SlideShare une entreprise Scribd logo
1  sur  31
Attaining Data Security in
Cloud Computing
Submitted by
M.Gopinath
(1074305)
VLSI DESIGN

Under the Guidelines of
Dr.V.Sumathy
Objective
• To address the security problems such as
insider attacks and identity theft.

• To store the data across network-distributed
systems in a secure way.
Challenging Security Threats
• Loss of control over data in cloud storage
• Traditional integrity menace
Due to dynamic data update
Due to storing data redundantly in various
physical location

• Insider attack
Literature Survey
• Great amount of data widely spread over the
network require adequate management, to
ensure authorization, confidentiality and
integrity.

• Based on the cryptography and the nature of the
cloud, information security has to be achieved.
Cloud Computing
• Computing on multiple server via a digital
network
• A model for enabling convenient, ondemand network access to a shared pool
of configurable computing resources
• Technique which moves the application
software and databases to the large data
centers
Cloud Computing contd..
• Provides computation, software, data
access, and storage services

• Does not require end-user’s knowledge of
the physical location and configuration of
the system that delivers the services
Technologies in Cloud
•
•
•
•
•

Grid computing
Virtualization
Infrastructure-as-a-Service
Software-as-a-Service
Utility Computing
Cloud Storage
• A model of networked online storage where data

•
•

is stored on multiple virtual servers, generally
hosted by third parties, rather than being hosted
on dedicated servers.
Companies do not need to install physical
storage devices in their own datacenter or
offices, which reduces IT and hosting costs.
Companies need to pay only for the storage they
actually use.
Benefits of Cloud
•
•
•
•

Highly scalable
Highly available
Dynamically allocated resources
Pay only for resources that you use
System Model
Users (consists of both consumers and
organizations), who have data to be stored in the
cloud
Cloud Service Provider(CSP), who has
resources and expertise in building and
managing distributed cloud storage servers
Third Party Auditor(TPA), who has expertise
and capabilities that users may not have, to
assess and expose risk of cloud storage
Adversary model
• It tries to compromise a number of cloud
data storage servers and is able to modify
or delete users’ data.
• Two types of adversary with different
levels of capability
Weak adversary
Strong adversary
Data Storage Security
• Encryption – the process of transforming
plaintext into ciphertext using cipher
• Decryption – the reverse process of
encryption
• Digital Signature
Cipher Types
• Symmetric cryptography
• Asymmetric or Public Key cryptography
Symmetric Cipher
DES
The Data Encryption Standard (DES) is a
symmetric-key block cipher published by
the National Institute of Standards and
Technology (NIST).
General Structure of DES
DES uses 16 rounds. Each round of DES is a
Feistel cipher.
Key Generation
Properties of DES

• Avalanche effect
• completeness
Design Criteria

• S-boxes
• P-boxes
• Number of rounds
Public Key Cipher
RSA Algorithm
• An algorithm for public-key (asymmetric)
•
•
•
•

cryptography.
Based on the presumed difficulty of factoring
large integers, the factoring problem.
RSA involves a public key and private key.
Anyone can use the public key to encrypt a
message.
If the public key is large enough, only someone
with knowledge of the prime factors can feasibly
decode the message.
Key Generation
•
•
•
•
•
•

Choose two distinct prime numbers p and q.
Compute n = pq.
Compute φ(n) = (p – 1)(q – 1), where φ is
Euler's totient function.
Choose an integer e such that 1 < e < φ(n)
and gcd(e,φ(n)) = 1, i.e. e and φ(n) are
coprime.
Determine d = e–1 mod φ(n); i.e. d is the
multiplicative inverse of e mod φ(n).
The public key pair is {e,n} and the private key
pair is {d,n}.
ENCRYPTION
For sending message to B:
• Obtains the recipient B's public key (n,
e).
• Represents the plaintext message as a
positive integer m, 1 < m < n.
• Computes the ciphertext C = me mod n.
• Sends the ciphertext C to B.
DECRYPTION
Sender decrypts the message as follows:
• Uses his private key (n, d) to compute m
= Cd mod n.
• Extracts the plaintext from the message
representative m.
Features of RSA
• Secrecy and Privacy
• Integrity
• Authentication
• Non-repudiation
Proposed Algorithm
• Public-Key encryption

•
•

– increased security
– Convenience
Secret-Key encryption
– Speed
Best solution is to combine public- and secret-key
cryptography to get both security and speed
Proposed Algorithm contd.
• User logins must be used to provide
authorization.

• The symmetric Data Key K is used for data
encryption.

• Then the symmetric key K is encrypted through
the user public key KPUB, and it is written in the
distributed storage system.
Simulation Tools
• Dot Net framework
• Gladinet Cloud Desktop
• Amazon Cloud Drive
• Box.net and OpenBox platform
Reference
• Gary C.Kessler, 1998, “An Overview of Cryptography”,
•
•
•
•
•
•

Chapter 3.
William Stallings, “Cryptography and Network Security”,
Fourth Edition, Chapters 3, 5, 9 and 13.
http://en.wikipedia.org/wiki/Cloud_Computing
http://www.box.net/
Amazon.com, “Amazon Web Services (AWS),” Online at
http://aws.amazon.com, 2008.
http://www.msdn.microsoft.com/enus/library/system.security.cryptography.aspx
http://www.gladinet.com/
Thank you

Contenu connexe

Tendances

Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
Ratheesh Kumar R
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan Holt
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 

Tendances (20)

Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 

En vedette

CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Pavlos Stefanis
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

En vedette (8)

Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos StefanisCloud Computing Security (Final Year Project) by Pavlos Stefanis
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
 
Dissertation on MF
Dissertation on MFDissertation on MF
Dissertation on MF
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similaire à Attaining data security in cloud computing

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 

Similaire à Attaining data security in cloud computing (20)

Ch9
Ch9Ch9
Ch9
 
Using RSA Algorithm in Web Services
Using RSA Algorithm in Web ServicesUsing RSA Algorithm in Web Services
Using RSA Algorithm in Web Services
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 
262 265
262 265262 265
262 265
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Image Security
Image SecurityImage Security
Image Security
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Attaining data security in cloud computing

  • 1. Attaining Data Security in Cloud Computing Submitted by M.Gopinath (1074305) VLSI DESIGN Under the Guidelines of Dr.V.Sumathy
  • 2. Objective • To address the security problems such as insider attacks and identity theft. • To store the data across network-distributed systems in a secure way.
  • 3. Challenging Security Threats • Loss of control over data in cloud storage • Traditional integrity menace Due to dynamic data update Due to storing data redundantly in various physical location • Insider attack
  • 4. Literature Survey • Great amount of data widely spread over the network require adequate management, to ensure authorization, confidentiality and integrity. • Based on the cryptography and the nature of the cloud, information security has to be achieved.
  • 5. Cloud Computing • Computing on multiple server via a digital network • A model for enabling convenient, ondemand network access to a shared pool of configurable computing resources • Technique which moves the application software and databases to the large data centers
  • 6. Cloud Computing contd.. • Provides computation, software, data access, and storage services • Does not require end-user’s knowledge of the physical location and configuration of the system that delivers the services
  • 7. Technologies in Cloud • • • • • Grid computing Virtualization Infrastructure-as-a-Service Software-as-a-Service Utility Computing
  • 8. Cloud Storage • A model of networked online storage where data • • is stored on multiple virtual servers, generally hosted by third parties, rather than being hosted on dedicated servers. Companies do not need to install physical storage devices in their own datacenter or offices, which reduces IT and hosting costs. Companies need to pay only for the storage they actually use.
  • 9. Benefits of Cloud • • • • Highly scalable Highly available Dynamically allocated resources Pay only for resources that you use
  • 10. System Model Users (consists of both consumers and organizations), who have data to be stored in the cloud Cloud Service Provider(CSP), who has resources and expertise in building and managing distributed cloud storage servers Third Party Auditor(TPA), who has expertise and capabilities that users may not have, to assess and expose risk of cloud storage
  • 11.
  • 12. Adversary model • It tries to compromise a number of cloud data storage servers and is able to modify or delete users’ data. • Two types of adversary with different levels of capability Weak adversary Strong adversary
  • 13. Data Storage Security • Encryption – the process of transforming plaintext into ciphertext using cipher • Decryption – the reverse process of encryption • Digital Signature
  • 14. Cipher Types • Symmetric cryptography • Asymmetric or Public Key cryptography
  • 16. DES The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).
  • 18. DES uses 16 rounds. Each round of DES is a Feistel cipher.
  • 20. Properties of DES • Avalanche effect • completeness Design Criteria • S-boxes • P-boxes • Number of rounds
  • 22. RSA Algorithm • An algorithm for public-key (asymmetric) • • • • cryptography. Based on the presumed difficulty of factoring large integers, the factoring problem. RSA involves a public key and private key. Anyone can use the public key to encrypt a message. If the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
  • 23. Key Generation • • • • • • Choose two distinct prime numbers p and q. Compute n = pq. Compute φ(n) = (p – 1)(q – 1), where φ is Euler's totient function. Choose an integer e such that 1 < e < φ(n) and gcd(e,φ(n)) = 1, i.e. e and φ(n) are coprime. Determine d = e–1 mod φ(n); i.e. d is the multiplicative inverse of e mod φ(n). The public key pair is {e,n} and the private key pair is {d,n}.
  • 24. ENCRYPTION For sending message to B: • Obtains the recipient B's public key (n, e). • Represents the plaintext message as a positive integer m, 1 < m < n. • Computes the ciphertext C = me mod n. • Sends the ciphertext C to B.
  • 25. DECRYPTION Sender decrypts the message as follows: • Uses his private key (n, d) to compute m = Cd mod n. • Extracts the plaintext from the message representative m.
  • 26. Features of RSA • Secrecy and Privacy • Integrity • Authentication • Non-repudiation
  • 27. Proposed Algorithm • Public-Key encryption • • – increased security – Convenience Secret-Key encryption – Speed Best solution is to combine public- and secret-key cryptography to get both security and speed
  • 28. Proposed Algorithm contd. • User logins must be used to provide authorization. • The symmetric Data Key K is used for data encryption. • Then the symmetric key K is encrypted through the user public key KPUB, and it is written in the distributed storage system.
  • 29. Simulation Tools • Dot Net framework • Gladinet Cloud Desktop • Amazon Cloud Drive • Box.net and OpenBox platform
  • 30. Reference • Gary C.Kessler, 1998, “An Overview of Cryptography”, • • • • • • Chapter 3. William Stallings, “Cryptography and Network Security”, Fourth Edition, Chapters 3, 5, 9 and 13. http://en.wikipedia.org/wiki/Cloud_Computing http://www.box.net/ Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008. http://www.msdn.microsoft.com/enus/library/system.security.cryptography.aspx http://www.gladinet.com/