VISVESVARAYA TECHNOLOGICAL UNIVERSITY
JNANA SANGAMA, BELAGAVI – 590 018
                         A Technical Seminar Report on
           SECURITY ALGORITHMS IN CLOUD
                    COMPUTING
Submitted in partial fulfillment of the requirements for the VIII semester of
    Bachelor of Engineering in Computer Science and Engineering
                                   Submitted by:
        Mr. Pruthviraj Dhupad                         2KA19CS038
                              Under the Guidance of
                            Dr. Arunkumar Joshi
                              Associate Professor
                                Dept. of CSE,
                          SKSVMACET, Lakshmeshwar.
     Department of Computer Science and Engineering
          Smt. Kamala & Sri. Venkappa M. Agadi
           College of Engineering & Technology
                       Lakshmeshwar-582 116
                                2024-2025
       Smt. Kamala & Sri. Venkappa M. Agadi
             College of Engineering & Technology
                         Lakshmeshwar-582 116
     Department of Computer Science and Engineering
       This is to certify that Mr. Pruthviraj Dhupad bearing USN
2KA19CS038         has    satisfactorily   completed      the   Technical
Seminar Work entitled “SECURITY ALGORITHMS IN CLOUD
COMPUTING” in partial fulfillment for the VIII semester of Bachelor
of Engineering in Computer Science and Engineering of Visvesvaraya
Technological University Belagavi, during the year 2024-25. This
Technical Seminar report has been approved, as it satisfies the
academic requirements in respect of seminar work prescribed for
the said degree.
   ……………….          ………………            ………………….              ………………….
 Seminar Guide        HOD              Vice Principal         Principal
 Dr. Arunkumar     Dr. Arun Kumbi     Mr. Vikram Shirol    Dr. Parashuram Baraki
Joshi
                        ACKNOWLEDGEMENT
     The satisfaction and euphoria that accompany the successful completion of any
task would be incomplete without the mention of people who made it possible, whose
constant guidance and encouragement crowned out efforts with success.
      I would like to take this opportunity to thank my Technical Seminar Guide Dr.
Arunkumar Joshi, Associate Professor Department of Computer Science and
Engineering, without his immense guidance and support the work would have been
unthinkable. Also, I would like to thank my Technical Seminar Coordinator Mr.
Prakash Hongal, Assistant Professor, Department of Computer Science and
Engineering, helped me in the completion of technical seminar work.
       I express my deep sense of gratitude to our HOD Dr. Arun Kumbi,
Department of Computer Science and Engineering, for his unstinted support. I extend
my gratitude to the Vice Principal Dr. Vikram Shirol, SKSVMACET,
Lakshmeshwar and the Principal         Dr. Parashuram Baraki, SKSVMACET,
Lakshmeshwar for their generous support in all regards.
       I extend my heartfelt thanks to all the faculty members, teaching and non-
teaching staff of department of Computer Science and Engineering, SKSVMACET,
Lakshmeshwar who have helped me directly or indirectly. I’m very much indebted to my
parents and friends for their unquestioning best cooperation and help.
                                      Mr. Pruthviraj Dhupad              (2KA19CS038)
                                            ABSTRACT
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the
Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to
plan ahead for provisioning, and allows enterprises to start from the small and increase resources only
when there is a rise in service demand. Popular security experts decrypt the most demanding feature of
cloud computing security. Cloud computing allows both large and small companies to have the
opportunity to use Internet-based services .so that they can lower the start-up costs, capital expenditures,
access applications only if there is a need, use services on pay-asyou- use basis, and quickly lower or
increase ability. This algorithm has a specific form to encrypt and decrypt subtle data and is put in all
hardware and software. It is highly tough to hackers to get the actual data when encrypting by AES. Till
date there is no proof to crack this algorithm. AES has the capacity to deal with 3 dissimilar key sizes
such as AES 128, 192 and 256 bit. Each of its code has 128 bit.
                  CONTENTS
Acknowledgement
Abstract
Chapter 1         INTRODUCTION
Chapter 2         LITERATURE SURVEY
Chapter 3         METHODOLOGY
Chapter 4         COMPARITIVE ANALYSIS OF ALGORITHMS
                  CONCLUSION
                  REFERENCES
    CHAPTER 1
                                       INTRODUCTION
Cloud computing provides a large variety of architectural configurations, such as the
number of cores, amount of memory, and the number of nodes. The performance of a
workload an application and its input can execute up to 20 times longer or cost 10 times
more than optimal. The ready flexibility in cloud offerings has created a paradigm shift.
