODUCTION
 Cloud Computing is the delivery of
computing services such as servers,
storage, databases, networking, software,
analytics, intelligence, and more, over the
Cloud (Internet).
 The cloud environment provides an easily
accessible online portal that makes handy
for the user to manage the compute,
storage, network, and application
resources

4
Advantages of cloud computing
 Cost: It reduces the huge capital costs of buying
hardware and software.
 Speed: Resources can be accessed in minutes, typically
within a few clicks.
 Scalability: We can increase or decrease the requirement
of resources according to the business requirements.
 Productivity: While using cloud computing, we put less
operational effort. We do not need to apply patching, as
well as no need to maintain hardware and software. So, in
this way, the IT team can be more productive and focus on
achieving business goals.
 Reliability: Backup and recovery of data are less
expensive and very fast for business continuity.
 Security: Many cloud vendors offer a broad set of
policies, technologies, and controls that strengthen our
data security.

5
PROBLEM STATEMENT
 There are various cryptographic algorithms that can be used. Ideally, a user needs a cryptographic
algorithm which is of low cost and high performance. However, in reality such algorithm which is a one
stop solution does not exist. There are several algorithms with a cost performance trade-off

 Many researches are already carried out for AES & RSA, the main concern, to high performance and
encryption time increase without decreasing cloud speed is a challenging task.

6
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• Proposed work only
cloud simulated not
Islam SJ, implemented any
A Simple and Secured IEEE • Implemented on
1. (CCECE)
system.
Cryptography System of Chaudhury ZH, cloud simulation not
2019 • To improve data
Cloud Computing [1] any system or server
Islam S. A security and secure
login concept is used.

• Implemented all
• Compared DES,
Priyadarshini technics and compare
A comprehensive evaluation 3DES, AES, RSA &
Patil, Prashant Elsevier with each other but
2. of cryptographic algorithms: Blowfish.
Narayankar, (PCS) using single
DES, 3DES, AES, RSA and • AES is secure and
Narayan D G, 2016 encryption key.
Blowfish [2] faster then other.
Meena S M • AES faster then other
but single key used.

7
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• AES algorithm is
• AES & LSB using same but LSB using
Priyansha Garg, split algorithms for steganography
Security on cloud computing
Moolchand Springer along with and its not a provide
3. using split algorithm along
(ICICC) cryptography and key exchange
with cryptography and Sharma, Shivani 2019 steganography method to change
steganography [3]
Agrawal, Yastika • Hide the image for key every time to
security. improve more
Kumar
security.

• Compared Proposed
AES, Blowfish, RSA • Proposed AES
An optimized encryption & AES. security and
Ratha P, Swain D, ELSEVIER
4. technique using an arbitrary • Proposed AES faster performance issues
Paikaray B, (PCS)
matrix with probabilistic then other in heterogeneous
Sahoo S. (2015)
encryption.[4] algorithms. data type.

8
LITERATURE REVIEW
Sr.
Title Author Publication Description Limitation
No.
• Modified the version
of AES and we • Proposed AES
proposed a new cryptosystem gives
Data security-modified AES ACM algorithm. The better encryption
5. algorithm and its applications S Mondal, (SIGARCH) modification is done results in terms of
[5] 2014 by randomized the security against
S Maitra
key values and statistical attacks
repositioning the only.
pixel values.

• Multiple encryption
for more secure data
• Double encryption
using DES.
Ralph C. Merkle and Triple
6. On the security of multiple ACM • Double encryption
Martin E. Encryption using
encryption [6] (1981) and Triple
Hellman only DES.
Encryption using
DES.

9
RESERCH GAP
 Cloud security provided by CSP (cloud service provider) but user can’t know about the
cloud securities. In the share cloud service user can’t know about data security.

 Improve public cloud data security and provide more security in existing system on
public cloud.

1
0
EXISTING METHODOLOGY
1 NO
ID & PASSWORD Valid
U
S Generate Key1 from Stored YES
E KEY using a Hash Function and 2
R send to Clients/Users vie a
Secure channel
/
3 NO
KEY 1 Valid END

C Generate Key from Key1 using 4 YES


L Anti Hash Function
I
E 5
NO
N Compare Key with stored KEY Valid
T
Successfully 6 YES
Authenticated
1
Fig.1 Secure Login Authentication process 1
Logout Time auto encryption
Start

Has user
logged out?

