SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar – Apr. 2015), PP 110-114
www.iosrjournals.org
DOI: 10.9790/0661-1725110114 www.iosrjournals.org 110 | Page
Enhancing Cloud Computing Security for Data Sharing Within
Group Members
P.Krithika[1]
, G.Linga Dilipan[2]
, M.Shobana[3]
1
(Department Of Computer Science And Engineering,SNS College Of Technology,Anna University,India)
2(Department Of Computer Science And Engineering,SNSCollege Of Technology,AnnaUniversity,India)
3(Department Of Computer Science And Engineering,SNSCollege Of Technology,AnnaUniversity,India)
Abstract: In cloud computing , the following security functions are commonly considered are as follows, Cloud
Data confidentiality ensures the owner that the stored data can be accessed only by an intended user and Cloud
Data authentication ensures the group member that the data was accessed by a specified owner and the data was
not altered en route. To provide these two functions,the Dynamic Group key protocol relies on one trusted entity,
KGC (Key Generation Center), to choose the key, which is then transported to involved members. System uses
interval based Interval Based algorithm for re-keying which not only reduce the key generation and sharing
complexity, but also improves the owner data sharing efficiency and security.The main security goals for
dynamic group key based data sharing in cloud to encrypt the data before sharing. Besides, the designated group
manager can reveal the identity of the signature’s originator when a dispute occurs, which is denoted as
traceability.The goal is to secure the data sharing within group members,comparing AES algorithm with other
encrypted algorithm and to analysis which algorithm suits for encrypting the data.
Keywords: Bit Mangling , Cipher, Cryptanalysis.
I. Introduction
Cloud computing is typically defined as a type of computing that relies on sharing computing resources
rather than having local servers or personal devices to handle applications.In cloud computing,[1] the word cloud
is used to denote the metaphor “The Internet” so the wordcloud computing means "Cloud computing is a large
pool of systems where it is connected in private or public networksinorder to provide dynamically scalable
infrastructure for application, data and file storage - are delivered to an organization's computers and devices
through the InternetSecurity issues in cloud computing has played a major role in slowing down its acceptance,
in fact security is a main issue in cloud computing.
II. Issues
Some of the issues appear in the cloud computing are:
 Identity privacy:
The problem in adopting cloud computing is identity privacy.In cloud computing [2] without assurance
of identity privacy,there is little doubt to join in this,because the privacy are not maintained properly ,the
identities of the user can be disclosed to various kinds of intruders and cloud service providers(CSP).
 No Multiple-owner manner:
The single owner can be able to store and modify the data file because it is less flexible than multiple-
owner.In amultiple-owner manner the member can able to read the data and alter their data files but the group
manager can store and modify data in the cloud.
 Effect of Dynamic Groups:
Primarily, new granted users are not allowed to read the content of data files stored before their
participation by the anonymous system, because itimpossible management it is desirable to obtain an efficient
membership.
Here is the graphical representation of survey ranking security challenges:
Enhancing Cloud Computing Security for Data Sharing Within Group Members
DOI: 10.9790/0661-1725110114 www.iosrjournals.org 111 | Page
Figure 1: Results of survey ranking security challenges
From above figure,[3] security could improve due to centralization of data and increased security-
focused resources. On the other hand, there is a loss of control over certain data, and the lack of security for
storing kernels entrusted to cloud providers. If cloud providers have not done good jobs in securing their own
environments, the consumers may be at risk. Measuring the quality of cloud providers the security is more
difficult because many cloud providers will not expose their infrastructure to customers. This is a survey were
more specific to the different security issues and the associated challenges that has been in the cloud computing
system.
III. Types of Clouds
There are various types of cloud they are:
1.Public cloud: It is the one of the cloud inwhere the cloud services are being available tousers via a service
provider over the Internet.It provides a control mechanism to the users.
2.Private Cloud: It provides many advantages over public cloud , but the main difference between public and
private cloud is that the data is managed properly within the organization only, without the limits of network
bandwidth.
3.Community Cloud: It is basically managed by a group of originations that have a common objective to
achieve. The members can share and access the data in the cloud.
4.Hybrid Cloud: This is the combination of both public and private cloud. It is defined as multiple cloud
systems,where they are connected in a way that allows programs and data to be moved easily from one system to
another.
IV. Comparison
In cloud computing,for securing the data sharing within agroup members, we can encrypt the data using
various encryption algorithm such as AES,DES,RSA,Blowfish and Broadcast algorithm.By considering any two
algorithms we can justify which algorithm is suitable for data sharing within a group members.Here we are going
to consider about AES and other encrypted algorithms.
V. AES Algorithm
AES is a block cipher with a block length of about 128 bits. It allows three various key lengths they are128 ,192
and 256 bits.
We used [5] AES with 128 bit key length. The encryption process for128-bit keys consists of 10 rounds.
22%
16%
13%12%
9%
9%
7%
6%
6%
SURVEY RANKING SECURITY CHALLENGES
Security
Privacy/legalissues
Certain apps are too core/critical
Cost
Perfoemance/availability
Cultural/politicalissues
Contracts/liabilityconcern
Visibilityinto services across cloud
Infrastructurereadiness/network
Enhancing Cloud Computing Security for Data Sharing Within Group Members
DOI: 10.9790/0661-1725110114 www.iosrjournals.org 112 | Page
