international journal of pure and applied mathematics volume … · 2018-03-15 · done by owner...
TRANSCRIPT
![Page 1: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/1.jpg)
SECURED BLENDED APPROACH FOR CRYPTOGRAPHIC ALGORITHM IN
CLOUD COMPUTING
1Sumit Chaudhary,
2N. K. Joshi
1Research Scholar, Computer Science & Engineering
Uttaranchal University, Dehradun, India 2Vice Chancellor, Uttaranchal University, Dehradun, India
Abstract: The Network and data security plays a vital
role on the network. Security of data is the main concern
when data transmission takes place in the network. This
paper describes the cloud security algorithm to secure the
data at the data center. Blend technique is the advance
techniques to secure the data. In this paper combination
of AES, RSA and digital signature has been shown. Here
private key generation is done using the two different
algorithm AES and RSA where AES is symmetric and
RSA is asymmetric cryptographic algorithm. After
private key generation, that key will apply to digital
signature which provide data authentication in the
system. For verification we are using the 1024 bits public
key of RSA algorithm. Also we have analyzed the
performance of the same algorithm in basis of time
because it takes the less time as compare to the existing
hybrid algorithm.
Index Terms: Hybrid Technique, Cloud computing,
Data Security, Key Generation
1. Introduction
The term “Cloud Computing” is latest research topic in IT
sector. It is difficult to explain definition of cloud
computing. As per the US National Institute of Standards
and Technology(NIST)[3] cloud computing as follows:’
Cloud commuting is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources(e.g, networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort
or service provider interaction’. Cloud is an internet based
environment which provides services on based of
hardware, software.
Recently, the usage of cloud computing is increases
rapidly due to easy accessibility. It allows people to do
any things at any time and any were without buying and
building IT infrastructure or to understand and underlying
technology. The numbers of people can easily connected
with cloud and shared their data over internet also some
Individuals and small businesses can shed the burden of
basic good security practices such as breaking up critical
data, malwares checking [33]. So they demands to cloud
providers to deliver these services which needs full trust
to service providers. At that time user need to manage and
implement the data security of own data. Thus, the uses of
services from third party and at the same time providing
security to that data is biggest challenge in cloud
computing.
As far as security is a concern, cryptography is one
way to protect our data before outsourcing. Cryptography
is process which convert original data into encrypted form
using different cryptographic algorithm. Many symmetric
and asymmetric cryptographic techniques are available
like Creaser cipher, hill cipher, playfair cipher, DES,
AES, and RSA. Etc. Hybrid cryptographic techniques
(combination of symmetric and asymmetric encryption
algorithm) increase more data security as compare to
basic cryptographic algorithm. In this paper we have
proposed hybrid cryptographic techniques using
symmetric cipher AEs and asymmetric cipher RSA.
The basic idea behind hybrid techniques is improving
efficiency of the existing algorithm. Many hybrid
techniques are used to encrypt the data some of them are
explain below
A. Dual RSA
A new public key cryptography algorithm, It is also called
RSA-CRT, because it is used Chinese Remainder
Theorem, CRT for its Decryption [2]. Dual-RSA has been
developed for better performance in terms of computation
costs and memory storage requirements. RSA takes one
block at a time to encrypt and decrypt the data. But Dual
RSA takes two blocks during encryption and decryption
[12]. Encryption time of Dual RSA is more as compare to
International Journal of Pure and Applied MathematicsVolume 118 No. 20 2018, 297-304ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu
297
![Page 2: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/2.jpg)
decryption of two blocks. Thus Dual-RSA increases the
performance as compare to RSA.
B. AES-RSA
Symmetric algorithms are faster to encrypt data as
compare to asymmetric techniques. RSA (Asymmetric
algorithm) takes more processing time to encrypt data due
to longest key size. A new symmetric and asymmetric
hybrid model has been developed to increase the level of
security. In AES-RSA [5] hybrid techniques, AEs first
generate 256-bit key. That 256-bit key are expanded to
1024-bit key and used in RSA as private key.
C. AES-ECC
This proposed model is combination of AES and EC
(Elliptic curve) cryptography. Initial encryption of
original data is done by AES algorithm when user sends
their data. In this process dynamic security become an
issue. To become data more secure, key which is
generated by AES key generation will again encrypted by
ECC. During above process one secure dynamic key is
generated and send it to receiver to decrypt the data at
receiver side.