2 Yes
Generate Key 2 using a hash
function from Key 1
3
Encrypt files/chunk that user
has accessed and store Key 2
4
END

1
Fig.2 Encryption Process & new key generate 2
Existing Methodology
ALGORITHM 1

1. User login will be verified by a suitable system.


2. If login credential is valid, generate KEY1 using Hash function with stored KEY and send to the user by
a trusted/secured medium.
3. Provide new KEY1 (by the user) to get a chunk of encrypted data/files.
4. Compare provided KEY1 with system’s KEY1, if matched, then go next step, otherwise exit.
5. Generate KEY using anti has function with user supplied KEY1; match this KEY with stored KEY; if
does not match, then exit.
6. Decrypt data chunk by this KEY and send to the user.
7. If user wants to store file, then encrypt it by suitable encryption algorithm.

1
3
Existing Methodology
ALGORITHM 2

1. At first, User login will be verified Algorithm 1.


2. If user logout, then generate KEY2 using a HMAC with KEY1.
3. Encrypt files/data that has been accessed/stored by this user using a suitable encryption algorithm.
4. Replace KEY1 by KEY2 and exit.

1
4
PROPOSED METHODOLOGY

1
Fig.3 Secure Login authentication process 5
Encryption Process

Steps for Encrypt file:

1) Upload the file.

2) Get size of the file.

3) Create blocks.

4) Encrypt each block with AES-256.

5) Store the Encrypted file.

6) Calculate the time execution time.

1
Fig.4 Encryption process 6
Decryption Process

Steps for Decrypt file:

1) Request for the file to download.

2) Get the encrypted file from the server.

3) Decrypt the file downloaded file saved.

1
Fig.5 Decryption Process 7
Logout Time auto encryption

1
Fig.6 Encryption and new Key Generate 8
PROPOSED METHODOLOGY
ALGORITHM 1

1. User login will be verified by a suitable system.


2. If login credential is valid, generate KEY1 from stored Key using a SHA-256 function and sent to user
using a trusted/secured medium.
3. Provide new KEY1 (by the user) to get a chunk of encrypted data/files.
4. Compare KEY1 using SHA-256 function, if matched, then go next step, otherwise exit.
5. Decrypt data chunk by this KEY and send to the user.
6. If user wants to store file, then encrypt.

1
9
ALGORITHM 2

1. At first, User login will be verified Algorithm 1.


2. If user logout, then generate KEY2 using a SHA 256 function with KEY1.
3. Encrypt files/data that has been accessed/stored by this user using a suitable encryption algorithm.
4. Replace KEY1 by KEY2 and exit.

2
0
SOFTWARE
1. PHP 7.4.7 version (CodeIgniter Web Framework).
2. Server version 10.4.13 ( MariaDB)
3. Database version 5.0.2 (phpmyadmin)

2
1
Hardware Tools
Table 1 : Our Tested Hardware Tools

Parameters Details

Processor Intel Core i3

Operating System Win 10 – 64 bit

HDD 500 GB SSD

RAM 4 GB

Speed 1.20 GHz

Cache 0 MB
2
2
IMPLEMENTATION
 Step 1 : User Login Page.

Fig.7 User Login Page 2


3
IMPLEMENTATION
 Step 2 : Dashboard – Home Page

Fig.8 Home Page 2


4
IMPLEMENTATION
 Step 3 :Enter Secure Key

Fig.9 Enter Secure key 2


5
IMPLEMENTATION
 Step 4 : Secure Dashboard

(Fig.11
Fig.10 Secure
locker dashboard.)
Dashboard 2
6
IMPLEMENTATION
 Step 5 : Upload 1MB file

Fig.11 Upload 1 MB File 2


7
IMPLEMENTATION
 Step 6 : Download 1MB file

Fig.12 Download File 2


8
 AES & RSA comparison of Xeon Processer and i3 Processer File Encryption time in Seconds.
Table 2. Encrypt File Elapsed Time in seconds

Data file i3 Processor Xeon Processor


Size in MB (ms) (ms)

1.019 0.0160 0.0069

1.920 0.0260 0.0128

3.115 0.0390 0.0166

4.194 0.0510 0.0221

10.080 0.1170 0.0545

2
9
 AES & SHA - 256 comparison of Xeon Processer and i3 Processer File Encryption time in Seconds.
Table 3. Encrypt File Elapsed Time in seconds

Data file i3 Processor Xeon Processor


Size in MB (ms) (ms)

1.019 0.0130 0.0066

1.920 0.0220 0.0122

3.115 0.0360 0.0160

4.194 0.0470 0.0215

10.080 0.1130 0.0542

3
0
 Compare Existing and Proposed Work.

