0 ratings0% found this document useful (0 votes) 81 views4 pagesGooglescolar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Parsi Kalpana ,ct al, International Journal of Research in Computer and Communication technology,
IJRCCT, ISSN_ 2278-5841, Vol 1, Issue 4, September 2012.
(J
Tne Laer eC omc KU)
|JRCCT Computer & Communication Technology
Data Security in Cloud Computing using RSA Algorithm
Parsi Kalpana’
Asst Professor
Department of CA
‘Sreenidhi Institute of Science and Technology
Sudha Singaraju”
Asst Professor
Department of CA
Sreenidhi Institute of Science and Technology
sudhas@ereenidn! edu. in
Abstract— Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to
reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology which is offering
the services to its users on demand over the internet. Since Cloud Computing stores the data and disseminated resources in
the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments.
Even though the Cloud Computing is promising and efficient, there are many challenges for data security as there is no
vicinity of the data for the Cloud user. To ensure the security of data, we proposed a method by implementing RSA
algorithm.
Keywords— Cloud Computing, Data Security, RSA algorithm, Encryption, Decryption.
I. Intropuctiox
Cloud Computing is the key driving force in many small,
‘medium and large sized companies and as many cloud users
seck the services of cloud computing, the major concern is the
security of their data in the cloud, Securing data is always of
vital importance and because of the critical nature of cloud
computing and the large amounts of complex data it carries,
the need is even more important, Hence forth, concerns
regarding data privacy and security are proving to be a barrier
to the broader uptake of cloud computing services.
Every cloud service(s) secker either an individual or a
company should ask the right questions to the cloud provider
before hosting their data or applications on the cloud.
Prospective cloud providers should let you know; Are they
financially sound? Do they have good Security policies and
procedures in place? Is the infrastructure meant to host your
data shared with lots of other users, or will it be segregated by
virtualization?
‘As many companies move their data to the cloud the data
undergoes many changes and there are many challenges to
overcome. To be effective, cloud data security depends on
more than simply applying appropriate data security
procedures and countermeasures. Computer based security
‘measures mostly capitalizes on user authorization and
authentication.
Il, DATA SECURITY ISSUES IN THE CLOUD
Privacy and Confidentiality:
‘Once the client host data to the cloud there should be some
‘guarantee that access 10 that data will only be limited to the
authorized access. Inappropriate access to customer sensitive
data by cloud personnel is another risk that can pose potential
threat to cloud data. Assurances should be provided 10 the
clients and proper practices and privacy policies and
procedures should be in place to assure the cloud users of the
data safety.
‘The cloud seeker should be assured that data hosted on the
cloud will be confidential,
Data integrity:
With providing the security of data, cloud service providers
should implement mechanisms to ensure data integrity and be
able to tell what happened to a certain dataset and at what
point. The cloud provider should make the client aware of
‘what particular data is hosted on the cloud, the origin and the
integrity mechanisms putin place.
143Parsi Kalpana ,ct al, International Journal of Research in Computer and Communication technology,
URCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
For compliance purposes, it may be necessary to have exact
records as to what data was placed in a public cloud, when it
‘occurred, what virtual memories (VMs) and storage it resided
fon, and where it was processed. When such data integrity
requirements exists, that the origin and custody of data or
information must be maintained in order to prevent tampering
for to prevent the exposure of data beyond the agreed
territories (either between different servers or different
networks),
Data location and Relocation:
Cloud Computing offers a high degree of data mobility.
Consumers do not always know the location of their dats
However, when an enterprise has some sensitive data that is
kept on a storage device in the Cloud, they may want to know
the location of it. They may also wish to specify a preferred
location (e.g. data to be kept in India). This, then, requires a
contractual agreement, between the Cloud provider and the
consumer that data should stay in a particular location or
reside on a given known server.. Also, cloud providers should
take responsibility to ensure the security of systems (including
data) and provide robust authentication to safeguard
‘customers’ information.
Another issue is the movement of data from one location to,
another, Data is initially stored at an appropriate location
decide by the Cloud provider. However, it is often moved
from one place to another. Cloud providers have contracts
‘with each other and they use each others’ resources.
Data Availability
Customer data is normally stored in chunk on different
servers often residing in different locations or in different
Clouds. In this case, data availability becomes a major
legitimate issue as the availability of uninterruptible and
seamless provision becomes relatively difficult.
Storage, Backup and Recovery:
‘When you decide to move your data to the cloud the cloud
provider should ensure adequate data resilience storage
systems. At a minimum they should be able to provide RAID
(Redundant Array of Independent Disks) storage systems
although most cloud providers will store the data in multiple
‘copies across many independent servers.
