SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Gurpreet Kaur et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Analyzing Data Security for Cloud Computing Using
Cryptographic Algorithms
Gurpreet Kaur1, Manish Mahajan2
1
2

(Department of Information technology, Chandigarh Engineering College, Punjab-160062)
(Associate professor, Department of Information Technology, Chandigarh Engineering College, Punjab-160062)

ABSTRACT
Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality
on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new
infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the
users. It moves the application databases to centralized data centers, where the data management may not be
trustworthy. This paper analyze the performance of security algorithms, namely, AES, DES, BLOWFISH, RSA
and MD5 on single system and cloud network for different inputs. These algorithms are compared based on two
parameters, namely, Mean time and Speed-up ratio.
Keywords - AES, DES, BLOWFISH, Cloud computing, Google app engine, MD5, RSA.

I. INTRODUCTION
Cloud computing is a type of computing that
relies on sharing computing resources rather than
having local servers to handle applications [8]. Cloud
computing is a colloquial expression used to describe a
variety of different types of computing concepts that
involve a large number of computers connected
through a real-time communication network. Cloud
computing refers to computing with a pool of
virtualized computer resources. A cloud can host
different workloads, allows workloads to be
deployed/scaled-out on-demand by rapid provisioning
of virtual or physical machines, supports redundant,
self-recovering, highly-scalable programming models
and
allows
workloads
to
recover
from
hardware/software failures and rebalance allocations.
The idea is to move desktop computing to a serviceoriented platform using server clusters and huge
databases at datacenters.
Let's say you're working in a company. You have the
duty to make sure that all the other employees have
sufficient hardware and software they need to do their
jobs. When a new recruitment takes place you have to
buy new hardware as well as new software for the
hired person. Buying computers for everyone isn't
enough -- you also have to purchase software
or software licenses to give employees the tools they
require. It's so stressful that you find it difficult to go
to sleep on your huge pile of money every night [9].
Later, there may be an alternative for
executives like you. Instead of installing a suite of
software for each computer, you'd only have to load
one application. That application would allow workers
to log into a Web-based service which hosts all the
programs the user would need for his or her job.
Remote machines owned by another company would
run everything from e-mail to word processing to
www.ijera.com

complex data analysis programs. It's called cloud
computing, and it could change the entire computer
industry. In a cloud computing system, there's a
significant workload shift. Local computers no longer
have to do all the heavy lifting when it comes to
running applications. The network of computers that
make up the cloud handles them instead. Hardware and
software demands on the user's side decrease. The only
thing the user's computer needs to be able to run is the
cloud computing systems interface software, which can
be as simple as a Web browser, and the cloud's
network takes care of the rest [9].
Cloud computing has four essential
characteristics: elasticity, scalability, provisioning,
standardization, and pay-as-you-go.
This paper analysis data security model for
cloud computing. We propose a data security model
based on studying of cloud computing architecture. We
implement software to select the suitable and highest
security encryption algorithm. This software makes
evaluation form five modern encryption techniques
namely AES, DES, BLOWFISH, RSA, MD5.Section
II states Cloud computing architecture. In section III
outlines cloud computing environment. Section IV,
Methodology. Section V results and section VI has
conclusion.

782 | P a g e
Gurpreet Kaur et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786

www.ijera.com

have to do is connect and use it. SaaS Examples
include customer relationship management as a
service.
Cloud computing Deployment models
1). Public cloud: sold to the public, very large
infrastructure
2). Private cloud: Owned by enterprise

The main attributes of cloud computing is illustrated as
follows:1).Elasticity and scalability: Elasticity of the cloud
means that the as per resource allocation demand the
cloud can be bigger or smaller. Elasticity enables
scalability, which means that the cloud can scale
upward for peak demand and downward for lighter
demand. Scalability also means that an application can
scale when adding users and when application
requirements change [7].
2).Self-service provisioning: Cloud customers can
have an access to cloud without having a lengthy
process. You request an amount of computing, storage,
software, process, or more from the service provider
[7].
3).Standardization: For the communication between
the services there must be standardized API’s. A
standardized interface lets the customer more easily
link cloud services together [7].
4) Pay-as-you-go: Customer have pay some amount
for what resources he has used.. This pay-as-you-go
model means you have to pay for what you have used.

