Comparative Study of Cryptography for Cloud Computing for Data Security

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.

2019 ◽  
Vol 8 (4) ◽  
pp. 9758-9763

Now a days 60% of communication are done only through internet based in this circumstance data security is very important while we are communicating through any internet based networks like cloud, servers etc. With the help of some few sensors like temperature, alcohol or gas sensor data encrypted. In AES256 standard, the sensors convert the plain text into cipher text (which is not understandable) and it is uploaded to the cloud on the transmitter side. On the receiver side we can decode the data only with the help of AES256 key and hash code which are used on the transmitter side. In between this process any person is trying to hack the data he cannot get the original data because the data is in the form of cipher text format


2018 ◽  
Vol 7 (3.8) ◽  
pp. 141
Author(s):  
Miss. Rupali G. Dande ◽  
Prof. Dr. Amol D. Potgantwar

Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over the network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE. In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with the current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies. 


2021 ◽  
Vol 2083 (4) ◽  
pp. 042077
Author(s):  
Tongtong Xu ◽  
Lei Shi

Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has become an urgent problem to be solved. This paper studies the big data security privacy protection based on cloud computing platform. This paper starts from two aspects: implicit security mechanism and display security mechanism (encryption mechanism), so as to protect the security privacy of cloud big data platform in data storage and data computing processing.


2021 ◽  
Author(s):  
Amrutha S ◽  
MAHESH A S

Abstract An outbreak of corona virus caused by a novel virus called SARS-CoV-2 occurred at the end of 2019. The unexpected outbreak and unchecked global spread of COVID19 indicate that the current global healthcare networks have limitations in addressing the crises for public safety. In this paper, we have studied to secure the COVID-19 patients ’ data. Data security and Storage Management becomes the most promising task in it, to manage it we use cloud computing. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. a novel secure Online/offline Decentralized Attribute Based Encryption for cloud. The proposed scheme reduces the online computation burden for data owners by completing the preprocessing computation as much as during the offline phase. The proposed scheme eliminates a major of computation overhead on user side by migrating the partial decryption computation to the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.


2018 ◽  
Vol 5 (4) ◽  
pp. 389
Author(s):  
Dedi Darwis ◽  
Rizky Prabowo ◽  
Nurul Hotimah

<p class="Abstrak">Informasi merupakan hal yang sangat berharga. Saat informasi atau data jatuh ke tangan yang tidak bertanggung jawab, maka akan menjadi bencana bagi pemiliknya. Berbagai macam cara dilakukan untuk melindungi data atau informasi. Teknik pengamanan data atau informasi telah berkembang dengan sangat pesat. Proses pengamanan pesan yang banyak beredar diataranya dengan menggunakan kriptografi dan steganografi. Dua teknik ini merupakan teknik yang berbeda maksud dan tujuannya. Kriptografi bertujuan untuk mengacak pesan supaya sulit dibaca oleh pihak yang tidak berkepentingan. Sedangakan steganografi bertujuan untuk menyembunyikan pesan.</p><p class="Abstrak">Pada penelitian ini akan menggabungkan teknik kriptografi metode AES dengan teknik steganografi metode <em>gifsuffle</em>. Teknik kriptografi metode AES akan digunakan untuk merubah data atau informasi yang berbentuk <em>plain</em>-<em>text</em> menjadi <em>cipher</em>-<em>text</em>. Selanjutnya <em>cipher</em>-<em>text</em> tesebut akan disembunyikan ke dalam gambar berformat gif dengan metode steganografi <em>gifsuffle</em>. Metode <em>gifsuffle</em>  akan dikombinasikan dengan algoritma huffman untuk memperbanyak pesan yang dikirimkan.</p><p class="Abstrak">Penelitian ini berhasil menggabungkan metode kriptografi AES dengan metode steganografi <em>gifsuffle</em>. Hasil pengujian <em>imperceptibility</em> menunjukkan 85% responden tidak dapat membedakan gambar asli dengan gambar yang telah disisipi pesan. Pemisahan gambar dengan pesan dapat dilakukan dengan akurasi 100% dan proses dekripsi pesan cipher-text menjadi plain-text juga dapat dilakukan dengan sempurna.</p><p class="Abstrak"> </p><p class="Judul2"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Information is a very valuable thing. When information or data falls into irresponsible hands, it will be disastrous for the owner. A variety of ways are done to protect data or information. Data security techniques have grown very rapidly. The process of securing a message that many circulated diataranya by using cryptography and steganography. These two techniques are different techniques of purpose and purpose. Cryptography aims to randomize messages to be difficult to read by unauthorized parties. While steganografi aims to hide the message.</em></p><p class="Abstract"><em>In this research combine AES cryptographic method and with gifsuffle steganography method. AES method will be used to convert data or information in the plain-text form into cipher-text form. Furthermore, the cipher-text will be hidden into gif-format images with gifsuffle steganography method. The gifsuffle method will be combined with the huffman algorithm to multiply the transmitted data.</em></p><p class="Abstract"><em>This research successfully combined AES cryptography method with gifsuffle steganography method. Imperceptibility test results show 85% of respondents can not distinguish original images with images that have been inserted data. Separation of images with data can be well done and the accuration reach 100%. Process of decrypting cipher-text into plain-text can also be done perfectly.</em></p>


2018 ◽  
Vol 7 (3) ◽  
pp. 1668
Author(s):  
Rupali G. Dande ◽  
Dr Amol D. Potgantwar ◽  
Dr Amol D. Potgantwar

Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE.  In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.  


2018 ◽  
Vol 7 (2.20) ◽  
pp. 150
Author(s):  
L Archana ◽  
K P. K. Devan ◽  
P Harikumar

Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.  


2020 ◽  
Author(s):  
Rosheen Qazi ◽  
Imran A. Khan

Encryption helps in transmitting sensitive data over an insecure channel without any danger of data being lost or being manipulated by some unauthorized entity. Different Encryption schemes have been applied for Data security in a different environment. Many cryptosystems worked during different eras and evolved accordingly with time. This paper mainly focuses on asymmetric encryption which is also known as Public key encryption scheme or Holomorphic encryption. However, due to large key size asymmetric encryption is mostly used for Key exchange rather than data Encryption. Nowadays, Data security is the main issue in large data centers and Cloud computing. This paper uses Elliptic Curve Cryptography to encrypt data in the cloud environment because the size of the key used in Elliptic Curve Cryptography is very small. Due to the small key size of Elliptic Curve, computational power is reduced and this results into least energy consumption. This paper shows that elliptic curve cryptography is fast and more efficient for data protection in a cloud computing environment and reduces the computational power and also increases the efficiency.


2019 ◽  
Vol 8 (2) ◽  
pp. 2271-2273

Cloud computing is come out as computing network throughout web. Cloud information pamper accumulating of the data within the cloud additionally has sharing qualifications amid manifold clients. Since malfunction of human being or hardware and constant software package blunder, cloud information is interrelated to information veracity. Numerous systems have been anticipated in order to tolerate equally the data proprietors as well as the community auditors to review cloud data truthfulness unmistakably devoid of salvage the intact data commencing the cloud servers. A third party inspector can carry out reliability inspection and also the distinctiveness of the signer on collective information which is held in reserve private from them. Throughout this work, exploration for auditing the truthfulness of public information surrounded by the cloud with imaginative client deletion whereas immobile protecting distinctiveness seclusion. This work have predisposition to additionally improve presented method; formerly any patron revolutionize the consequence from table then it have a predisposition to scrutiny that is import and repeatedly refurbish inventive value.


Sign in / Sign up

Export Citation Format

Share Document