In addition to that, most cloud providers should be able to
provide options on backup services which are certainly
important for those businesses that run cloud based
applications so that in the event of a serious hardware failure
they can roll back to an earlier state,
TIL, Data Security
Data confidentiality and auditability topped the list of
primary obstacles for the use of cloud computing technologies
in their organizations, according to a recent survey of over
1100 Indian Business Technology professionals (Fig.1).
Fig 1.Data Ssourityis Top Adoption Obstacle for Cloud in India
‘The survey conducted by Saltmarch Intelligence in the third
quarter of this year measured perceptions of Business
technology professionals including their important challenges
{in adopting Cloud, the drivers, how their organization's plan to
use Cloud, the different stages of adoption, and the cloud
platforms, applications, clients, infrastructure and storage
used.
Financial savings, agility and elasticity, all enabled through
cloud technology, are crucial in a fast paced business world.
‘At the same time security incidents in the Cloud have made
clear that this new promising technology comes. with
complexity and security and privacy challenges,
"While Data confidentiality and auditability (24.5%)
topped the list of primary obstacles for the use of cloud
computing technologies, performance unpredictability
20.1%) appeared to be another Key factor dampening,
adoption levels”, Data transfer bottlenecks (17.5%) and data,
lock-in (14.3%) were next on the list of factors as reported by
respondents
Information is produced at a rapid rate and more and more
openly shared through new and agile collaboration channels
that are no longer under our control."
Hence Security of data has become a major concern. When
data mobility is at @ high level then the risks and issues
increase many folds especially when data is transferred 10
another country with different regulatory framework. High
levels of data relocation have negative implications for data
security and data protection as well as data availability,
‘Thus the main concer with reference to security of data
residing in the Cloud is: how to ensure security of data that is
at rest, Although, consumers know the location of data and
there in no data mobility, there are questions relating to its
security and confidentiality of i.
144Parsi Kalpana ,ct al, International Journal of Research in Computer and Communication technology,
IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
‘No doubt the Cloud Computing area has become larger
because of its broad network access and flexibility. But
reliability in terms of a safe and secure environment for the
personal data and info of the user is still required.
TV. PROPOSED WORK
RSA is widely used Public-Key algorithm. RSA stands for
Ron Rivest, Adi Shamir and Len Adleman, who first publicly
described it in 1977. In our proposed work, we are using RSA
algorithm to encrypt the data to provide security so that only
the concerned user can access it. By securing the data, we are
not allowing unauthorized access to it,
User data is encrypted first and then it is stored in the
Cloud. When required, user places a request for the data for
the Cloud provider, Cloud provider authenticates the user and
delivers the data,
RSA is a block cipher, in which every message is mapped
to an integer. RSA consists of Public-Key and Private-Key. In
our Cloud environment, Pubie-Key is known to all, whereas
Private-Key is known only to the user who originally owns the
data. Thus, encryption is done by the Cloud service provider
and decryption is done by the Cloud user or consumer. Once
the data is encrypted with the Public-Key, it can be decrypted
with the corresponding Private-Key only.
RSA algorithm involves three steps:
1. Key Generation
2. Bneryption
3. Decryption
Key Generation
Before the data is encrypted, Key generation should be
done. This process is done between the Cloud service provider
and the user.
Steps:
I. Choose two distinet prime numbers a and b. For security
‘purposes, the integers a and b should be chosen at random
and should be of similar bit length,
2. Compute n=a *b.
3. Compute Euler’stotient function, @(n) = (2-1) * (b-1)
4. Chose an integer e, such that I< e < O(n) and greatest
common divisor of © , @(n) is 1. Now ¢ is released as
Public-Key exponent.
5, Now determine d as follows: d
multplicate inverse of e mod ®(n).
6, d is kept as Private-Key component,
so that d * e~ I mod ®(n).
7. The Public-Key consists of modulus n and the public
exponent c i, (€,n).
8, The Private-Key consists of modulus n and the private
exponent d, which must be kept secret ie, (, n,
Encryption:
el(mod O(n) ie, d is
Encryption is the process of converting original plain text
(data) into ciphertext (data).
Steps:
1. Cloud service provider should give of transmit the Publie-
Key (n, e) to the user who want to store the data with him or
her.
2. User data is now mapped to an integer by using an agreed
upon reversible protocol, known as padding scheme.
3. Data is encrypted and the resultant cipher text(data) C is,
C= m' (mod n).
4, This cipher text or encrypted data is now stored with the
Cloud service provider.
Decryption:
Decryption is the process of converting the cipher
text(data) to the original plain text(data),
Steps:
1. The cloud user requests the Cloud service provider for the
data,
2. Cloud service provider verify’s the authenticity of the user
and gives the encrypted data i.e, C.
3. The Cloud user then decrypts the data by computing,
m= C" (mod n).
4. Once m is obtained, the user can get back the original data
by reversing the padding scheme.
V. EXPERIMENTAL RESULTS
In this section, we are taking some sample data end
implementing RSA algorithm over it
Key Generation.
1. We have chosen two distinct prime numbers a=61 and
b=53.
