SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
A Comparative Review on Data Security Challenges in Cloud Computing
Signaler
IRJET Journal
Suivre
Fast Track Publications
19 Oct 2017
•
0 j'aime
•
90 vues
A Comparative Review on Data Security Challenges in Cloud Computing
19 Oct 2017
•
0 j'aime
•
90 vues
IRJET Journal
Suivre
Fast Track Publications
Signaler
Ingénierie
https://www.irjet.net/archives/V3/i1/IRJET-V3I157.pdf
A Comparative Review on Data Security Challenges in Cloud Computing
1 sur 6
Télécharger maintenant
1
sur
6
Recommandé
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
271 vues
•
3 diapositives
Cloud Computing Security Issues
Stelios Krasadakis
571 vues
•
18 diapositives
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
206 vues
•
154 diapositives
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
292 vues
•
8 diapositives
Cloud security and services
Jas Preet
318 vues
•
31 diapositives
Cloud security (domain6 10)
Maganathin Veeraragaloo
273 vues
•
143 diapositives
Contenu connexe
Tendances
Cloud Computing Security Issues
Discover Cloud Computing
10.1K vues
•
24 diapositives
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
245 vues
•
11 diapositives
Cloud Data Protection for the Masses
IRJET Journal
28 vues
•
5 diapositives
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
125 vues
•
5 diapositives
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
404 vues
•
4 diapositives
wp-security-dbsec-cloud-3225125
Gabor Bokor
155 vues
•
15 diapositives
Tendances
(20)
Cloud Computing Security Issues
Discover Cloud Computing
•
10.1K vues
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
•
245 vues
Cloud Data Protection for the Masses
IRJET Journal
•
28 vues
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
•
125 vues
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
•
404 vues
wp-security-dbsec-cloud-3225125
Gabor Bokor
•
155 vues
Cloud Security Issues 1.04.10
Rugby7277
•
699 vues
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
•
314 vues
Cloud Computing Security
Dhaval Dave
•
9K vues
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
•
135 vues
Enhanced security framework to ensure data security
eSAT Publishing House
•
367 vues
Ijaprr vol1-1-1-5dr tejinder
ijaprr
•
310 vues
Security Issues in Cloud Computing
Jyotika Pandey
•
1.5K vues
Ad4502189193
IJERA Editor
•
224 vues
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
•
143 vues
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
•
218 vues
Cloud computing security issues and challenges
Dheeraj Negi
•
30.2K vues
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
•
13K vues
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
•
31 vues
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
•
2.5K vues
Similaire à A Comparative Review on Data Security Challenges in Cloud Computing
How secured and safe is Cloud?
IRJET Journal
2 vues
•
3 diapositives
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
24 vues
•
7 diapositives
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
338 vues
•
6 diapositives
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
45 vues
•
7 diapositives
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
219 vues
•
5 diapositives
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
90 vues
•
5 diapositives
Similaire à A Comparative Review on Data Security Challenges in Cloud Computing
(20)
How secured and safe is Cloud?
IRJET Journal
•
2 vues
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
•
24 vues
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
•
338 vues
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
•
45 vues
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
•
219 vues
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
•
90 vues
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
•
17 vues
Using the scenario from the Week One assignment, write a 2- to 3-p.docx
rociobradford
•
6 vues
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
•
314 vues
Cloud computing seminar report
shafzonly
•
1.1K vues
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
•
371 vues
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
•
32 vues
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
•
1.6K vues
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
•
14 vues
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
•
1.4K vues
Cloud computing security through symmetric cipher model
ijcsit
•
315 vues
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
•
57 vues
Cloud computing
Dulith Kasun
•
1K vues
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
•
38 vues
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
•
452 vues
Plus de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
6 vues
•
7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
3 vues
•
7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
3 vues
•
5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
2 vues
•
11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
3 vues
•
6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
3 vues
•
5 diapositives
Plus de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
6 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
3 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
3 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
2 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
3 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
3 vues
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
2 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
2 vues
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
2 vues
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
2 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
5 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
6 vues
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
2 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
2 vues
Understanding the Nature of Consciousness with AI
IRJET Journal
•
2 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
4 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
2 vues
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
2 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
2 vues
Dernier
Google Cloud Study Jam | GDSC NCU
Shivam254129
32 vues
•
54 diapositives
UNIT IV REFRIGERATION PRINCIPLES ...
