An Efficient Cloud Data Security Using Hybrid Cryptograph Algorithm Dr M

An Efficient Cloud Data Security Using Hybrid Cryptograph Algorithm

Dr M.GOBI, Assistant professor A.Uma, Research Scholar
Department of computer science Department of computer science
Chikkanna Govt Arts College, Tirupur-641602 Chikkanna Govt Arts College, Tirupur-641602
[email protected] [email protected]

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

ABSTRACT: Now daily’s distributed computing is developing innovation which gives open assets on the web. It is putting forth vast measure of information to the clients and dispersed information over the system. Be that as it may, the principle issue is it doesn’t have and security in appropriated information. It turns into the principle deterrent in distributed computing condition. So to upgrade the security, we proposed a calculation called RSA calculation. It is another approach and it met the necessities of open key frameworks. By utilizing this calculation it will build the security in information and expends less time and less cost.
KEYWORDS: distributed computing, conveyed information, security, RSA calculation.

I.INTRODUCTION
Distributed computing “is a model for empowering universal, advantageous, on-request organize access to a common pool of configurable registering assets that can be quickly provisioned and discharged with insignificant administration exertion or specialist co-op communication”. Ex. Amazon EC2, Google App Engine, Windows Azure.
The US National Institute of Standards and Technology, NIST architecture includes three service models, four Deployment models, five Essential Characteristics and Several Common Characteristics. The Three service model includes,

1) Infrastructure as a Service (IaaS)
2) Platform as a Service (PaaS)
3) Software as a Service(SaaS)

IaaS- This refers to the basic bare metal infrastructure provided by the Cloud Service Provider (CSP) including the network, storage, memory, processor, and various other computing resources. The resources are provided in the form of virtualized systems accessible through internet.
E.g. is Amazon EC2.

PaaS- The PaaS gives the platform for customized application
development and services to build these applications. This includes integrated development environments (IDE), operating systems support, and platform layer resources. This
is working under the support of IaaS.
E.g. is Microsoft Azure.

Saas- The Saas enables the customers to use CSP’s applications, running on the cloud infrastructure, through the internet. The thin client interface can be used to access the applications such as web browser. The SaaS does not provide the facility to create an application or software. The SaaS only
Provides software through the internet making it a model to distribute the software through Web. The customers pay for the usage and do not own the software. Here software is used as a service and only pay what is the time used as a metered rate.
E.g. is Google App Engine
The four Deployment models include
1) Private Cloud
2) Public Cloud
3) Community Cloud
4) Hybrid Cloud

Private Cloud- The cloud that is managed only for a single organization having their own private cloud. The organization may or may not have the physical infrastructure and can be managed by the organization itself or by a third party. The security of data and access is very high in these cloud.

Public Cloud- This cloud is access by general public and the physical infrastructure is provided by cloud service provider and service are available at any time and its measured by usage and only pay for the usage and it is having lass security compared to above.

Community Cloud- This cloud is shared by a number of organizations and/or customers forming a specific community.

Hybrid Cloud- This cloud is the combination of two or more other clouds (public, private, or community).

1) On-Demand, Self Service- The CSP having the provision of the cloud services and the associated resources is accomplished as and when required. This is usually done through Web services and management interfaces.
2) Network Access- The network protocols and internet connectivity is needed for accessing cloud services.
3) Elasticity- The resources can be rapidly and elastically scaled as per customer’s demands. The customer has a view of unlimited resources that can be purchased as needed in a pay-as-you-go manner.
4) pooling of resources- The cloud’s resources are shared among multiple customers by pooling in a multi-tenant environment. The customers are transparent about the location of the resources. There is a mapping between physical and virtual resources provided to the customers.
5) Metered Service-The scaling of resources up and down is performed dynamically and the usage of services is metered and reported to the customers and CSP. The metering also helps the optimization of resource usage automatically while the users are charged in a pay-as-you-use manner.

II. RELATED WORK
In this paper, level of vulnerability is advocated in distributed computing by utilizing the figure cloud. It makes the client to make the information in an anchored way on open structures. To achieve this, the encryption procedure has been completed (i.e.) client information will be sent to cloud server, and cloud server will send back the information again to the client. The anchored information can’t be gotten to in people in general distributed computing, so to make the information to be private they are utilizing encryption process.1
Numerous organizations are utilizing the cloud structures. Cloud information security depends more on the techniques and check measures. So this paper examines about the information security issues in cloud. A portion of the issues like security and secrecy, information respectability, information allotment and reallocation, information accessibility, stockpiling and reinforcement recuperation and so on to conquer all these kind of issues, RSA calculation has been utilized. The information will be scrambled and sent to the client, when the client needs the information it will be sent in the unscrambled arrange. 2
In this paper they examine about the utilization of cryptography ideas, to build the security of encoded information which is sent by the client to cloud server. The principle objective is to encode and decode the information in an anchored route with consumption of less time and less cost in both the encryption and unscrambling process. Numerous quantities of keys will be produced and regular assaults will be noted. So by rehashing the procedure it encourages you to keep the assaults. 3
A significant number of the IT associations are dynamically moving far from gadget driven perspectives of IT. It is primarily centered around the applications, data, individuals and all these depend just on the new design of distributed computing. In this paper they are talking about the attributes of distributed computing and kinds of mists, classification of cloud administrations, security strategies for distributed computing, outline of RSA cryptosystem.