2. Literature Review
Dimitrios et al. studies cloud security in depth in 2012 [6].
The authors proposed security solution by using trusted
third party. The solution is based on Single-Sign-On
(SSO) mechanisms and the lightweight directory access
protocol (LDAP) [7] that is cryptography specifically in
public key infrastructure. This is to make sure the security
proposed solution consists of using cryptography to
ensure confidentiality and integrity of involved data.
However, it does not recognize which encryption
algorithms used. But, this solution does not recognize the
encryption algorithm to be used.
Cunsolo et al. in 2009 [8] came up with mechanism
that protected data in distributed systems such as grid,
cloud, autonomic, etc. In this paper author implement the
techniques using symmetric and asymmetric algorithm.
The limitation of this technique is that, the concept of
sharing resources is contradicted because data access was
done by owner only in the cloud environment.
Hashizume et al. [9], classified different cloud service
models (SaaS, PaaS and IaaS) to solved security issues.
The relation between cloud layers and the common threats
shows the main vulnerabilities in cloud computing.
Solution of splitting some available countermeasures is a
technical implementation, which is not covered in this
study.
Rahmani et al. [10], they implemented new technique
Encryption as a Service (EaaS) as a solution based on
XaaS concept for cryptography in cloud computing. The
security risks and the inefficiency of cloud provider’s
encryption and of client-side encryption can be prevented
by this solution respectively. Moreover, this solution does
not show a comparative study of cryptographic algorithms
that can be integrated.
Performaces of cryptographic algorithms in cloud
platform are evaluated using symmetric and asymmetric
algorithms by the Mohammad et al. [11]. Different
encryption techniques which are based on key size, the
performance and the size of the output file are discussed
in this paper. Distribution of encryption keys in a secure
way is not proposed, but it proposed AES algorithm to
encrypt data for more security.
In [6 paper, secure cloud architecture using
cryptography was first proposed by this D. Zissis. For
cloud storage they proposed to use cryptographic
algorithms [10] [12]. But, they do not specify which
algorithm is recommended to encrypt data and how to
distribute cryptographic keys while maintaining adequacy
with cloud characteristics. So these solutions remain
incomplete.
In [1] Belguith proposed a new lightweight
cryptographic algorithm which is combination of AES as
public key algorithm to encrypt data and RSA as public
private key algorithm to distribute keys. During
conserving the rights of users to access data by a secured
and authorized way this combination helps to benefit from
the efficient security of asymmetric encryption and the
rapid performance of symmetric encryption.
Various encryption algorithms hide a sequence of bits
into random number generator function from other plain
text message. It is an encryption algorithm which can be
used for secure data over communication. As the name
suggests its basic functions, which include insertion and
hiding of plain text and the term hybrid is used as it has
features of data hiding techniques. Ramaraj, Karthikeyan
and Hemalatha (2009), proposed a encryption technique
using hybrid method for security of online transaction.
The combination of symmetric as well as asymmetric
cryptographic methods is known as the hybrid encryption
technique. This hybrid method provides all the main three
cryptographic security properties these are, integrity,
confidentiality and authentication. With the combination
of symmetric cipher and public key which is RSA with
some hash function a new design protocol is proposed.
Encryption can be converted in some form that will make
it difficult to read and make it more secure. In this method
some substitution is done with each letter of plaintext
replaced by fixed count of alphabets. As Julius Caesar
used this method for communication with his generals so
it was named after him. The final result can be a data
International Journal of Pure and Applied Mathematics Special Issue
298
![Page 3: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/3.jpg)
which now decrypted again from its encryption form. So
we can say that Caesar cipher algorithm can be used to
secure data using hybrid encryption techniques.
Kuppuswamy and Chandrasekar’s (2011) describe one
new algorithm which deals with linear block cipher. This
concept is completely based on modular 37 which mean
alphabets and numerals both can be used. Whereas
previous algorithms based on only modular 26 (only
alphabets)
Kuppuswamy and Al-Khalidi (2012) proposed that
providing security in the network with the help of better
encryption techniques by implementing them in simple
and powerful method should be the research main goal.
This Paper proposed a technique using modular 37 which
selects any number randomly and after that its inverse is
calculated by using some modular 37 technique and we
should done that distribution of the symmetric key in a
very secured way. We have to also calculate the
effectiveness of the new algorithm by comparing it with
other symmetric algorithm which already exists.
Sandeep K Sood [13] proposed that in information
technology which has some major features like
performance, accessibility, low cost etc used in cloud.