karthi keyan
44 vues
•
44 diapositives
UNII II ELECTRICAL SYSTEMS IN BUILDINGS
karthi keyan
40 vues
•
59 diapositives
impulse-and-load-test-rig.pptx
Neometrix_Engineering_Pvt_Ltd
18 vues
•
11 diapositives
[RecSys2023] Challenging the Myth of Graph Collaborative Filtering: a Reasone...
Daniele Malitesta
17 vues
•
34 diapositives
Work in Offline First Apps – Sync Datasources with WorkManager.pptx
JosephMuasya2
20 vues
•
26 diapositives
Dernier
(20)
Google Cloud Study Jam | GDSC NCU
Shivam254129
•
32 vues
UNIT IV REFRIGERATION PRINCIPLES ...
karthi keyan
•
44 vues
UNII II ELECTRICAL SYSTEMS IN BUILDINGS
karthi keyan
•
40 vues
impulse-and-load-test-rig.pptx
Neometrix_Engineering_Pvt_Ltd
•
18 vues
[RecSys2023] Challenging the Myth of Graph Collaborative Filtering: a Reasone...
Daniele Malitesta
•
17 vues
Work in Offline First Apps – Sync Datasources with WorkManager.pptx
JosephMuasya2
•
20 vues
Chapter 9. Classification Advanced Methods.ppt
Subrata Kumer Paul
•
15 vues
DBMS
KaranSingh274675
•
24 vues
Resilient Kafka: How DNS Traffic Management and Client Wrappers Ensure Availa...
VanessaVuibert1
•
64 vues
Master's Encyclopedia Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
•
26 vues
OpenOCD-K3
Nishanth Menon
•
51 vues
GOOGLE CLOUD STUDY JAM INFO : GDSC NIET
YashiGupta410690
•
87 vues
Sensor and transducers.ppt
karthik R
•
7 vues
UNIT-V FIRE SAFETY INSTALLATION
karthi keyan
•
64 vues
Master's Transcript Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
•
39 vues
Three Phase Induction Motor.pptx
NoorulAmin67
•
13 vues
Chapter 2. Know Your Data.ppt
Subrata Kumer Paul
•
11 vues
Prefix and Suffix.pptx
TamsaPandya
•
8 vues
CODING AND MARK-WPS Office.pptx
sri jayaram institute of engineering and technology
•
16 vues
Building a Digital Thread
TaylorDuffy11
•
61 vues
A Comparative Review on Data Security Challenges in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 334 A Comparative Review on Data Security Challenges in Cloud Computing Manpreet Kaur1, Kiranbir Kaur2 1 M.Tech Scholar, Computer Engineering and Technology Department, Guru Nanak Dev University, Punjab, India 2 Asst Prof, Computer Engineering and Technology Department, Guru Nanak Dev University, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is a model which provides on-demand delivery of Information Technology (IT) related capabilities or resources through the Internet to the outside world. Despite the advantages of cloud computing, the security of the data and resources is still doubtful which affect the cloud adoption. The raising amount of personal and confidential data brings up attention on storing the data securely. Data can be composed of financial transactions, vital documents, and multimedia contents. Implementation of cloud computing services may minimize local storage trust in addition decrease operational and maintenance costs. However, the users still have major privacy and security concerns about their data stored on remote servers due to potential unauthorized access among the service providers. So, these concerns bring focus on security issues related to cloud computing which is the reason why most of the industries still not adopting cloud server for the storage of their critical data. Cloud computing does not provide transparency to users to view where their data is being stored and users have to trust the service provider for handling and maintaining their data. Also, it does not provide users to access the audit logs because many users are sharing the same cloud server so audit activity of one tenant might constitute a transparency for another tenant. In this paper, the extreme focus is given to the security challenges related with cloud’s service models, deployment models, and issues related to networking capabilities are discussed and studied. In addition, the existing symmetric and asymmetric encryption algorithms utilized to render security in cloud computing environment are reviewed. Furthermore, the comparative analysis of different encryption algorithms based upon few parameters is also been performed. Key Words: Cloud Computing, Cloud Security Challenges, Encryption Algorithms. 