16 byte encryption key, in the form of 4-byte words are expanded into a key schedule consisting of 44
4-byte words. The 4 x 4 matrix of bytes made from 128-bit input block is referred to as the state array.Encryption
can begin for any round-based processing , the first four words of the schedule is XORed for input state.
Figure 2: The flowchart of AES Encryption algorithm
For encrypting , each round consist of the following four steps:
1.Sub Bytes
This step involves sample resistance from differential and linear cryptanalysis attacks. SubByte is byte-
by-byte substitution where each byte is substituted independently using Substitution table (S-box). In SubBytes
each input byte is partitioned into 24-bit patterns, each representing an integer value between 0 and 15 which can
be then interpreted as hexadecimal values. Left digit contains the row index and the right digit contains the
column index of S-box. At the intersection of row and column,the value given is substituted. There can be
possible of sixteen distinct byte-by-byte substitutions. It is constructed by a combining of GF (28) arithmetic and
bit mangling.
Figure 3: Sub Bytes Transformation Step
2.Shift Rows
The purpose of this step is to provide diffusion of the bits over multiple rounds. First,the row 0 in the
matrix is not shifted, row 1 is circular left shifted by one byte, next row 2 is circular left shifted by two bytes, and
then row 3 is circular left shifted by three bytes.
Enhancing Cloud Computing Security for Data Sharing Within Group Members
DOI: 10.9790/0661-1725110114 www.iosrjournals.org 113 | Page
Figure 4: ShiftRows Transformation Step
3.Mix Columns
Like previous step, the purpose of this step is to provide diffusion of the bits over multiple rounds. This
is achieved by performing multiplication one column at a time. Each value in the column is multiplied with every
row value of a standard matrix. Then,the results of these multiplications are XORed together. For e.g. value of
first byte B1’’ is multiplied by 02, 03, 01 and 01 and XORed to produce new’ B1’ of resulting matrix. The
multiplication continues again one matrix row at a time against each value of a state column.
Figure 5: MixColumns Transformation Step
4.Add RoundKey
In this step, the matrix is XORed with the round key. The original key contains 128 bits/16 bytes which
are represented in the form of 4x4 matrix. This 4 words key where each word will have 4 bytes,then it converts
to a 43 words key.
VI. Comparing Aes With Other Algorithms
The fact that the cipher and its inverse use different components practically eliminates the possibility for
weak and semi-weak keys in AES, which is an existing drawback of DES. Also, the nonlinearity of the key
expansion practically eliminates the possibility of equivalent keys inthe AES. A performance comparison the
encrypted algorithm such as AES, DES[6] and Triple DES for different microcontrollers shows that AES has a
computational cost of the same order as required for Triple DES . Another performance evaluation reveals that
AES has an advantage over algorithms-3DES, DES and RC2 in terms of execution time (in milliseconds) with
different packet size and throughput (Megabyte/Sec) of encryption as well as decryption. Also in the case of
changing data type such as image instead of text, it has been found that AES has an advantage over RC2, RC6
and Blowfish in terms of consuming time[7].
Figure 6:Comparison of Time and Block Size.
The key-size of the algorithms may vary. Like-Key size of Blowfish algorithm contains128 to 448 bits
and AES algorithm contains 128,192,256 bits. The key length of AES is less than Blowfish. 2048 bits of
asymmetric key are equivalent to 112 bits of symmetric key.
Enhancing Cloud Computing Security for Data Sharing Within Group Members
DOI: 10.9790/0661-1725110114 www.iosrjournals.org 114 | Page
VII. Conclusion
According to report,security plays a major role in data sharing[8] within a group members.The user can
avail cloud services[9] and cloud providers have a justify security issue.
AES algorithm is used to encrypt the data before sharing the data within a group members.AES
algorithm performs well in both hardware and software when comparing to other encrypted algorithms.It
requires only less memory consumption and there is no serious weak keys in the AES.It supports any block size
and key sizes.
According to AES algorithm is better than other algorithms. Though each cloud infrastructure has its
own security strengths; the user can choose infrastructure according to his security requirements.[10] AES
provides security to cloud users as encrypted data in the cloud is safe from many attacks.
References
[1]. Armbrust. M, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and
M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
[2]. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and JingboYan,“Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.24, NO. 6, JUNE 2013
[3]. F. Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”,IDCeXchange, Available:
<http://blogs.idc.com/ie/?p=730> [Feb. 18, 2010].
[4]. MohitBhansali and AbhaSachde“Enhancing Cloud Computing Security using AES Algorithm”International Journal of
computer apllications(0975 – 8887) Volume 67- No.9, April 2013.
[5]. NIST, FIPS PUB 197, “Advanced Encryption Standard (AES),” November 2001 [Online].
Available:http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[6]. Sanchez-Avila, C., and R. Sanchez-Reillol. "The Rijndael block cipher (AES proposal): a comparison with DES." Security
Technology, 2001 IEEE 35th International Carnahan Conference on. IEEE, 2001
[7]. Elminaam, DiaaSalama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud."Performance Evaluation of
Symmetric Encryption Algorithms." IJCSNS International Journal of Computer Science and Network Security 8.12 (2008): 280-286.
[8]. Enterprise and Individual Users to fuel Growth in Cloud Computing [Online].
Available:http://www.redorbit.com/news/technology/1112692915/cloud-computing-growth-paas-saas-091212/
[9]. Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast [Online].
Available:http://www.idc.com/getdoc.jsp?containerId=236552.
[10]. John Harauz, Lori M. Kaufman and Bruce Potter, ―Data security in the world of cloud computing ―, 2009 IEEE CO Published by
the IEEE Computer and Reliability.

