Performance Evaluation of Encryption Techniques and Uploading of ...

4 downloads 8152 Views 633KB Size Report
based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data. Keywords:-cloud computing ...
IEEE - 31661

Performance Evaluation of Encryption Techniques and Uploading of Encrypted Data in Cloud V.Sreenivas

Research Scholar, Dept of CSE K L University, India [email protected]

C.Narasimham

K. Subrahmanyam

[email protected]

[email protected]

Professor, Dept of CSE Professor, Dept of CSE Asist, Paritala India K L University, India

II.

Abstract Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data. Keywords:-cloud computing, Encryption, data, security. I.

INTRODUCTION

Cloud computing is the capture of computing services over the Internet. Cloud services allow folks and businesses to use software and hardware that are managed by third parties at remote location. Examples of cloud services include online file storage, social networking sites, mails, and online business applications [5]. The cloud computing representation allows access to in order and computer resources from anywhere that a network connection is available. Cloud computing provides a shared collection of possessions, including data storage space, networks, computer processing power, and specialize corporate and user applications.

P.Yellamma

Asst Prof, Dept of CSE Asist, Paritala, India [email protected]

TYPES OF CLOUD COMPUTING

Fig 1: Types of Cloud

A. Public Cloud Public cloud [6] is cloud service provided by a third party (vendor). They exist beyond the company firewall, and they are fully hosted and manage by the cloud provider. B. Private Cloud Private cloud [7] (also called internal cloud or corporative cloud) provides service within the endeavor. These clouds exist within the company firewall and they are managed by the enterprise. Private clouds offer many of the same reimbursement that public clouds do with one major difference. C. Hybrid Cloud Hybrid cloud [8] is a permutation of public and private clouds. These clouds would classically be created by the enterprise, and management farm

4th ICCCNT 2013 July 4-6, 2013, Tiruchengode, India

IEEE - 31661

duties would be split between the enterprise and public cloud contributor. III.

TYPES OF CLOUD SERVICES

However, the problem arises that, until in recent times, security was treated wholly as a technical problem – the system user was not factored into the equation. Users interact with security technology either passively or actively. For passive use beneath stand ability may be sufficient for users. For active use people require much more from their security solution: ease of use, memo ability, efficiency, effectiveness and satisfaction. Today there is an increasing acknowledgment that security issues are also fundamentally human computer interaction issues. Authentication is the process of determining whether a user should be allowed access to a particular system or resource. It is a critical area of security research and practice. Alphanumeric passwords are used widely for authentication. Yet traditional alphanumeric passwords have drawbacks from a usability viewpoint, and these usability problems tend to translate directly into security troubles. That is, users who fail to decide and handle passwords securely open holes that attackers can exploit.

A. Security Algorithms

Fig 2: Types of cloud services

A. Software as a Service (SaaS ) SaaS [7] is an application hosted on a remote server and accessed through the internet. In Saas an application is hosted by a service provider and then accessed via World Wide Web by a client.

B. Platform as a Service (PaaS) To follows the heels of SaaS, platform as a service (PaaS) [5] is another appliance delivery model. PaaS supplies all the capital required to build applications and services completely from the internet without having to download or install software.

C. Infrastructure as a Service (IaaS) This offers remote delivery of an entire computer infrastructure. Managed hosting and development environments are the services included in IaaS. IV.

IMPORTANCE OF SECURITY Because of increasing threats to networked computer systems, there is great need for security [1] innovations. Security practitioners and researchers have made strides in protecting systems and, correspondingly, individual users’ digital asset.

An encryption algorithm is a statistical procedure used to encrypt data. During the use of an algorithm and a key, in sequence is encoded into cipher text and requires the use of a key to transform the data back into its original form. Algorithms are an essential part of a technology to ensure effective and secure authentication, as well as to provide reliability and encryption.

B. Types of security Algorithms 1. 2. 3.

RSA SHA1 MD5

1. RSA RSA [1] security is so much depends on the difficulty of factoring large prime number. At this time (writing time, 2001) the calculation required to find the factor the value to break the key is slow, many cryptanalysts consider that linear attack and differential attack are difficult to applied in RSA, only mathematical attack and brute force are feasible, but the time needed to use these attacks are quite long, therefore they are considered as impractical. May be later in the future as computer speed increased, this encryption algorithm may consider insecure and unused, but don’t forget we can just simply increase the size of the key to prevent it from attacker. The common size for the key length now is 1024 bits for P and Q, therefore N is 2048 bits, if the implementation (the library) of RSA is fast enough, we can double the key size

4th ICCCNT 2013 July 4-6, 2013, Tiruchengode, India

IEEE - 31661

Output the concatenation (h0, h1, h2, h3, h4) which is the message digest.

. Pseudo code for RSA Algorithm 1.

Choosing two very large prime numbers p and q. 2. Compute their system modulus, n =p*q and the ‘totient’ function φ (n) = (p -1) (q -1). Note that the factors p and q remain secret and n is public. 3. Select the encryption key e at random, so that gcd (e, φ (n)) =1, where 1

Suggest Documents