1. INTRODUCTION Cloud computing is a model that enables the development, deployment and delivery of products and services to the customers with a pay-as-you-go model. It is a service model that involves the idea of storing and accessing the resources over the Internet rather than storing them on- premise. Basically, cloud computing has motivated academia, industry, businesses to take over this technology to host their applications on the cloud so as to cut-off the cost of buying the on-premise local server. As per Gartner survey [14], the cloud market is anticipated to rise from $76.9B in 2010 to $210B in 2016. These revenues connote that it is a promising platform. Types of Service models provided by cloud are described below: Software as a service (SaaS): SaaS is a software delivery model that provides access to software and its functions operating on a remote cloud infrastructure offered by cloud providers. Salesforce.com offering in the customer relationship management (CRM) space was the innovator to provide software as a service. Other examples include online word processing and spreadsheet tools, Gmail, WhatsApp, and SAP. Platform as a service (PaaS): PaaS provides the framework for deploying and delivering of applications and services. It allows developers to develop new applications without any pressure of buying expensive tools and managing the local servers. Examples include Hadoop, Microsoft Azure, Force.com, and Google App engine. Infrastructure as service (IaaS): IaaS provides the infrastructure such as network, memory, storage, processor to the users on demand. Examples include Amazon EC2, Windows Live Skydrive, and Rackspace Cloud. Deployment models identified for cloud architecture are described below: Public Cloud – The pubic cloud refers to sharing of computing infrastructure by many customers and they have no control and visibility over the computing resources where infrastructure is hosted.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 335 Private Cloud – The private cloud does not share infrastructure with other organizations and dedicate to the particular organization. In terms of security and cost, a private cloud exceeds public clouds. Hybrid cloud – The hybrid cloud makes usage of both of the clouds discussed above. Organizations may host less critical data on the public cloud and confidential data on the private cloud. Community Cloud - The community cloud is used where several organizations share the similar infrastructures. It may exist on premise or off premise. Now the question arises, if cloud computing is so powerful, why isn’t everyone adopting it? In the cloud, the clients don’t have knowledge about what’s happening inside. In addition to this, even if the cloud provider is honest, it can have eavesdropper who can fiddle with the VMs and defiles confidentiality and integrity. Clouds are still susceptible to data confidentiality, integrity, availability, privacy issues plus some internal and external attacks. This paper primarily aims to give an insight to cloud consumers and providers about various security challenges and how they can tackle these challenges through encryption algorithms. The comparative analysis of various encryption algorithms is also presented. This paper is arranged as follows. Section II explores the security challenges in cloud computing. Section III introduces related work for further reading. In section IV, we explore the comparative analysis of existing encryption algorithms. Finally section V, concludes this paper. 2. SECURITY CHALLENGES IN CLOUD COMPUTING Security is the important aspect for many organizations for cloud adoption. Confidentiality, authentication, integrity, non-repudiation and availability for client’s systems are the general principles of security. Access control is another important factor for security. There are lots of security threats to cloud computing. A single flaw in one client application could allow a malicious hacker to acquire access to more than one client’s data. This problem is known as data breaches. The data loss is another issue that happens when the unauthorized user may delete or alter the entire records in the cloud if there is the vulnerability in cloud provider side. Insecure APIs and weak interfaces are another common security challenges in cloud computing. When confidential data is stored in it, the extreme focus should be given to the security of the cloud. Figure 1 shows the hierarchy of various security challenges in cloud computing. Generally, three types of deployment model are further classified as Public, Private and Hybrid and the security issues related to these models have been discussed. In the same way, the service model is categorized further as IaaS, PaaS, and SaaS stating its security issues in common. At last, the network related issues are discussed. 