2. Compute n=a*b, thus n~61*53 = 3233.
3. Compute Euler's totient function, O(n)~(a-l)*(b-1)
Thus Oin)=(61-1)"53-1) = 60°52 = 3120.
4. Chose any integer e, such that 1 < e < 3120 that is coprime
to 3120. Here, we chose e=17
5. Compute d , d= "mod O(a).
thus d-17 "(mod 3120) = 2753.
6. Thus the Publie-Key is (e, n) = (17, 3233) and the Private-
Key is (d, n) = (2753, 3233). This Private-Key is kept secret
and itis known only tothe user.
Encryption:
1. The Public-Key (17, 3233) is given by the Cloud service
provider to the user who wish to store the data,
2. Let us consider that the user mapped the data to an integer
m=65.
145Parsi Kalpana ,ct al, International Journal of Research in Computer and Communication technology,
URCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
3. Data is enerypted now by the Cloud service provider by
using the corresponding Public-Key whieh is shared by both
the Cloul service provider and the user.
C= 65" (mod 3233) = 2790.
4, This encrypted data i, cipher text is now stored by the
Cloud service provider
Decryption:
1, When the user requests for the data, Cloud service provider
will authenticate the user and delivers the encrypted data (If
the user is valid.
2. The cloud user then decrypts the data by computing,
"(mod n) = 2790°"* (mod 3233) = 65.
3. Once the m value is obtained, user will get back the original
data,
VI. ConcLustion
Cloud Computing is sill a new and evolving paradigm
where computing is regarded as on-demand service. Once the
organization takes the decision to move tothe cloud, it loses
contol over the dst. Thus, the amount of protection needed
to secure data is directly proportional to the value of the data.
Security of the Cloud relies on trusted computing. and
cryptography.
‘Thus, in our proposed work, only the authorized user ean
access the data, Even if some intruder (unauthorized user) gets
the data accidentally or intentionally if he captures the data
also, he can't decrypt it and get back the original data from it,
Hence forth, data security is provided by implementing RSA.
algorithm.
VII. REFERENCES
[1]. P-Kelpana, “Cloud Computing - Wave of the Future”,
International Journal of Electronics Communication and
‘Computer Engineering, Vol 3, Issue 3, ISSN 2249-071X,
June 2012.
[2]. Subedari Mithila, P. Pradeep Kumar,
through Confidentiality in Cloud Computing
Environment”, Subedari Mithila et al, / (UCSIT)
International Journal of Computer Science and
Information Technologies, Vol. 2, 1836-1840, 2011
‘Data Security
[3]. Zaigham Mahmood, “Data Location and Security Issues
in Cloud Computing”, Proceedings of International
Conference on Emerging Intelligent Data and Web
Technologies-2011.
[4] Vishwa gupta, Gajendra Singh, Ravindra Gupta, “Advance
Cryptography algorithm for improving data security”,
International Journal of Advanced Research in Computer
Science and Software Engineering, Vol 2, Issue 1, Jan
2012,
[5] V. Sandhya, “A Study on Various Security Methods in
Cloud Computing”, International Journal of Advanced
Research in Computer Science, Volume 2,No.6, Nov-Dec
2011
[6]. Simarjeet Kaur, “Cryptography and Eneryption in Cloud
Computing”, VSRD Intemational Joumal of Computer
Science and Information Technology, Vol.2(3), 242-249,
2012,
[7] Birendra Goswani, Dr.S.N.Singh, “Enhancing Security in
Cloud computing using Public Key Cryptography with
Matrices”, International Journal of Engineering Research,
and Applications, Vol 2, Issue 4, 339-344, July-Aug
2012.
[8]. G. Jai Arul Jose, C.Sanjeev, Dr. C.Suyambulingom,
“Implementation of Data Security in Cloud Computing”,
Intemational Journal of P2P Network Trends and
‘Technology, Vol 1, Issue 1, 2011
[9].William Stallings, “Network Security Essentials
‘Applications and Standards”, Third Edition, Pearson
Education, 2007.
AUTHOR'S PROFILE,
‘Mrs. P, Kalpana has completed
her M.Tech in Computer Science
land Engineering from JNTU
Hyderabad. She is having around
10 years of experience. She is
‘working as Assistant Professor
Sreenidhi Institute of Science
and Technology, Ghatkesar,
Hyderabad. She received 9 gold
‘model ftom Nishithe Degree and
PG college, from where she
pursued her Master of Computer
Applications. She is especially interested in Cloud Computing and its
security mechanisms. She has already some papers to her eredit in
‘various intemational journals
Mrs, Sudha Singaraju has
completed her MTech in
Computer Science and
Engineering from = JNTU,
Kakinada. She is having 11
years of experience in teaching,
She is working ss Assistant
Professor in Sreenidhi Institute
of Science and Technology,
Ghatkesar, Hyderabad. She is
eect especially interested in network
socurity and scanning mechanisms, She has already presented a paper
in international conference on Nano Science and Engineering
146