II. CLOUD COMPUTING
ARCHTECHTURE
Cloud computing service models
Infrastructure as a Service (IaaS): The IaaS layer
offers storage and compute resources that developers
and IT organizations can use to deliver business
solutions.
Platform as a Service (PaaS): The capability
provided to the consumer is to deploy onto the cloud
infrastructure
consumer-created
or
acquired
applications created using programming languages and
tools supported by the provider. The consumer does
not manage or control the underlying cloud
infrastructure including network, servers, operating
systems, or storage, but has control over the deployed
applications and possibly application hosting
environment configurations [14].

Figure 1: Deployment model
3).Hybrid cloud: two or more clouds composition.
4).Community cloud:
shared infrastructure for
specified community
-Cloud computing benefits
More storage, efficient Backup and Disaster Recovery,
high Mobility, Cost Efficiency, Less maintenance
required, Continuous availability, more scalability.
-- Cloud computing disadvantages
Less control, unreliable, unpredicted Costs for
customer, more contracts and Lock-Ins, Less Security
in the Cloud.

III. ALGORITHMS IMPLEMENTED
The cryptographic algorithms used are
Symmetric key algorithms, Asymmetric key,
algorithms and Combination key algorithms. .
Encryption will make the data more secure on single
system as well as on the cloud network. The
algorithms will run on single system as well as on
cloud network.
1).AES: In cryptography, the Advanced Encryption
Standard (AES) is a symmetric-key encryption
standard. Each of these ciphers has a 128-bit block
size, with key sizes of 128, 192 and 256 bits,
respectively [16]
2).MD5: a widely used cryptographic hash function
with a 128-bit hash value processes a variable-length
message into a fixed-length output of 128 bits. The
input message is broken up into chunks of 512-bit
blocks; the message is padded so that its length is
divisible by 512 [16].
In this sender use the public key of the receiver to
encrypt the message and receiver use its private key to
decrypt the message [16]

Software as a Service (SaaS): In the SaaS layer, the
service provider hosts the software so you don’t need
to install it, manage it, or buy hardware for it. All you
www.ijera.com

783 | P a g e
Gurpreet Kaur et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786
Table1: Keys and Key size
Key Name
Key Size
AES

256

DES

64

RSA

80

MD5

128

4).DES:- The DES (Data Encryption Standard)
algorithm is the most widely used encryption algorithm
in the world. For many years, and among many people,
“secret code making” and DES have been synonymous
meaning it operates on plaintext blocks of a given size
(64-bits) and returns cipher text blocks of the same
size.
5).RSA:- RSA is an algorithm for public-key
cryptography, involves a public key and a private key.
The public key can be known to everyone and is used
for encrypting messages. Messages encrypted with the
public key can only be decrypted using the private key.
It protected user data include encryption prior to
storage, user authentication procedures prior to storage
or retrieval, and building secure channels for data
transmission [16].

IV. PERFORMANCE ANALYSIS
PARAMETERS
The data will be encrypted using the
algorithms such as, AES, DES, BLOWFISH, RSA,
Blowfish and MD5.By using these algorithms, the
speed-up ratio and the mean processing time for
different inputs are calculated.
4.1. Speed-Up ratio is defined as the difference
between the mean processing time of single system
and the cloud network. Speed-up ratio will provide tell
us how fast the data have been encrypted. It will give
us the idea about speed of encryption.
4.2. Mean processing time is the difference between
the starting time taken to encrypt the data and the
ending time. It is also evaluated both on single system
and on cloud network. It is the difference between the
time taken to encrypt the data. As the size of input
increases the time taken to encrypt the data will
increase and with the increase in time speed-up ratio
decreases.

www.ijera.com

is referred to as Platform as a Service (PaaS). In this
category, One example is Google’s App Engine, it
provides a runtime environment and set of API’s [16].
For interaction with Google’s cloud runtime,
applications are run on “sandboxed” environment. As
the request increases for an application, App engine
offers automatic scaling for web application. Google
app handles languages such as python and java.
Google App is free up to certain level of consumed
resources, charges applied for the additional storage
and bandwidth [16, 4]. Experimental evaluation is
done on eclipse-SDK and Google App engine. The
evaluation is done for different input sizes: 10KB,
13KB, 39 KB, and 56 KB.
For the data security, we have used five
encryption algorithms: AES, DES, BLOWFISH, RSA
and MD5.These five algorithms are implemented in
the “sandboxed” environment using Eclipse .Eclipse is
an integrated development environment which is used
to build and run the applications. Using java on eclipse
the algorithms are run on local as well as on Google
app engine.