Using this method we can increase the new capabilities by
not investing much in stuffs like infrastructure, having
new personnel and buying or licensing some new
software from the market. This helps in providing huge
amount of data storage and fast processing for its
customers over the network. As it can send large data,
database and applications to the center called Cloud.
Large companies want to deploy cloud in their business as
it provides huge variety of luxuries. Security of data can
be the major challenge in the area of cloud that works as a
challenge while implementing cloud. In this paper we
have proposed a frame work which comprises of different
techniques with different methods or procedures and all
these help in securing our database at all the stages,
starting from its master to cloud’s end user.
3. Proposed Work
The Proposed technique uses RSA and AES for the
encryption and decryption. RSA uses two keys private
key and public key through which a digital signature is
also produced. On the other hand DES with the help of a
key generation algorithm uses 256 bit keys and also apply
a for loop it generates a 1024 bit private key. Now the
private key of both RSA as well as DES together passes
through XOR and we got output B.
Now for digital signature generation the output B
which is our private key is converted from bit to byte and
a message on which hash function is applied and then
they both i.e. private key in byte and message with hash
function are encrypted and finally digital signature is
generated.
Third and final step is the verification phase in which
hash code is verified by applying decryption on digital
signature and in the end output is compared with the
previous result i.e. C.
Figure 1. Diagram of private key generation
process
Figure 2. Diagram of Digital Signature
generation process
Figure 3. Diagram of Hash code verification process
International Journal of Pure and Applied Mathematics Special Issue
299
![Page 4: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/4.jpg)
4. Result
The result for each can be seen from figure 4 to figure 11
and from all the results we can see private key is the
combination of AES and RSA private key (1024 bit) and
applied in digital generation scheme in the form of bytes.
Figure 10 shows the Signature verification, if the
signature will be same then signature will be verified and
in other case signature will not be verified. With the
combination of ASE, RSA and Digital Signature the
function is nonlinear and more Avalanche effect is
generated.
AES private key generation:
Figure 4. AES private key generation RSA private key
& public key generation:
Figure 5. RSA private key & public key generation
RSA & AES Private Key X-OR Operation:
Figure 6. RSA & AES Private Key X-OR
Operation Digital Signature Private Key
Generation:
Figure 7. Digital Signature Private Key Generation
Digital Signature Public Key Generation:
Figure 8. Digital Signature Public Key Generation
Digital Signature Message:
International Journal of Pure and Applied Mathematics Special Issue
300
![Page 5: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/5.jpg)
Figure 9. Digital Signature Message Digital
Signature Verify Message:
Figure 10. Digital Signature Verify Message
Figure 11. Comparison between different cryptographic
and hybrid techniques
5. Conclusion
Cloud security is the latest stream in the field of computer
technology. Many researchers are working on the up
gradation of security technique and every day new
algorithm is coming into the picture. Hybrid techniques
are the best solution to het the more security. In hybrid
technique the combination of the RSA and AES is the
best example with digital signature. Private key is the
combination of AES and RSA (1024 bit) and we are using
RSA public key for the digital signature verification.
Finally the result shows that hybrid technique takes less
time and gives more security.
References
[1] Belguith, Sana, Abderrazak Jemai, and Rabah
Attia. "Enhancing Data Security in Cloud Computing
Using a Lightweight Cryptographic Algorithm." The
Eleventh International Conference On Autonomic and
Systems. 2015.
[2] Subasree, S., and N. K. Sakthivel. "Design of a
new security protocol using hybrid cryptography
algorithms." IJRRAS 2.2 (2010): 95-103.
[3] P. Mell and T. Grance, “The NIST Definition of
Cloud Computing”, National Institute of Standards and
Technology, Information Technology Laboratory, 2011.
[4] Somani, Uma, Kanika Lakhani, and Manish
Mundra. "Implementing digital signature with RSA
encryption algorithm to enhance the Data Security of
cloud in Cloud Computing." Parallel Distributed and
Grid Computing (PDGC), 2010 1st International
Conference on. IEEE, 2010.
[5] Al Hasib, Abdullah, and Abul Ahsan Md
Mahmudul Haque. "A comparative study of the
performance and security issues of AES and RSA
cryptography." Convergence and Hybrid Information
Technology, 2008. ICCIT'08. Third International
Conference on. Vol. 2. IEEE, 2008.