Table 4. i3 Processor Encrypt File Elapsed Time in seconds

Data file AES & RSA AES & SHA - 256


Size in MB (ms) (ms)

1.019 0.0160 0.0130

1.920 0.0260 0.0220

3.115 0.0390 0.0360

4.194 0.0510 0.0470

10.080 0.1170 0.1130

3
1
 Compare Existing and Proposed Work.

i3 Processor comparisons Encryption time


0.14

0.12 0.117
0.113

0.1
Time per Seconds

0.08

0.06
0.051
0.047
0.039
0.04 0.036
0.026
0.022
0.02 0.016
0.013

0
1.019 1.92 3.115 4.194 10.08

Size per MB

AES & RSA AES & SHA - 256


Chart 1. Comparisons Encryption
3
2
 AES & RSA comparison of Xeon Processer and i3 Processer Decryption + Encryption Total time in
Seconds.
Table 5. Comparisons Encryption + Decryption time

Data File i3 Processor Xeon Processor


Size in MB (ms) (ms)

1.019 0.0440 0.0059

1.920 0.0690 0.0105

3.115 0.0970 0.0142

4.194 0.1230 0.0206

10.080 0.2490 0.0545


3
3
 AES & SHA - 256 comparison of Xeon Processer and i3 Processer Decryption + Encryption Total time
in Seconds.
Table 6. Comparisons Encryption + Decryption time

Data File i3 Processor Xeon Processor


Size in MB (ms) (ms)

1.019 0.0400 0.0055

1.920 0.0650 0.0101

3.115 0.0920 0.0136

4.194 0.1180 0.0196

10.080 0.2420 0.0503


3
4
 Compare Existing and Proposed Work.

Table 7. i3 Processor Decryption + Encryption File Elapsed Time in seconds

Data file AES & RSA AES & SHA - 256


Size in MB (ms) (ms)

1.019 0.0440 0.0400

1.920 0.0690 0.0650

3.115 0.0970 0.0920

4.194 0.1230 0.1180

10.080 0.2490 0.2420

3
5
 Compare Existing and Proposed Work.

i3 Processor comparisons Decryption + Encryption time


0.3

0.249
0.25 0.242

0.2
Time per Seconds

0.15
0.123 0.118
0.097 0.092
0.1
0.069 0.065
0.05 0.044 0.04

0
1.019 1.92 3.115 4.194 10.08

Size per MB

AES & RSA AES & SHA - 256

Chart 2. Comparisons Decryption + Encryption 3


6
 Comparison Key Generation of algorithms time in Secs. .

Table 8. Comparisons key generation of algorithms

Algorithms MD 5 SHA 256 SHA 512


Time in seconds
(ms) (ms) (ms)

AES 256 0.0009 0.0012 0.0011

BF – CBC 0.001 0.0014 0.0121

Blowfish 0.0014 0.0133 0.0125

3
7
 Comparison Key Generation of algorithms time in Secs. .

Comparisons Key Generation of algorithms time


0.014 0.0133
0.0125
0.0121
0.012

0.01
Time per Seconds

0.008

0.006

0.004

0.002 0.0014 0.0014


0.0009 0.0012 0.0011 0.001

0
AES - 256 BF-CBC Blowfish

MD 5 SHA256 SHA512

Chart 3. Comparisons key generation of algorithms


3
8
 Comparison Encryption file time in Secs..

Table 9. Comparisons Encryption time

Algorithms BF – CBC Blowfish AES 256


File Size (ms) (ms) (ms)
101kb 0.0043 0.0066 0.0018
1011kb 0.0153 0.0146 0.0123
2977kb 0.0424 0.397 0.014
5016kb 0.0658 0.0601 0.0171
10675kb 0.1388 0.1331 0.0286

3
9
 Comparison Encryption file time in Secs..

Comparisons of algorithms encryption time


0.16
0.1388
0.14 0.1331

0.12
Time per Seconds

0.1

0.08
0.0658
0.0601
0.06
0.0424 0.0397
0.04
0.0286
0.02 0.0153 0.0146 0.0123 0.014 0.0171
0.0043 0.0066 0.0018
0
101kb 1011kb 2977kb 5016kb 10675kb

Size per KB

BF-CBC BlowFish AES 256

Chart 4. Comparisons Encryption time


4
0
Conclusion
 In this proposed work implement a model as per given in the base paper and we have checked the
feasibility of as per given in the base paper. We have a comparison with two systems in how long
encryption and decryption take. In this model first, we have uploaded any file in our model to try to
encryption the data, and then the user will be logged out. Then after logout data will be decrypted first
and then encrypt with a new key. A new key will be saved in the database for further use. As per our
proposed model, this technology is very useful in small businesses to work with Xeon processor for
about 10000 users, whenever if it is used for 1 million users or more then we will be required more
powerful processer and other hardware to improve the scalability of processer because there is the
limitation for Xeon processor.