2.1 Security challenges in deployment models To raise the facility of access in the organizations assorted users and departments across the organization allow sharing of assorted resources but alas lead to data breach problem. Cloning leads to the problem of data leakage concealing the machine’s authenticity. Basically, the cloning deals with duplicating and replicating the data. Resource Pooling refers to the unauthorized access because of sharing through the same network. Furthermore, in a shared multi-tenant environment when any user consumes some unequal amount of resources then some resource contention issues might occur. Authentication and Identity Management is one of the another big issue associated with deployment models in cloud-based systems. 2.2 Security challenges in service models Typically the web browser is used for delivering applications in SaaS to cloud consumer. Since intruders are using the web to do malicious activities. So, there is a threat to data because the issues like data leakage, malicious attacks and in the case of disaster backup and storage can lead to unauthorized access of sensitive data. PaaS inherits security issues related to third-party web services. In the case of PaaS, the developers use the platform provided by cloud providers for deployment of the secure applications that can be hosted on the cloud and these PaaS applications should be upgraded frequently. This in turns affects security. Privacy and security can also be threatened because data may be stored in different locations with different legal authorities. So, the developer must be aware of legal issues related to data to ensure that data is stored in apropos locations. Service Hijacking is also considered to be as one of the topmost threat in which an unauthorized user gains an illegal access on certain authorized service. Generally in IaaS, computer hardware is provided to the consumer which can be threatened by physical attacks and there can be a lack of data security on replaced or repaired storage devices. 2.3 Network related security challenges Cloud computing principally depends on servers, the internet and remote computers in managing, storing and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 336 Fig -1: Classification of Security Challenges [12] maintaining data. Therefore, the security issues associated with the network are of the prime concern. It provides on- Demand access to the high-speed data transmission rate, application, software, and resources to the users. But apart from this, the network infrastructure also faces various attacks and security challenges which are listed in the above diagram. 3. RELATED WORKS L. Tawalbeh, N.S. Darwazeh, R.S. Al-Qassas and F. AlDosari (2015) [1], proposed an efficient cloud storage model that provides confidentiality and integrity through data classification and minimizes the complexity and processing time needed to encrypt the data by applying TLS, AES and SHA security mechanism based on the type of classified data. They tested the proposed model with assorted encryption algorithms, and their simulation results showed the efficiency and reliability. This paper is established on the idea of manual classification of data and not the automatic classification and other encryption algorithms such as RSA, Elliptic curve cryptography, and asymmetric public key can be used to provide the higher level of security and confidentiality. N. Sengupta and R. Chinnasamy (2015) [2], designed an encryption algorithm Hybrid DESCAST to provide the security to the massive amount of data sent through the internet. Through proposed algorithm, they tackled the limitations of both DES and CAST Block Cipher Algorithm and analyzed that the computation time and complexity for encryption and decryption is higher than the respective DES and CAST algorithm. In addition to this, they concluded that combining 128-bit key and 64-bit key cipher algorithms, the brute-force attack and attacks via birthday problems were averted and the algorithm is more robust. S.K. Sood (2013) [9], proposed a security model that keeps the most confidential and critical data on the private cloud and rest of it on the public cloud and for checking the integrity of the data at the public cloud this model uses the hash codes. He proposed cloud security model that associates a role to each user and stores the role of the user in the database for user authorization process and operations can be performed by the user with respect to their roles. Also, for security purpose, this model uses dual verification scheme for key authentication on one layer and user authentication by using username and password on another layer. A cryptographic process is proposed for keeping data secure on the cloud. He analyzed the model against various types of attacks. This model is compared with various existing cloud security frameworks and the simulation results showed that this technique is much more robust, efficient and faster than other existing models. Furthermore, this model is efficient in terms of cost because it stores highly sensitive data on the private cloud and less critical data on the public cloud, where storage cost of data is relatively very less.