More Related Content

What's hot (20)

PDF
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
PDF
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
PDF
Fs2510501055
IJERA Editor
 
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
PDF
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
PDF
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
IJCSIS Research Publications
 
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
PDF
Security Issues related with cloud computing
IJERA Editor
 
PDF
Password authentication in cloud
IJERA Editor
 
PDF
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline
 
PDF
Kamal Jyoti V3I5-0161
Kamal Jyoti
 
PDF
H43064650
IJERA Editor
 
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
PDF
Secure Access to Outsourced Databases
IOSR Journals
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
PDF
Cloud computing security through symmetric cipher model
ijcsit
 
PDF
As03302670271
ijceronline
 
PDF
L018137479
IOSR Journals
 
PDF
Dn35636640
IJERA Editor
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Fs2510501055
IJERA Editor
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
IJCSIS Research Publications
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
Security Issues related with cloud computing
IJERA Editor
 
Password authentication in cloud
IJERA Editor
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline
 
Kamal Jyoti V3I5-0161
Kamal Jyoti
 
H43064650
IJERA Editor
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Secure Access to Outsourced Databases
IOSR Journals
 
International Journal of Engineering Research and Development
IJERD Editor
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
Cloud computing security through symmetric cipher model
ijcsit
 
As03302670271
ijceronline
 
L018137479
IOSR Journals
 
Dn35636640
IJERA Editor
 

Viewers also liked (13)

PDF
Insee - les entreprises en France
Société Tripalio
 
PPT
Attaining data security in cloud computing
Gopinath Muthusamy
 
PPTX
Ensuring data storage security in cloud computing
Uday Wankar
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PPTX
Cloud Computing Security
Nithin Raj
 
PPTX
Data storage security in cloud computing
Sonali Jain
 
DOCX
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
PDF
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Pavlos Stefanis
 
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
PDF
Dissertation on MF
PIYUSH JAIN
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PPTX
Data security in cloud computing
Prince Chandu
 
Insee - les entreprises en France
Société Tripalio
 
Attaining data security in cloud computing
Gopinath Muthusamy
 
Ensuring data storage security in cloud computing
Uday Wankar
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Cloud Computing Security
Nithin Raj
 
Data storage security in cloud computing
Sonali Jain
 
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Pavlos Stefanis
 
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
Dissertation on MF
PIYUSH JAIN
 
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud security ppt
Venkatesh Chary
 
Data security in cloud computing
Prince Chandu
 
Ad

Similar to Enhancing Cloud Computing Security for Data Sharing Within Group Members (20)

PDF
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
IRJET Journal
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PDF
Exploring Cloud Encryption
Samuel Borthwick
 
PDF
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
PDF
Kp3419221926
IJERA Editor
 
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
PDF
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
 