VI. RESULTS
Comparing Speed-up ratio and Mean time are
used to select the highest security algorithm. Five
encryption algorithms are being used namely AES,
DES, BLOWFISH, RSA and MD5
Table 2: Comparison of Mean processing time of
the algorithms on local system as well as on cloud
network
In
A
A
DE DE BL BL RS
RS
pu ES ES S
S
O
O
A
A
t
C
CL WF WF
CL
L
O
ISH ISH
OU
O
U
CL
D
U
D
OU
D
D
10 11 1. 7.5 2
4
2
238 274
kb .5
5
.25
13 14 2
10
2.5 4.7
2
328 331
kb .7
.25 .5
39 21 3
31. 6.5 8.2
2.7 358 351
kb
5
5
5
.5
.7
56 24 3. 50. 9.2 15. 3
496 415
kb .5
75 25
5
7
.25 .25
Mean processing time is calculated in milliseconds.

V. METHODOLOGY
The users implement their application for
deploying them on the cloud. Cloud software
environment provider supplies the developers with
programming-level-environment with well defined set
of API’s. The service commonly provided by this layer
www.ijera.com

784 | P a g e

M
D5

MD
5
CL
OU
D

1

1

1

1

1

1

1

0.5
Gurpreet Kaur et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786

www.ijera.com

600
500

AES

400

DES

300

BLOWFISH
200

RSA

100

MD5

0
10 KB13 KB39 KB56 KB

Fig 3: Comparison of Local mean time for algorithms
with different input sizes.
600
500

AES

400

DES

300

BLOWFISH

200

RSA

100

MD5

0
10 KB13 KB39 KB56 KB

Fig 4: comparison of Cloud mean time for algorithms
with different input sizes.
Table 3:Speed-up ratio of the algorithms for
different input sizes
INPUT AES DES BLOWFISH RSA MD5
10 KB

7.6

3.62

2

0.86

1

13 KB

7.2

4

2.3

0.99

1

39 KB

7

4.8

3

1.01

1

56 KB

6.6

5.43

5.25

1.19

0.5

Fig 5: Comparison of speed-up ratio of the
algorithms for different inputs.
From the Tabular results, the following
observations can be made, using eclipse run variable
input sizes on local as well as on Google App engine.
Among all the algorithms RSA-an asymmetric
encryption algorithm is average most time consuming
and MD5 is-hashing algorithm is the least tie
consuming.
AES-a symmetric encryption algorithm, the speed-up
ratio falls sharply with the increase in input size.AES
algorithm has the highest speed-up ratio and then is
DES.
In MD5and AES algorithm the speed up ratio
decreases with the increase in size. Whereas DES,
RSA and BLOWFISH remains almost constant. There
is a slight change in the speed-up ratio for DES, RSA
and BLOWFISH.
VII. CONCLUSION
Decade’s earlier algorithms are implemented
on single processor system, but now encryption and
decryption techniques are implemented on cloud
network. Simulation for different algorithms will be
done on the eclipse. The results will be obtained on
basis speed-up ratio and performance parameter. All
the algorithms are applied on both the cloud network
and single system.
From the above results, when you are
interested in performance of algorithm, go for MD5,
BLOWFISH, AES and DES.
For the security of data, go for the MD5 and
AES.MD5-hashing encryption algorithm is the highest
security algorithm.
Finally for less time and more secure algorithm, chose
MD5 followed by AES.