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 337 J.J. Hwang, Taoyuan, Taiwan, Y.C. Hsu and C.H. Wu (2011) [4], has proposed a data security model using encryption and decryption algorithms. The model used such a mechanism that the cloud service provider can perform storage and encryption/decryption tasks. The drawback of this method is that the user or data owner has no control of data. J. Lai, R. H. Deng, C. Guan and J. Weng (2013) [5], proposed an Attribute-Based Encryption (ABE) and decryption method in the cloud-based system to provide data security. They have been designed such a decryption algorithm which is based on the user-requested attributes of the outsourced encrypted data. The limitation of this method is that it emphasis more computational and storage overhead on cloud service provider for checking the user attributes with the outsourced encrypted data. Although these overheads of the cloud server can be minimized by introducing third party auditor. F. Moghaddam F, Karimi O and Alrashdan M T (2013) [6], reviewed the comparative analysis of six different symmetric key cryptographic algorithms in a cloud-based environment. They proposed two sorts of cloud servers; that is cloud and data servers. The limitation of this method is that it creates storage and computation overheads of maintaining two separate servers. W. Liu (2012) [7], discussed the security problems in cloud computing, strategies to combat security problems and demonstrated various cloud perimeters. He analyzed that the service availability and data privacy in the cloud- based systems are of the primal concern in security and through comparative analysis he judged that security problem cannot be tackled through single security method and many conventional and recent technologies and strategies must be needed for protecting the cloud-based systems. A. Behl and K. Behl (2012) [8], investigated the security challenges based on the four views such as cloud architecture view, delivery model view, characteristics view, and the stakeholder view. They investigated few solutions through which the dynamic cloud model can be secured. They discovered that how the existing issues exist in nowadays cloud model owing to confidentiality and integrity loss, SLA issues, elasticity, multi-tenancy, insecure management and cloud federation implications. Ryan K L Ko et al. (2011) [9], presented the model known as Trust Cloud, which addressed the accountability in cloud computing through the use of five abstraction layer architecture. They also discussed issues which were encountered in accomplishing a trusted cloud. They have proposed detective instead of preventive approaches for raising accountability since later complement the former. J.K. Wang and X. Jia (2012) [10], described several methods to secure user data such as authentication interface, single encryption, and multi-level virtualization. The other main topic of their paper is Authentication intercloud based on CA and PKI model. G L Prakash, Dr. M. Prateek and Dr. I. Singh (2014) [11], proposed an efficient data encryption and decryption using 256 bit symmetric key with rotation for securing the highly critical remote data in cloud paradigm. They conducted an experiment on the variable size text files repository and it showed that the proposed method is superior to existing methods. Also, they introduced the mechanism for securing the cloud server from unauthorized users. In addition, they have also demonstrated the performance analysis of encryption and decryption algorithms. 4. EXISTING ENCRYPTION ALGORITHMS FOR CLOUD SECURITY Cryptography is the one of the technique of the modern network security technologies that enables us to send secure data over an insecure channel and to protect valuable data on the internet, extranet, and the intranets. Encryption algorithms play a vital role for providing the secure transmission for sending and retrieving the data over the networks. It converts the letter to create a coded message, traditionally called as the cipher, which is used to convert a readable data called plaintext into scrambled, unreadable message called ciphertext. This conversion process makes the use of key (private key or public key) and authorized user can only decrypt the cipher text back to plain text. Basically, there are two methods for carrying out this process which are Symmetric key and asymmetric key encryption. The former make use of one key and the latter uses both