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
PDF
deep dive down on how NCLA works in IOTs
gavrielsembiring
 
PDF
Cloud Cryptography
ijtsrd
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
PDF
Big data security_issues_research_paper
Luisa Francisco
 
PDF
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
 
PDF
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
PDF
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
rahulmonikasharma
 
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
PDF
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Exploring Cloud Encryption
Samuel Borthwick
 
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
Kp3419221926
IJERA Editor
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
deep dive down on how NCLA works in IOTs
gavrielsembiring
 
Cloud Cryptography
ijtsrd
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Big data security_issues_research_paper
Luisa Francisco
 
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
 
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
Application of Elliptical Curve Cryptography in Empowering Cloud Data Security
rahulmonikasharma
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Ad

More from iosrjce (20)

PDF
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
PDF
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
PDF
Childhood Factors that influence success in later life
iosrjce
 
PDF
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
PDF
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
PDF
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
PDF
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
PDF
Student`S Approach towards Social Network Sites
iosrjce
 
PDF
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
PDF
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
PDF
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
PDF
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
PDF
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
PDF
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
PDF
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
PDF
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
PDF
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
PDF
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
PDF
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
PDF
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
Childhood Factors that influence success in later life
iosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
Student`S Approach towards Social Network Sites
iosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 

Recently uploaded (20)

PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
site survey architecture student B.arch.
sri02032006
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 