[6] D. Zissis and D. Lekkas. “Addressing cloud
computing security issues”. Future Generation Computer
Systems, 28(3), 2012, pp. 583-592
[7] “Directories and Public –Key Infrastructure (PKI)”,
VeriSign, 2004.
[8] V. D. Cunsolo, S. Distefano, A. Puliafito, and M.
Scarpa, “Achieving information security in network
computing systems”, Eighth IEEE International
Conference on Dependable, Autonomic and Secure
Computing (DASC'09.), 2009, pp. 71-77.
International Journal of Pure and Applied Mathematics Special Issue
301
![Page 6: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/6.jpg)
[9] K. Hashizume, D. G. Rosado, E. Fernández-
Medina, and E. B. Fernandez, “An analysis of security
issues for cloud computing”. Journal of Internet Services
and Applications, vol. 4, 2013, pp. 1-13.
[10] H. Rahmani, E. Sundararajan, Z. M. Ali, and A.
M. Zin, “Encryption as a Service (EaaS) as a Solution for
Cryptography in Cloud”. Procedia Technology, vol. 11,
2013, pp. 1202-1210.
[11] J. Mohammad, K. Omer, S. Abbas, E. S. M. El-
Horbaty, and A. B. M Salem, “A comparative study
between modern encryption algorithms based on cloud
computing environment”. 8th International Conference
for Internet Technology and Secured Transactions
(ICITST’13), IEEE, 2013, pp. 531-535.
[12] Singh, Gurpreet. "Modified Vigenere Encryption
Algorithm and Its Hybrid Implementation with Base64
and AES." Advanced Computing, Networking and
Security (ADCONS), 2013 2nd International Conference
on. IEEE, 2013.
[13] Sandeep K. Sood “A combined approach to
ensure data security in cloud computing” Journal of
Network and Computer Applications, vol. 35 no. 6, 2012,
pp. 1831–1838.
[14] Qin Liu, Guojun Wang, Jie Wu, Secure and
privacy preserving keyword searching for cloud storage
services, Journal of Network and Computer Applications,
(2012), pp. 927–933.
[15] S. Shakena Grace, M.R. Sumalatha, “SCA – An
Energy Efficient Transmission In Sensor Cloud”, 2014
International Conference on Recent Trends in
Information Technology, IEEE 2014.
[16] Sandeep K. Sood “A combined approach to
ensure data security in cloud computing” Journal of
Network and Computer Applications, vol. 35 no. 6, 2012,
pp. 1831–1838.
[17] ChehalRitika, Singh Kuldeep. “Efficiency and
Security of Data with Symmetric Encryption
Algorithms”. International Journal of Advanced Research
in Computer Science and Software Engineering, ISSN:
2277 128X , Volume 2, Issue 8, August 2012, pp. 1
[18] Satish s Hottin, Mr. S.Pradeep “Efficient Secure
Date Sharing In Cloud Storage Using Key-Aggregate
Cryptosystems” International Journal of Engineering
Development and Research, Volume 3, Issue 2, ISSN:
2321-9939, 2015, pp.38-44.
[19] Shucheng Yu Cong Wang ;KuiRen ; Wenjing
Lou, Achieving Secure, Scalable, and Fine-grained Data
Access Control in Cloud Computing, INFOCOM, 2010
Proceedings IEEE.
[20] KalpanaParsi, SingarajuSudha. ”Data Security in
Cloud Computing using RSA Algorithm”. International
Journal of Research in Computer and Communication
technology, IJRCCT, ISSN 2278- 5841, Vol 1, Issue 4,
September 2012. pp. 145.
[21] Sood S K, Sarje A K, Singh K. “A secure
dynamic identity based authentication protocol for multi-
server architecture”. Journal of Network and Computer
Applications 2011, 34(2), pp. 609–18.
[22] N. Shimbre and P. P. Deshpande, " Enhancing
Distributed Data Storage Security for Cloud Computing
Using TPA and AES algorithm," IEEE, pp. 35-39, 2015.
[23] W. Wang, Z. Li, R. Owens, B. Bhargava, Secure
and efficient access to outsourced data, in: Proceedings
of the 2009 ACM workshop on Cloud computing
security, CCSW ’09, ACM, New York, NY, USA, 2009,
pp. 55–66.
[24] Wang C, Cao N, Li J, Ren K, Lou W. “Secure
ranked keyword search over encrypted cloud data”.
Journal of the ACM 2010, 43(3), pp. 431–73.