Whereas before an application was tuned for a given cluster, in the cloud the
architectural configuration is tuned for the workload. Furthermore, because the cloud
has a pay-as-you-go model, each configuration (cluster size VM type) has running cost
and execution time. Therefore, a workload can be optimized for least cost or shortest
time which are different configurations. Choosing the right cloud configuration for an
application is essential to service quality and commercial competitiveness. For instance,
a bad cloud configuration can result in up to 12 times more cost for the same
performance target. The saving from a proper cloud configuration is even more
significant for recurring jobs [5], [9] in which similar workloads are executed
repeatedly. Nonetheless, selecting the best cloud configuration, e.g., the cheapest or the
fastest, is difficult due to the complexity of simultaneously achieving high accuracy,
low overhead, and adaptivity for different applications and workloads.
II. WHAT IS A CLOUD
A cloud can be defined as the software and services that run on the Internet, instead of
locally on a local host system. These software and services can be accessed remotely.
Example of cloud services include Netflix, Google Drive, and Microsoft One drive.
Dept. of CSE                         SKSVMACET - Lakshmeshwar                        Page 6
   Also Amazon Web Service, Microsoft Azure, IBM cloud service, Google
   Cloud service are among the top cloud service provider. Most Common
   questions that’s need to answered in Cloud Computing are:
          How to evaluate and choose the right cloud solution?
          How to design applications which is optimized for the cloud?
          How to integrate public cloud applications with in- premise and
           private cloud applications?
          How to integrate different cloud solutions?
          How to setup new infrastructures so that applications running on them
           can easily interoperate and move to public cloud, if required?
   In this work a brief survey is presented to discuss the present research work
   addressing all these questions and their probable solutions.
   III. WHAT IS CLOUD COMPUTING
      A. The NIST Definition of Cloud Computing
      Cloud computing is a model for enabling ubiquitous, convenient, on-
      demand network access to a shared pool of configurable computing
      resources (e.g., networks, servers, storage, applications, and services) that
      can be rapidly provisioned and released with minimal management effort
      or service provider interaction. This cloud model is composed of five
      essential characteristics, three service models, and four deployment
      models.
Dept. of CSE                        SKSVMACET - Lakshmeshwar                          Page 7
   NISTs definition identified self-service, accessibility from desktops, laptops,
   and mobile phones, resources that are pooled among multiple users and
   applications, elastic re- sources that can be rapidly reapportioned as needed,
   and measured service as the five essential characteristics of cloud computing.
   When these characteristics are combined, they create cloud computing
   infrastructure that contains both a physical layer and an abstraction layer. The
   physical layer consists of hardware resources that support the cloud services
   (i.e. servers, storage and network components). The abstraction layer consists
   of the software deployed across the physical layer, thereby expressing the
   essential characteristics of the cloud per NISTs definition.
      B. Characteristics of Cloud Computing:
    On-demand self-service. A consumer can unilaterally provision computing
   capabilities, such as server time and network storage, as needed automatically
   without requiring human interaction with each service provider. Broad
   network access. Capabilities are available over the network and accessed
   through standard mechanisms that promote use by heterogeneous thin or thick
   client platforms (e.g., mobile phones, tablets, laptops, and work- stations).
    Resource pooling. The providers computing resources are pooled to serve multiple
   consumers using a multi-tenant model, with different physical and virtual resources
   dynamically assigned and reassigned according to consumer demand. There is a
   sense of location independence in that the customer generally has no control or
   knowledge over the exact location of the provided resources but may be able to
   specify location at a higher level of abstraction (e.g., country, state, or datacenter).
   Examples of resources include storage, processing, memory, and network
   bandwidth.
Dept. of CSE                           SKSVMACET - Lakshmeshwar                               Page 8
    Rapid elasticity. Capabilities can be elastically provisioned and released, in
   some cases automatically, to scale rapidly outward and inward commensurate
   with demand. To the consumer, the capabilities available for provisioning
   often appear to be unlimited and can be appropriated in any quantity at any
   time.
   Measured service. Cloud systems automatically control and optimize resource
   use by leveraging a metering capability1 at some level of abstraction
   appropriate to the type of service (e.g., storage, processing, bandwidth, and
   active user accounts). Resource usage can be monitored, controlled, and
   reported, providing transparency for both the provider and consumer of the
   utilized service.
   According to Amazon, clouds enable 7 transformation of how applications are
   designed, built and used.
              Cloud makes distributed architectures easy
              Cloud enables users to embrace the security advantages of shared
               systems
              Cloud enables enterprises to move from scaling by architecture to
               scaling by command
              Cloud puts a supercomputer into the hands of every developer
              Cloud enables users to experiment often and fail quickly • Cloud
               enables big data without big servers
              Cloud enables users to experiment often and fail quickly • Cloud
               enables big data without big servers.
Dept. of CSE                        SKSVMACET - Lakshmeshwar                         Page 9
       C. Service Models:
Software as a Service (SaaS). The capability provided to the consumer is to use
the providers applications running on a cloud infrastructure2 . The applications
are accessible from various client devices through either a thin client interface,
such as a web browser (e.g., web- based email), or a program interface. The
consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, storage, or even individual
application capabilities, with the possible exception of limited userspecific
application configuration settings.