III. PROBLEM STATEMENT
In cloud, the data can be accessed from anywhere at any time may have a chance to data leakage and segregation of data. Major issues in data storage is to be addressed and by achieving data confidentiality and integrity. An efficient algorithm for data privacy and security in the cloud is to be designed so that adopting cloud data become secure.

IV. PROPSED HYBRID DATA SECURITY ALGORITHM
The cryptographic data Encryption is one of the solution to secure data in cloud computing platform. There are symmetric (e.g. DES, AES) asymmetric (e.g. RSA, EIGamal, ECC), Digital signature (MD5, SHA) algorithms are present and the combination of these algorithms form hybrid data security cryptographic algorithm. Here proposing a combination of RSA and AES is used for sending and receiving data message on the cloud.

The proper use of public and private key operation will make the data in the cloud as much higher security.

The message file upload hybrid data security algorithm:
1) The cloud user is having the data message or file to be secure before that has to be the Cloud Service Provider.
2) The AES message digest and corresponding generated in the client machine.
3) The data message or file with public key is encrypted using AES encryption algorithm.
4) The encrypted data or file is sent to cloud service provider.
5) The data message file is then store it in to corresponding cloud server.

1. RSA Algorithm Process:
RSA calculation is most broadly a universally useful way to deal with open key encryption. It is an encryption-unscrambling strategy. It comprises of plaintext and figure content I n the type of whole number between 0 to n-1. This plain content is scrambled in hinders; every single square has a twofold esteem which ought to be not as much as n.
This algorithm is done in three steps:
Key generation
Encryption
Decryption

The plain content square is taken as M and figure content square is taken as C. It utilizes the equation (i.e.) C=Memodn.

1. Key Generation:

In key age think about two prime numbers (i.e.) p and q. it comprises of open key and a private key. General society key will be known to everybody. Figure the estimation of n. select an arbitrary encryption key e figure the gcd and it ought to be equivalent to 1. At that point discover the decoding key d. at last compute people in general key and private key.

Steps in key generation

1. Encryption process:

In the encryption procedure speak to a plaintext in arrangement of numbers modulo n. the encryption procedure to get Cipher content C from plaintext M is exceptionally basic. It is defined as: C=Me mod n.
Where C = cipher text
M = message text
E = public key
D = private key

The document will be encoded by sending a symmetric record scrambled key (FEK) all the while lopsided open key will created, both will be joined and frames a scrambled FEK with a header document.

3. Decryption process:

The switch procedure of encryption will be decoding. It tends to be produced utilizing the equation:
m= edmod n.
Where C =cipher text
M=message text
E =public key
D =private key
Example for RSA algorithm:

Step 1: Select primes: p=17 &q=11
Step 2: Compute n = pq=17×11=187
Step 3: Compute ø(n)=(p–1)(q-1)=16×10=160
Step 4: Select e :gcd (e,160)=1; choose e=7
Step 5: Determine d: de=1 mod 160 and d < 160 Value is d=23 since 23×7=161= 10×160+1
Step 6: Publish public key KU={7,187}
Step 7: Keep secret private key KR={23,17,11}

V. CONCLUSION

RSA calculation has been actualized and investigations. In any case, the RSA likewise contains disadvantage like phony open key calculation, many-sided quality of key age, security needs, speed is low. In future work we can utilize the more drawn out scrambled key with symmetric figure encryption calculation key record. It is an amazing strategy to the symmetric key dispersion issue.
REFERENCES
1. ManpreetKaur,Rajbir Singh “Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing”, International Journal of Computer Applications (0975 – 8887) Volume 70– No.18, May 2013.
2. Parsikalpana,Sudhasingaraju” Data Security in Cloud Computing using RSA Algorithm” International Journal of Research in Computer and Communication technology,IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
3. Anjanachaudhary, ravinder Thakur, manishmann”, A review: data security approach in cloud computing by using RSA algorithm”, International Journal of Advance Research in Computer Science and Management Studies, volume 1,Issue 7, December 2013
4. SwapnilV.Khedkar , A.D.Gawande,” Data Partitioning Technique to Improve CloudData Storage Security”, (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3347-3350
5. Ms.ShubhraSaggar, Dr. R.K. Datta”An improved RSA Encryption Algorithm for Cloud Computing Environments: Two key GenerationEncryption (2KGEA)”ISSN (Online): 2279-0071