4
1
Future Scope
 In the future, we will work with a parallel AES algorithm for better Encryption and decryption time,
whether it is possible to use a large scale environment? Then, from here it is possible to measure the time
how many users will access at one time.
 We will run this proposed model in a large scale cloud environment to measure the encryption and
decryption time, whether it is possible to use a large scale environment. This research will help providers
of systems like Cloud to readily use this system in their environment. With the assurance of successful
usage by a defined number of users. They will have calculated resource requirements that may be
required on the basis of the number of users.

4
2
References
[1] Islam, S. J., Chaudhury, Z. H., & Islam, S. (2019, May). A Simple and Secured Cryptography System of Cloud Computing. In 2019
IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (pp. 1-3). IEEE.
[2] Patil, Priyadarshini, et al. "A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish."
Procedia Computer Science 78.1 (2016): 617-624.
[3] Garg, Priyansha, et al. "Security on cloud computing using split algorithm along with cryptography and steganography." International
Conference on Innovative Computing and Communications. Springer, Singapore, 2019.
[4] Ratha, Paresh, et al. "An optimized encryption technique using an arbitrary matrix with probabilistic encryption." Procedia Computer
Science 57 (2015): 1235-1241.
[5] Mondal, Subijit, and Subhashis Maitra. "Data security-modified AES algorithm and its applications." ACM SIGARCH Computer
Architecture News 42.2 (2014): 1-8.
[6] Merkle, Ralph C., and Martin E. Hellman. "On the security of multiple encryption." Communications of the ACM 24.7 (1981): 465-
467.
[7] Kaur, Randeep, and Supriya Kinger. "Analysis of security algorithms in cloud computing." International Journal of Application or
Innovation in Engineering and Management 3.3 (2014): 171-6.
[8] P Varaprasada Rao, S Govinda Rao , P Chandrasekhar Reddy, G R Sakthidharan , Y Manoj Kumar.(2019,May). Improve the Integrity
of Data Using Hashing Algorithms. In 2019 International Journal of Innovative Technology and Exploring Engineering (IJITEE).
[9] Osman, H., Ibrahim, S. M., & Ali, E. S. (2018).Performance of Symmetric Key Cryptography Algorithms in Cloud Storage. World
Scientific News, 112, 244-251.
[10] Jadhav, Mr Santosh P., and B. R. Nandwalkar. "Efficient Cloud Computing with Secure Data Storage using AES."

43
References
[11] Bhardwaj, Akashdeep, et al. "Security Algorithms for Cloud Computing." Procedia Computer Science 85 (2016): 535-542.
[12] Vyakaranal, S., &Kengond, S. (2018, April).Performance Analysis of Symmetric Key Cryptographic Algorithms.In 2018 International Conference on
Communication and Signal Processing (ICCSP) (pp. 0411-0415).IEEE.
[13] Patil, P., Narayankar, P., Narayan, D. G., &Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and
Blowfish. Procedia Computer Science, 78, 617-624.
[14] Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January).Cloud security ecosystem for data security and privacy.In 2017 7th International
Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292).IEEE.
[15] HARRAN, M., FARRELLY, W., & CURRAN, K. (2018).A METHOD FOR VERIFYING INTEGRITY & UTHENTICATING DIGITAL MEDIA.APPLIED
COMPUTING AND INFORMATICS, 14(2), 145-158.
[16] AbdElminaam, D. S. (2018).Improving the security of cloud computing by building new hybrid cryptography algorithms. International Journal of
Electronics and Information Engineering, 8(1), 40-48.
[17] Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R., &Viguier, B. (2018, July). K angarooTwelve: Fast Hashing Based on $${\textsc
{Keccak}\text {-} p}{} $$. In International Conference on Applied Cryptography and Network Security (pp. 400-418).Springer, Cham.
[18] Rachmat, N. (2019, March). Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. In Journal of Physics: Conference
Series (Vol. 1196, No. 1, p. 012049). IOP Publishing
[19] Y. Sharma, H. Gupta and S. K. Khatri, "A Security Model for the Enhancement of Data Privacy in Cloud Computing," 2019 Amity International
Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, pp. 898-902.
[20] Xue, C. T. S., & Xin, F. T. W. (2016).Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing:
Services and Architecture (IJCCSA), 6(6).
[21] Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016, August). Data security in cloud computing. In 2016 Fifth International Conference on
Future Generation Communication Technologies (FGCT) (pp. 55-59).IEEE.
[22] Sachdev Abha, Mohit Bhansali.”Enhancing Cloud Computing Security using AES Algorithm.” International Journal of Computer Applications
67.9(2013).
44
References
Website
[18] https://www.wikipedia.org/
[19] https://crypto.stackexchange.com/questions/8405/how-to-calculate-cycles-per byte
[20] Php.net
[21] www.google.com
[22] https://automationrhapsody.com/md5-sha-1-sha-256-sha-512-speed-performance
[23] https://www.w3schools.com/

45
!! Thank You !!

You might also like