Dept. of CSE                          SKSVMACET - Lakshmeshwar                       Page 10
Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired applications created using
programming languages, libraries, services, and tools supported by the provider.3 The
consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storge, but has control over the deployed
applications and possibly configuration settings for the application-hosting environment.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to
provision processing, storage, net- works, and other fundamental computing resources
where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underly- ing cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
Dept. of CSE                            SKSVMACET - Lakshmeshwar                            Page 11
      D. Deployment Models:
         Private cloud. The cloud infrastructure is provisioned for exclusive use by a
         single organization comprising multiple consumers (e.g., business units). It
         may be owned, managed, and operated by the organization, a third party, or
         some combination of them, and it may exist on or off premises.
         Community cloud. The cloud infrastructure is provisioned for exclusive use
         by a specific community of consumers from organizations that have shared
         concerns (e.g., mis- sion, security requirements, policy, and compliance
         considerations). It may be owned, managed, and operated by one or more of
         the organizations in the community, a third party, or some combination of
         them, and it may exist on or off premises.
         Public cloud. The cloud infrastructure is provisioned for open use by the
         general public. It may be owned, managed, and operated by a business,
         academic, or government organization, or some combination of them. It exists
         on the premises of the cloud provider.
         Hybrid cloud. The cloud infrastructure is a composition of two or more
         distinct cloud infrastructures (private, community, or public) that remain
         unique entities, but are bound together by standardized or proprietary
         technology that enables data and application portability (e.g., cloud bursting
         for load balancing between clouds).
Dept. of CSE                         SKSVMACET - Lakshmeshwar                             Page 12
CHAPTER 2
               LITERATURE SURVEY
Dept. of CSE        SKSVMACET - Lakshmeshwar   Page 13
     CHAPTER
        3
                                  METHODOLOGY
 Security                                                      AES
 Algorithms             Symmetric                              DES
                                                               TDES
                                                               Blowfish
                                                               RSA
                        Asymmetric                             DSA
                                                               Diffie-Hellman
EXISTING ALGORITHM ON CLOUD SECURITY
   A. Symmetric Encryption Algorithm (Secret Key Cryptography) Symmetric Encryption
        Algorithm uses one key for both encryption and decryption. Examples of this
        encryption algorithm a briefly discussed below.
• Data Encryption Standard (DES) DES is a standard for data encryption that uses a secret key
for both encryption and decryption. It adopts a 64-bit secret key, of which 56 bits are randomly
generated and the other 8 bits are used for error detection.
    Dept. of CSE                          SKSVMACET - Lakshmeshwar                       Page 14
It employs a data encryption algorithm (DEA), a secret block cipher employing a 56-bit key
operating on 64-bit blocks. It is the archetypal block cipher- an algorithm that takes a fixed-
length string of plaintext bits and transforms it into a ciphertext bit string of the same length.
DES design allows users to implement it in hardware and use it for single-user encryption,
such as files stored on a hard disk in encrypted form.
• Advanced Encryption Standard (AES)
It is a National Institute of Standards and Technology (NIST) specification for encrypting
electronic data. It also helps to encrypt digital information such as telecommunications,
financial, and government data. It is being used by US government agencies to sensitive
unclassified materials. AES consists of symmetric key algorithm: both encryption and
decryption are performed using the same key. It is an iterated block cipher that works by
repeating the defined steps multiple times. It has 128-bit block size, with key sizes of 128,
192, and 256 bits for AES-128, AES-192, and AES-256, respectively. The design of AES
makes its use efficient in both software and hardware and also works at multiple network
layers.
• Blowfish
Blowfish is a type of symmetric algorithm designed to replace DES or IDEA algorithms. It
uses the same secret key to encrypt and decrypt data . The algorithm splits the data into a
block length of 64 bits and produces a key ranging from 32 bits to 448 bits. Due to its high
speed and overall efficiency, blowfish is used in password protection tools to e-commerce
websites for securing payments.
 Dept. of CSE                           SKSVMACET - Lakshmeshwar                          Page 15
B. Asymmetric Encryption Algorithm (Public-Key Cryptography)
This encryption algorithm was introduced to solve key- management problems [10].
involves both a public key and a private key. The public key is publicly available, whereas
the sender keeps the private key secret. Asymmetric encryption uses a key pair comprising
of public key available to anyone and a private key held only by the key owner, which helps
to provide confidentiality, integrity, authentication, and nonrepudiation in data management.