REFERENCES
[1]

[2]

www.ijera.com

Amazon Web Services "Overview of Security
Processes "http://aws.amazon.com/ August
2013
Bruce Schneier. "The Blowfish Encryption
Algorithm Retrieved ",October 25, 2008

785 | P a g e
Gurpreet Kaur et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786

www.ijera.com

[3]

Center Of The Protection Of National
Infrastructure CPNI by Deloitte"Information
Security
Briefing
0112010
Cloud
Computing", p.71, Published March 2010
[4]
Google
App
Engine.
http://code.google.com/appengine/, Aug 2013
[5]
http://en.wikipedia.org/wiki/Google_App
_Engine. Cited Aug 2013
[6]
http://www.dummies.com/how-to/content
/what-is-cloud
computing.html#glossarycloud_computing, cited on Aug 21,2013
[7]
http://www.dummies.com/how-to/content/
cloud-computing-cheat-sheet.html .cited on
Aug 21, 2013
[8]
http://www.webopedia.com/TERM/C/cloud _
computing.htmlcited on Aug 21, 2013
[9]
https://bluelabelhost.com/whatisthecloud,
cited on Aug 21,2013
[10] http://en.wikipedia.org/wiki/Triple_DES,cit
ed on Aug 21,2013
[11] Jim zierick,”elevate cloud security with
privilege
delegation”http://www.ibm.com/
developerworks/cloud/library/cl-datacenter
migration, Dec 2011
[12] luis m. vaquero1, luis rodero-merino1 , juan
caceres1, maik lindner2 "a break in the
clouds: towards a cloud.
[13] Ritika Chehal, Kuldeep Singh” Efficiency
and Security of Data with Symmetric
Encryption Algorithms” International Journal
of Advanced Research in Computer Science
and Software Engineering, Volume 2, Issue 8,
August 2012
[14] Sherif El-etriby, Eman M. Mohamed, Hatem
S.
Abdul-kader”
Modern
Encryption
Techniques
for
Cloud
Computing
Randomness and Performance Testing”in
ICICT ,800-805 ,2012.Definition ", ACM
SIGCOMM
Computer
Communication
Review, Vol. 39, No. 1, 2009
[15] Priyanka Arora, Arun Singh, Himanshu Tyagi
“Analysis of performance by using security
algorithm on cloud network” in international
conference
on
Emerging
trends
in
engineering and management (ICETM2012),
23-24 June , 2012
[16] Priyanka Arora, Arun Singh, Himanshu Tyagi
“ Evaluation and Comparison of Security
Issues on Cloud Computing Environment” in
World of Computer Science and Information
Technology Journal (WCSIT) ISSN: 22210741 Vol. 2, No. 5, 179-183, 2012

www.ijera.com

786 | P a g e

Contenu connexe

Tendances

SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...IOSR Journals
 
Getting Started with Vortex
Getting Started with VortexGetting Started with Vortex
Getting Started with VortexAngelo Corsaro
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 

Tendances (19)

SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
L01246974
L01246974L01246974
L01246974
 
Getting Started with Vortex
Getting Started with VortexGetting Started with Vortex
Getting Started with Vortex
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
 
F01113945
F01113945F01113945
F01113945
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 

En vedette

En vedette (20)

Ej35767774
Ej35767774Ej35767774
Ej35767774
 
Eo35798805
Eo35798805Eo35798805
Eo35798805
 
Ex35863868
Ex35863868Ex35863868
Ex35863868
 
Eu35845853
Eu35845853Eu35845853
Eu35845853
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
Eg35750753
Eg35750753Eg35750753
Eg35750753
 
Gn3511531161
Gn3511531161Gn3511531161
Gn3511531161
 
Fl35967977
Fl35967977Fl35967977
Fl35967977
 
Gv3512031207
Gv3512031207Gv3512031207
Gv3512031207
 
Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
Gt3511931198
Gt3511931198Gt3511931198
Gt3511931198
 
Ge3510911102
Ge3510911102Ge3510911102
Ge3510911102
 
Ek35775781
Ek35775781Ek35775781
Ek35775781
 
Em35787792
Em35787792Em35787792
Em35787792
 
Ei35761766
Ei35761766Ei35761766
Ei35761766
 
LA NUBE DE INTENET Y LA WEB 2.0
LA NUBE DE INTENET Y LA WEB 2.0 LA NUBE DE INTENET Y LA WEB 2.0
LA NUBE DE INTENET Y LA WEB 2.0
 
ở đâu dịch vụ giúp việc quận 11 ở hồ chí minh
ở đâu dịch vụ giúp việc quận 11 ở hồ chí minhở đâu dịch vụ giúp việc quận 11 ở hồ chí minh
ở đâu dịch vụ giúp việc quận 11 ở hồ chí minh
 