[25] Jens-Matthias Bohli, Nils Gruschka, Meiko
Jensen, Member, IEEE, “Security and Privacy-Enhancing
Multicloud Architectures”, IEEE transactions on
dependable and secure computing, vol. 10, no. 4,
July/August 2013.
[26] Jin Li, Qian Wang, Cong Wang, Ning Cao,
KuiRen, and Wenjing Lou , “Fuzzy Keyword Search
over Encrypted Data in Cloud Computing”, Feb 2012.
[27] Miao Zhou, University of Wollongong ,“Data
Security and Integrity in cloud computing”, School of
Computer Science and Software Engineering, October
2013.
[28] Miao Zhou, YiMu, Willy Susilo, JunYan and
Liju Dong, “Privacy enhanced data outsourcing in the
cloud”Journal of Network and Computer Applications,
vol.35 no.4, 2012, pp.1367–1373.
[29] Miao Zhou, YiMu, Willy Susilo, JunYan and
Liju Dong, “Privacy preserved access control for cloud
computing”, In IEEE Trustcom, 2011, pp. 83-90.
[30] Ms. VaishnaviMoorthy, Dr. S. Sivasubramaniam
, “Implementing Remote Data Integrity Checking
Protocol for Secured Storage Services In Cloud
Computing”, IOSR Journal of Engineering Mar. 2012,
Vol. 2(3).
[31] PrabhjotKaur, Pankaj Deep Kaur, “Energy
Efficient Resource Allocation for Heterogeneous Cloud
Workloads”, 2nd International Conference on Computing
International Journal of Pure and Applied Mathematics Special Issue
302
![Page 7: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/7.jpg)
for Sustainable Global Development (INDIACom), IEEE
2015, pp.1319-1322.
[32] Prasad P, Ojha B, Shahi RR, LalR, “3-
dimensional security in cloud computing”. Computer
Research and Development (ICCRD) 2011; 3, pp. 198–
208.
[33] M. EZZARII, H. . E. GHAZI, , H. ELGHAZI
and T. SADIKI, "Performance Analysis of a Two Stage
Security Approach in Cloud Computing," IEEE, 2015.
[34] Boyd, Colin. "Cryptography in the cloud:
advances and challenges." Journal of information and
communication convergence engineering 11.1 (2013):
17-23.
[35] M. Rajesh, Manikanthan, “ANNOYED REALM
OUTLOOK TAXONOMY USING TWIN TRANSFER
LEARNING”, International Journal of Pure and Applied
Mathematics, ISSN NO:1314-3395, Vol-116, No. 21, Oct
2017.
[36] S.V.Manikanthan and K.Baskaran “Low Cost
VLSI Design Implementation of Sorting Network for
ACSFD in Wireless Sensor Network”, CiiT International
Journal of Programmable Device Circuits and Systems,
Print: ISSN 0974 – 973X & Online: ISSN 0974 –
9624, Issue: November 2011, PDCS112011008.
[37] S.V.Manikanthan, D.Sugandhi, “ Interference
Alignment Techniques For Mimo Multicell Based On
Relay Interference Broadcast Channel ” International
Journal of Emerging Technology in Computer Science &
Electronics (IJETCSE) ISSN: 0976-1353 Volume- 7,
Issue 1 –MARCH 2014.
[38] T. Padmapriya and V. Saminadan, “Distributed
Load Balancing for Multiuser Multi-class Traffic in
MIMO LTE-Advanced Networks”, Research Journal of
Applied Sciences, Engineering and Technology
(RJASET) - Maxwell Scientific Organization , ISSN:
2040-7459; e-ISSN: 2040-7467, vol.12, no.8, pp:813-
822, April 2016.
[39] R. Jeevidha, V. Sowmiya , K. Kiruthiga & R.
Priya, “Collabration Complexity Reducing Strategy In
Cloud Computing”, International Innovative Research
Journal of Engineering and Technology ISSN NO: 2456-
1983.Volume 2, Issue 4 June 2017. 124-128.
International Journal of Pure and Applied Mathematics Special Issue
303
![Page 8: International Journal of Pure and Applied Mathematics Volume … · 2018-03-15 · done by owner only in the cloud environment. Hashizume et al. [9], classified different cl oud service](https://reader034.vdocument.in/reader034/viewer/2022042220/5ec6483638fdfc0f933d2986/html5/thumbnails/8.jpg)
304