• Rivest Shamir Adleman (RSA) Algorithm
RSA is a public-key cryptosystem for Internet encryption and authentication. RSA uses
modular arithmetic and elementary number theories to perform computations using two
large prime numbers [8]. The RSA system is widely used in a variety of products, platforms
and industries. It is one of the de-facto encryption standards. Companies such as Microsoft,
Apple and Novell build RSA algorithms into their operating systems [4]. RSA is the most
popular asymmetric algorithm. The computational complexity offactoring large integers that
are the product of two large prime numbers underlies the security of the RSA algorithm [10].
Multiplying two prime numbers is easy, but RSA is based on the complexity of calculating
the original numbers from the product [9].
• Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography has been proposed to replace the RSA algorithm because of the
small key size of the ECC [2].
 Dept. of CSE                         SKSVMACET - Lakshmeshwar                        Page 16
Implementation of AES algorithm
The matrix of 4x4 consisting of 128 bytes input block is known as the state array. The
process of encryption revolves around four stages namely mix, columns, sub bytes, add
round key and shift rows.
Sub Bytes – It is defined as substitution step. It is non- linear. Each byte is restored with
another according to S-box. The operation gives an indirect proportion in cipher. The
resultant matrix consists of four columns and four rows.
Shift Rows – It is stage where each row is rotated repetitively a definite number of times. It
is also known as permutation. The four rows in the matrix are rotated accordingly. The rows
are shifted to the left. Shift is carried out as Row1 is not rotated. Row2 is shifted one byte
place to the left. Row3 is shifted two places to the left. Row4 is shifted three places to the
left. The resultant matrix consists of the 16 bytes but rotated with respect to each other.
 Dept. of CSE                          SKSVMACET - Lakshmeshwar                         Page 17
Mix Columns –In this step, each column is changed using matrix multiplication. Each
column consists of four bytes. The resultant matrix consists of 16 bytes. The input is taken
for each column. It takes four bytes. The output produces four bytes which is entirely
different from the four bytes given as input.
Add Round Key – The round key is bounded to each byte of state. In this particular step, the
matrix is XO-Red with the round key. A 4x4 matrix represents the original key. It contains
128bits. This 4 words key where each word is of 4 bytes, is converted to a 43 words key.
The first four words represent W[0], W[1], W[2], and W[3].
 Dept. of CSE                          SKSVMACET - Lakshmeshwar                      Page 18
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 19
CHAPTER 4
 COMPARATIVE ANALYSIS OF ALGORITHMS
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 20
                                CONCLUSION
Cloud computing is a promising and emerging technology for the next generation of IT
applications. Cryptography is one of the most important and prominent skill to secure the
data from hackers by using the essential processes that is Encryption and Decryption. AES
encryption is the speedy method that has the flexibility and is easy to implement.
Data can also protect against future attacks such as smash attacks. AES encryption algorithm
has high performance and very little storage space without any restrictions while other
symmetric algorithms have some restrictions and differences in storage space and
performance. The implementation of Advanced Encryption Standard for securing data
bestows benefits of less computation time and less memory consumption in contrast to other
algorithms.
Dept. of CSE                        SKSVMACET - Lakshmeshwar                         Page 21
                                REFERENCE
   1. Leena Khanna, Anant Jaiswal, “Cloud Computing: Security Issues and Description
      of Encryption Based Algorithms to Overcome Them”, IJARCSSE 2013
   2. G Devi, Pramod Kumar “Cloud Computing: A CRM Service Based on a Separate
      Encryption and Decryption using Blowfish algorithm” IJCTT 2012
   3. Simarjeet Kaur “Cryptography and Encryption in Cloud Computing”, VSRD
      International Journal of CS and IT, 2012
   4. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza
      Carvalho, Mats Naslund, Makan Pourzandi “A quantitativeanalysis of current
      security concerns and solutions for cloud computing”, Springer 2012.
   5. Ronald Krutz, Russell Vines, “Cloud Security: A Comprehensive Guide to Secure
      Cloud Computing” Wiley Publishing 2010
   6. Behrouz Forouzan, “Cryptography and Network Security”, McGraw-Hill Special
      Indian Edition 2007
   7. Wayne Jansen, Timothy Grance “Guidelines on Security and Privacy in Public Cloud
      Computing”, National Institute of Standards andTechnology 2011
   8. Akhil Behl “Emerging Security Challenges in Cloud Computing”, IEEE 2011
   9. Maha Tebba, Saïd Haji Abdellatif Ghazi, “Homomorphic Encryption Applied to the
      Cloud Computing Security”, World Congress onEngineering 2012
   10. Cloud Security Alliance (CSA), “Security Guidance for critical Areas of Focus in
      cloud computing V3.0” CSA 2015
Dept. of CSE                      SKSVMACET - Lakshmeshwar                    Page 22
               SEMINAR PRESENTATION
Dept. of CSE          SKSVMACET - Lakshmeshwar   Page 23
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 24
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 25
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 26
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 27
Dept. of CSE   SKSVMACET - Lakshmeshwar   Page 28