広報紙オープンデータ推進に関する説明資料
広報紙オープンデータ推進に関する説明資料広報紙オープンデータ推進に関する説明資料
広報紙オープンデータ推進に関する説明資料
 
Expo
ExpoExpo
Expo
 

Similaire à El35782786

Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 

Similaire à El35782786 (20)

Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

El35782786

  • 1. Gurpreet Kaur et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms Gurpreet Kaur1, Manish Mahajan2 1 2 (Department of Information technology, Chandigarh Engineering College, Punjab-160062) (Associate professor, Department of Information Technology, Chandigarh Engineering College, Punjab-160062) ABSTRACT Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data centers, where the data management may not be trustworthy. This paper analyze the performance of security algorithms, namely, AES, DES, BLOWFISH, RSA and MD5 on single system and cloud network for different inputs. These algorithms are compared based on two parameters, namely, Mean time and Speed-up ratio. Keywords - AES, DES, BLOWFISH, Cloud computing, Google app engine, MD5, RSA. I. INTRODUCTION Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers to handle applications [8]. Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network. Cloud computing refers to computing with a pool of virtualized computer resources. A cloud can host different workloads, allows workloads to be deployed/scaled-out on-demand by rapid provisioning of virtual or physical machines, supports redundant, self-recovering, highly-scalable programming models and allows workloads to recover from hardware/software failures and rebalance allocations. The idea is to move desktop computing to a serviceoriented platform using server clusters and huge databases at datacenters. Let's say you're working in a company. You have the duty to make sure that all the other employees have sufficient hardware and software they need to do their jobs. When a new recruitment takes place you have to buy new hardware as well as new software for the hired person. Buying computers for everyone isn't enough -- you also have to purchase software or software licenses to give employees the tools they require. It's so stressful that you find it difficult to go to sleep on your huge pile of money every night [9]. Later, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to www.ijera.com complex data analysis programs. It's called cloud computing, and it could change the entire computer industry. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest [9]. Cloud computing has four essential characteristics: elasticity, scalability, provisioning, standardization, and pay-as-you-go. This paper analysis data security model for cloud computing. We propose a data security model based on studying of cloud computing architecture. We implement software to select the suitable and highest security encryption algorithm. This software makes evaluation form five modern encryption techniques namely AES, DES, BLOWFISH, RSA, MD5.Section II states Cloud computing architecture. In section III outlines cloud computing environment. Section IV, Methodology. Section V results and section VI has conclusion. 782 | P a g e
  • 2. Gurpreet Kaur et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 www.ijera.com have to do is connect and use it. SaaS Examples include customer relationship management as a service. Cloud computing Deployment models 1). Public cloud: sold to the public, very large infrastructure 2). Private cloud: Owned by enterprise The main attributes of cloud computing is illustrated as follows:1).Elasticity and scalability: Elasticity of the cloud means that the as per resource allocation demand the cloud can be bigger or smaller. Elasticity enables scalability, which means that the cloud can scale upward for peak demand and downward for lighter demand. Scalability also means that an application can scale when adding users and when application requirements change [7]. 2).Self-service provisioning: Cloud customers can have an access to cloud without having a lengthy process. You request an amount of computing, storage, software, process, or more from the service provider [7]. 3).Standardization: For the communication between the services there must be standardized API’s. A standardized interface lets the customer more easily link cloud services together [7]. 4) Pay-as-you-go: Customer have pay some amount for what resources he has used.. This pay-as-you-go model means you have to pay for what you have used. II. CLOUD COMPUTING ARCHTECHTURE Cloud computing service models Infrastructure as a Service (IaaS): The IaaS layer offers storage and compute resources that developers and IT organizations can use to deliver business solutions. Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations [14]. Figure 1: Deployment model 3).Hybrid cloud: two or more clouds composition. 4).Community cloud: shared infrastructure for specified community -Cloud computing benefits More storage, efficient Backup and Disaster Recovery, high Mobility, Cost Efficiency, Less maintenance required, Continuous availability, more scalability. -- Cloud computing disadvantages Less control, unreliable, unpredicted Costs for customer, more contracts and Lock-Ins, Less Security in the Cloud. III. ALGORITHMS IMPLEMENTED The cryptographic algorithms used are Symmetric key algorithms, Asymmetric key, algorithms and Combination key algorithms. . Encryption will make the data more secure on single system as well as on the cloud network. The algorithms will run on single system as well as on cloud network. 1).AES: In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively [16] 2).MD5: a widely used cryptographic hash function with a 128-bit hash value processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks; the message is padded so that its length is divisible by 512 [16]. In this sender use the public key of the receiver to encrypt the message and receiver use its private key to decrypt the message [16] Software as a Service (SaaS): In the SaaS layer, the service provider hosts the software so you don’t need to install it, manage it, or buy hardware for it. All you www.ijera.com 783 | P a g e
  • 3. Gurpreet Kaur et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 Table1: Keys and Key size Key Name Key Size AES 256 DES 64 RSA 80 MD5 128 4).DES:- The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world. For many years, and among many people, “secret code making” and DES have been synonymous meaning it operates on plaintext blocks of a given size (64-bits) and returns cipher text blocks of the same size. 5).RSA:- RSA is an algorithm for public-key cryptography, involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. It protected user data include encryption prior to storage, user authentication procedures prior to storage or retrieval, and building secure channels for data transmission [16]. IV. PERFORMANCE ANALYSIS PARAMETERS The data will be encrypted using the algorithms such as, AES, DES, BLOWFISH, RSA, Blowfish and MD5.By using these algorithms, the speed-up ratio and the mean processing time for different inputs are calculated. 4.1. Speed-Up ratio is defined as the difference between the mean processing time of single system and the cloud network. Speed-up ratio will provide tell us how fast the data have been encrypted. It will give us the idea about speed of encryption. 4.2. Mean processing time is the difference between the starting time taken to encrypt the data and the ending time. It is also evaluated both on single system and on cloud network. It is the difference between the time taken to encrypt the data. As the size of input increases the time taken to encrypt the data will increase and with the increase in time speed-up ratio decreases. www.ijera.com is referred to as Platform as a Service (PaaS). In this category, One example is Google’s App Engine, it provides a runtime environment and set of API’s [16]. For interaction with Google’s cloud runtime, applications are run on “sandboxed” environment. As the request increases for an application, App engine offers automatic scaling for web application. Google app handles languages such as python and java. Google App is free up to certain level of consumed resources, charges applied for the additional storage and bandwidth [16, 4]. Experimental evaluation is done on eclipse-SDK and Google App engine. The evaluation is done for different input sizes: 10KB, 13KB, 39 KB, and 56 KB. For the data security, we have used five encryption algorithms: AES, DES, BLOWFISH, RSA and MD5.These five algorithms are implemented in the “sandboxed” environment using Eclipse .Eclipse is an integrated development environment which is used to build and run the applications. Using java on eclipse the algorithms are run on local as well as on Google app engine. VI. RESULTS Comparing Speed-up ratio and Mean time are used to select the highest security algorithm. Five encryption algorithms are being used namely AES, DES, BLOWFISH, RSA and MD5 Table 2: Comparison of Mean processing time of the algorithms on local system as well as on cloud network In A A DE DE BL BL RS RS pu ES ES S S O O A A t C CL WF WF CL L O ISH ISH OU O U CL D U D OU D D 10 11 1. 7.5 2 4 2 238 274 kb .5 5 .25 13 14 2 10 2.5 4.7 2 328 331 kb .7 .25 .5 39 21 3 31. 6.5 8.2 2.7 358 351 kb 5 5 5 .5 .7 56 24 3. 50. 9.2 15. 3 496 415 kb .5 75 25 5 7 .25 .25 Mean processing time is calculated in milliseconds. V. METHODOLOGY The users implement their application for deploying them on the cloud. Cloud software environment provider supplies the developers with programming-level-environment with well defined set of API’s. The service commonly provided by this layer www.ijera.com 784 | P a g e M D5 MD 5 CL OU D 1 1 1 1 1 1 1 0.5
