cloud encryption

Post on 21-Jan-2017

855 Views

Category:

Engineering

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Rituparna Nag

Monolithic Client-Server Web SOA Cloud Services

1970s 1980s 1990s 2000s 2009+

5th Generation of Computing

Common implies multi-tenancy, not single or isolated tenancy Location-independentOnlineUtility implies pay-for-use pricingDemand implies ~infinite, ~immediate, ~invisible scalability

Cloud Computing Deployment Models

Hybrid Cloud

Connectivity(Network Access)

SME

SME

SME

EnterpriseEnterprise

Public Cloud

Public Cloud

Private CloudPrivate Cloud

The Cloud Provider

The Cloud Provider

Architectural Layers of Cloud Computing

Software as a Service (SaaS)

Platform as a Service (PaaS)

Infrastructure as a Service (IaaS)

Pros and Cons

Security Issues

Encryption & Key Management

Storage

Internet

Encryption on Storage

Encryption on TransmissionKey Management Using security algorithm

Classification of Encryption Algorithms

Encryption Algorithms

Symmetric or Secret Key Encryption

Asymmetric or Public Key Encryption

DES

RSA

Symmetric Key Algorithm

Asymmetric Key Algorithm

Data Encryption Standard (DES)

Rivest Shamir Adleman Algorithm(RSA)

RSA CRYPTOSYSTEM WITH EXAMPLE SETUPStep 1: Choose two primes:- p=3 , q=11 [for encrypting small message]Step 2: n=p*q=3*11=33Step 3: phi or ɸ(n)=(p-1)(q-1)=(3-1)(11-1)=2*10=20Step 4: Choose e i.e., public exponent/encryption exponent e must 1) be an integer 2) not be a factor of n 3) 1<e<ɸ (n) Let, e=7Step 5: Calculate d i.e., secret exponent/decryption exponent (d*e)mod ɸ(n) = 1 (d*7)mod 20=1 => d=3KEYSPublic Key: KE=( n, e)=(91,7)Private Key: KD=d=3ENCRYPTIONLet’s encrypt “BE” where B=2 and E=5 alphabetically.1<M<n is a condition to encrypt messages within a range.So, the plaintext, M=25.Cipher text, C=M^e mod n= 25^7 mod 33=31DECRYPTIONM=C^d mod n= 31^3 mod 33=25 = “BE”.

RECENT SCHEMES OF CLOUD ENCRYPTION

1. Rashmi Nigoti et. al[1] have surveyed different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud and the benefits of cloud storage viz. easy access , scalability, cost efficiency, and high reliability of the data.

2. Brian Hay et. al [2] have focused on data authentication, data integrity, querying and outsourcing the encrypted data.

3. Ashalatha R [3] discussed in her paper about the significance of data security and the various existing security techniques for the cloud.

4. S.Monikandan et.al[4] proposed a new cloud cryptography technique . It conveys that since the user has no control over the data once their session is logged out, the encryption key acts as the primary authentication for the user. By applying this encryption algorithm, user ensures that the data is stored only on secured storage and it cannot be accessed by administrators or intruders.

5. Rajeev Bedi et.al[5] developed a retrieval system in which the data is retrieved by the user in encrypted form and is decrypted by the user at its own site using a public and private key encryption both the keys working at the user level.

CONCLUSION AND FUTURE SCOPESecurity is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. So in this presentation, I have discussed the popularly used symmetric and asymmetric algorithms of cloud encryption techniques.

The future will focusing on – More strong security algorithms and implement a better version of DES, RSA , etc. New security techniques need to be developed and older security techniques needed to be radically tweaked to be able to work with the clouds architecture. As the development of cloud computing technology is still under R&D, there will be more better understanding of the design challenges of cloud computing, and pave the way for further research in this area.

BIBLIOGRAPHY

[1] Rashmi Nigoti et al., “ A Survey of Cryptographic Algorithms for Cloud Computing” International Journal of Emerging Technologies in Computational and Applied Sciences,4(2), March-May 2013.[2] Brian Hay, Kara Nance, Matt Bishop, “Storm Clouds Rising: Security Challenges f for IaaS Cloud Computing” Proceedings of the 44th Hawaii International Conference on System Sciences -2011. [3] Ashalatha R,Faculty of Computer Science, Dayananda Sagar College of Engineering, Bangalore,” A Survey On Security As A Challenge In Cloud Computing” International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology (NCET-Tech), Volume 2, Issue 4, July 2012.[4] S. Monikandan et al., “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm” International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.[5] Rajeev Bedi et al., “Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing” Punjab Technical University, Beant College of Engineering and Technology,Gurdaspur, Punjab, India, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.

JOURNALS

BOOKS Ankit Fadia and Jaya Bhattacharjee’s “Encryption-

Protecting your standard” . William Stalling’s “Cryptography and Data Security” .

WEB http://en.wikipedia.org/wiki/Cloud_Security http://apprenda.com/library/paas/iaas-paas-saas-explain

ed-compared/ http://en.wikipedia.org/wiki/Cloud_Encryption_Algorit

hms

THANK YOU

top related