keys for encrypting and decrypting the data. DES was the primary encoding normal to be counseled by National Institute of Standards and Technology. Several attacks and ways have witnessed weaknesses of DES that created it associate unsafe block cipher. Triple DES systems are more secure and slower than single DES. AES is stronger and faster than triple-DES. Blowfish is a block cipher algorithm which uses the variable length key. Blowfish is superior in performance and processing time. RC5 is a variable length, byte-oriented stream cipher. It is widely used for web SSL/TLS, wireless WEP. RSA is slower than certain other symmetric cryptosystems. It is the secure algorithm whose security depends on the process of factoring massive integers. DSA uses exponentiation in a finite and based on the difficulty of computing discrete logarithms. Diffie-Hellman is secret key exchange method. The algorithm uses a one-way function that is easy to encrypt and hard or difficult to
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 338 decrypt. The limitation of this algorithm is the lack of authentication. 5. COMPARATIVE ANALYSIS OF VARIOUS ENCRYPTION ALGORITHMS Table -1: Comparative Analysis of Algorithms 6. CONCLUSIONS Today, cloud computing is the technology being talked across industries due to its efficiency, the flexibility of resources, pay-per-use model, dynamic scalability, faster time-to-market, increased collaboration and cost efficiency. Despite its advantages, many organizations are still not adopting it because of security reasons associated with it. This paper analyzes the problem of security
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 339 associated with cloud. Encryption is the foremost option for securing the data and this paper highlights comparative analysis of symmetric as well as asymmetric encryption algorithms for providing security in cloud computing systems. REFERENCES [1] L. Tawalbeh, N.S. Darwazeh, R.S. Al-Qassas and F. AlDosari. ’A secure cloud computing model based on data classification.’ Elsevier, pp 1153-1158, 2015. [2] N. Sengupta and R. Chinnasamy. ‘Contriving hybrid DESCAST algorithm for cloud security.’ Elsevier, pp 47-56, 2015. [3] S.K. Sood. ‘Hybrid data security model for cloud.’ International Journal of Cloud Applications and Computing, pp 50-59, 2013. [4] J.J. Hwang, Taoyuan, Taiwan, Y.C. Hsu and C.H. Wu. ‘A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service.’ International Conference on Information Science and Applications (ICISA), pp 1-7, 2011. [5] J. Lai, R H Deng, C. Guan and J. Weng. ‘Attribute-Based Encryption with Verifiable Outsourced Decryption.’ IEEE Trans. Inf. Forens. Security, vol 8, pp 1343-1354, 2013. [6] F. Moghaddam F, Karimi O and Alrashdan M T. ‘A Comparative Study of Applying Real-Time Encryption in Cloud Computing Environments.’ Proceedings IEEE 2nd International Conference on Cloud Networking (CloudNet), San Francisco, USA, pp 185-189, 2013. [7] W. Liu. ‘Research on cloud computing security problem and strategy.’ IEEE, pp 1216-1219, 2012. [8] A. Behl and K. Behl. ‘An analysis of cloud computing security issues.’ IEEE World Congress on Information and Communication Technologies, pp 109-114, 2012. [9] Ryan K L Ko et al.. ‘Trustcloud: a framework for accountability and trust in cloud computing.’ IEEE World Congress on Services, pp 584-588, 2011. [10] J.K. Wang and X. Jia. ‘Data security and authentication in hybrid cloud computing model.’ IEEE Global High Tech Congress on Electronics, pp 117- 120, 2012. [11] Prakash G L, DR. M. Prateek and Dr. I. Singh, ‘Data encryption and decryption algorithms using key rotations for data security in cloud system.’ IEEE, 2014. [12] Ms. Disha H. Parekh and Dr. R. Sridaran. ‘An Analysis of Security Challenges in Cloud Computing.’ International Journal of Advanced Computer Science and Applications, Vol 4, pp 38-46, 2013. [13] R. Buyya, J. Broberg and A. Gosscinnski. ‘Cloud computing.’ Hoboken, N.J.: Wiley; 2011. [14] L. Columbus, 'Forbes / Tech', Forbes.com, 2013. [Online].Available: http://www.forbes.com/sites/louiscolumbus/2013/ 02/19/gartner-predicts-infrastructure-services-will- accelerate-cloud-computing-growth/. BIOGRAPHIES Manpreet Kaur pursuing M. Tech in Computer Science & Engineering from Department of Computer Engineering & Technology, Guru Nanak Dev University, Amritsar, Punjab, India. Her research interests include Cloud Computing. Ms. Kiranbir Kaur is working as a professor in the Department of Computer Engineering & Technology, GNDU, Amritsar, Punjab, India. She has published many research articles in the National/International conferences. Her research interests include Cloud Computing.