  • 4. Gurpreet Kaur et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 www.ijera.com 600 500 AES 400 DES 300 BLOWFISH 200 RSA 100 MD5 0 10 KB13 KB39 KB56 KB Fig 3: Comparison of Local mean time for algorithms with different input sizes. 600 500 AES 400 DES 300 BLOWFISH 200 RSA 100 MD5 0 10 KB13 KB39 KB56 KB Fig 4: comparison of Cloud mean time for algorithms with different input sizes. Table 3:Speed-up ratio of the algorithms for different input sizes INPUT AES DES BLOWFISH RSA MD5 10 KB 7.6 3.62 2 0.86 1 13 KB 7.2 4 2.3 0.99 1 39 KB 7 4.8 3 1.01 1 56 KB 6.6 5.43 5.25 1.19 0.5 Fig 5: Comparison of speed-up ratio of the algorithms for different inputs. From the Tabular results, the following observations can be made, using eclipse run variable input sizes on local as well as on Google App engine. Among all the algorithms RSA-an asymmetric encryption algorithm is average most time consuming and MD5 is-hashing algorithm is the least tie consuming. AES-a symmetric encryption algorithm, the speed-up ratio falls sharply with the increase in input size.AES algorithm has the highest speed-up ratio and then is DES. In MD5and AES algorithm the speed up ratio decreases with the increase in size. Whereas DES, RSA and BLOWFISH remains almost constant. There is a slight change in the speed-up ratio for DES, RSA and BLOWFISH. VII. CONCLUSION Decade’s earlier algorithms are implemented on single processor system, but now encryption and decryption techniques are implemented on cloud network. Simulation for different algorithms will be done on the eclipse. The results will be obtained on basis speed-up ratio and performance parameter. All the algorithms are applied on both the cloud network and single system. From the above results, when you are interested in performance of algorithm, go for MD5, BLOWFISH, AES and DES. For the security of data, go for the MD5 and AES.MD5-hashing encryption algorithm is the highest security algorithm. Finally for less time and more secure algorithm, chose MD5 followed by AES. REFERENCES [1] [2] www.ijera.com Amazon Web Services "Overview of Security Processes "http://aws.amazon.com/ August 2013 Bruce Schneier. "The Blowfish Encryption Algorithm Retrieved ",October 25, 2008 785 | P a g e
  • 5. Gurpreet Kaur et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 www.ijera.com [3] Center Of The Protection Of National Infrastructure CPNI by Deloitte"Information Security Briefing 0112010 Cloud Computing", p.71, Published March 2010 [4] Google App Engine. http://code.google.com/appengine/, Aug 2013 [5] http://en.wikipedia.org/wiki/Google_App _Engine. Cited Aug 2013 [6] http://www.dummies.com/how-to/content /what-is-cloud computing.html#glossarycloud_computing, cited on Aug 21,2013 [7] http://www.dummies.com/how-to/content/ cloud-computing-cheat-sheet.html .cited on Aug 21, 2013 [8] http://www.webopedia.com/TERM/C/cloud _ computing.htmlcited on Aug 21, 2013 [9] https://bluelabelhost.com/whatisthecloud, cited on Aug 21,2013 [10] http://en.wikipedia.org/wiki/Triple_DES,cit ed on Aug 21,2013 [11] Jim zierick,”elevate cloud security with privilege delegation”http://www.ibm.com/ developerworks/cloud/library/cl-datacenter migration, Dec 2011 [12] luis m. vaquero1, luis rodero-merino1 , juan caceres1, maik lindner2 "a break in the clouds: towards a cloud. [13] Ritika Chehal, Kuldeep Singh” Efficiency and Security of Data with Symmetric Encryption Algorithms” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 8, August 2012 [14] Sherif El-etriby, Eman M. Mohamed, Hatem S. Abdul-kader” Modern Encryption Techniques for Cloud Computing Randomness and Performance Testing”in ICICT ,800-805 ,2012.Definition ", ACM SIGCOMM Computer Communication Review, Vol. 39, No. 1, 2009 [15] Priyanka Arora, Arun Singh, Himanshu Tyagi “Analysis of performance by using security algorithm on cloud network” in international conference on Emerging trends in engineering and management (ICETM2012), 23-24 June , 2012 [16] Priyanka Arora, Arun Singh, Himanshu Tyagi “ Evaluation and Comparison of Security Issues on Cloud Computing Environment” in World of Computer Science and Information Technology Journal (WCSIT) ISSN: 22210741 Vol. 2, No. 5, 179-183, 2012 www.ijera.com 786 | P a g e