Enhancing Cloud Computing Security for Data Sharing Within Group Members

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar – Apr. 2015), PP 110-114 www.iosrjournals.org DOI: 10.9790/0661-1725110114 www.iosrjournals.org 110 | Page Enhancing Cloud Computing Security for Data Sharing Within Group Members P.Krithika[1] , G.Linga Dilipan[2] , M.Shobana[3] 1 (Department Of Computer Science And Engineering,SNS College Of Technology,Anna University,India) 2(Department Of Computer Science And Engineering,SNSCollege Of Technology,AnnaUniversity,India) 3(Department Of Computer Science And Engineering,SNSCollege Of Technology,AnnaUniversity,India) Abstract: In cloud computing , the following security functions are commonly considered are as follows, Cloud Data confidentiality ensures the owner that the stored data can be accessed only by an intended user and Cloud Data authentication ensures the group member that the data was accessed by a specified owner and the data was not altered en route. To provide these two functions,the Dynamic Group key protocol relies on one trusted entity, KGC (Key Generation Center), to choose the key, which is then transported to involved members. System uses interval based Interval Based algorithm for re-keying which not only reduce the key generation and sharing complexity, but also improves the owner data sharing efficiency and security.The main security goals for dynamic group key based data sharing in cloud to encrypt the data before sharing. Besides, the designated group manager can reveal the identity of the signature’s originator when a dispute occurs, which is denoted as traceability.The goal is to secure the data sharing within group members,comparing AES algorithm with other encrypted algorithm and to analysis which algorithm suits for encrypting the data. Keywords: Bit Mangling , Cipher, Cryptanalysis. I. Introduction Cloud computing is typically defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.In cloud computing,[1] the word cloud is used to denote the metaphor “The Internet” so the wordcloud computing means "Cloud computing is a large pool of systems where it is connected in private or public networksinorder to provide dynamically scalable infrastructure for application, data and file storage - are delivered to an organization's computers and devices through the InternetSecurity issues in cloud computing has played a major role in slowing down its acceptance, in fact security is a main issue in cloud computing. II. Issues Some of the issues appear in the cloud computing are:  Identity privacy: The problem in adopting cloud computing is identity privacy.In cloud computing [2] without assurance of identity privacy,there is little doubt to join in this,because the privacy are not maintained properly ,the identities of the user can be disclosed to various kinds of intruders and cloud service providers(CSP).  No Multiple-owner manner: The single owner can be able to store and modify the data file because it is less flexible than multiple- owner.In amultiple-owner manner the member can able to read the data and alter their data files but the group manager can store and modify data in the cloud.  Effect of Dynamic Groups: Primarily, new granted users are not allowed to read the content of data files stored before their participation by the anonymous system, because itimpossible management it is desirable to obtain an efficient membership. Here is the graphical representation of survey ranking security challenges:
  • 2. Enhancing Cloud Computing Security for Data Sharing Within Group Members DOI: 10.9790/0661-1725110114 www.iosrjournals.org 111 | Page Figure 1: Results of survey ranking security challenges From above figure,[3] security could improve due to centralization of data and increased security- focused resources. On the other hand, there is a loss of control over certain data, and the lack of security for storing kernels entrusted to cloud providers. If cloud providers have not done good jobs in securing their own environments, the consumers may be at risk. Measuring the quality of cloud providers the security is more difficult because many cloud providers will not expose their infrastructure to customers. This is a survey were more specific to the different security issues and the associated challenges that has been in the cloud computing system. III. Types of Clouds There are various types of cloud they are: 1.Public cloud: It is the one of the cloud inwhere the cloud services are being available tousers via a service provider over the Internet.It provides a control mechanism to the users. 2.Private Cloud: It provides many advantages over public cloud , but the main difference between public and private cloud is that the data is managed properly within the organization only, without the limits of network bandwidth. 3.Community Cloud: It is basically managed by a group of originations that have a common objective to achieve. The members can share and access the data in the cloud. 4.Hybrid Cloud: This is the combination of both public and private cloud. It is defined as multiple cloud systems,where they are connected in a way that allows programs and data to be moved easily from one system to another. IV. Comparison In cloud computing,for securing the data sharing within agroup members, we can encrypt the data using various encryption algorithm such as AES,DES,RSA,Blowfish and Broadcast algorithm.By considering any two algorithms we can justify which algorithm is suitable for data sharing within a group members.Here we are going to consider about AES and other encrypted algorithms. V. AES Algorithm AES is a block cipher with a block length of about 128 bits. It allows three various key lengths they are128 ,192 and 256 bits. We used [5] AES with 128 bit key length. The encryption process for128-bit keys consists of 10 rounds. 22% 16% 13%12% 9% 9% 7% 6% 6% SURVEY RANKING SECURITY CHALLENGES Security Privacy/legalissues Certain apps are too core/critical Cost Perfoemance/availability Cultural/politicalissues Contracts/liabilityconcern Visibilityinto services across cloud Infrastructurereadiness/network
  • 3. Enhancing Cloud Computing Security for Data Sharing Within Group Members DOI: 10.9790/0661-1725110114 www.iosrjournals.org 112 | Page 16 byte encryption key, in the form of 4-byte words are expanded into a key schedule consisting of 44 4-byte words. The 4 x 4 matrix of bytes made from 128-bit input block is referred to as the state array.Encryption can begin for any round-based processing , the first four words of the schedule is XORed for input state. Figure 2: The flowchart of AES Encryption algorithm For encrypting , each round consist of the following four steps: 1.Sub Bytes This step involves sample resistance from differential and linear cryptanalysis attacks. SubByte is byte- by-byte substitution where each byte is substituted independently using Substitution table (S-box). In SubBytes each input byte is partitioned into 24-bit patterns, each representing an integer value between 0 and 15 which can be then interpreted as hexadecimal values. Left digit contains the row index and the right digit contains the column index of S-box. At the intersection of row and column,the value given is substituted. There can be possible of sixteen distinct byte-by-byte substitutions. It is constructed by a combining of GF (28) arithmetic and bit mangling. Figure 3: Sub Bytes Transformation Step 2.Shift Rows The purpose of this step is to provide diffusion of the bits over multiple rounds. First,the row 0 in the matrix is not shifted, row 1 is circular left shifted by one byte, next row 2 is circular left shifted by two bytes, and then row 3 is circular left shifted by three bytes.
  • 4. Enhancing Cloud Computing Security for Data Sharing Within Group Members DOI: 10.9790/0661-1725110114 www.iosrjournals.org 113 | Page Figure 4: ShiftRows Transformation Step 3.Mix Columns Like previous step, the purpose of this step is to provide diffusion of the bits over multiple rounds. This is achieved by performing multiplication one column at a time. Each value in the column is multiplied with every row value of a standard matrix. Then,the results of these multiplications are XORed together. For e.g. value of first byte B1’’ is multiplied by 02, 03, 01 and 01 and XORed to produce new’ B1’ of resulting matrix. The multiplication continues again one matrix row at a time against each value of a state column. Figure 5: MixColumns Transformation Step 4.Add RoundKey In this step, the matrix is XORed with the round key. The original key contains 128 bits/16 bytes which are represented in the form of 4x4 matrix. This 4 words key where each word will have 4 bytes,then it converts to a 43 words key. VI. Comparing Aes With Other Algorithms The fact that the cipher and its inverse use different components practically eliminates the possibility for weak and semi-weak keys in AES, which is an existing drawback of DES. Also, the nonlinearity of the key expansion practically eliminates the possibility of equivalent keys inthe AES. A performance comparison the encrypted algorithm such as AES, DES[6] and Triple DES for different microcontrollers shows that AES has a computational cost of the same order as required for Triple DES . Another performance evaluation reveals that AES has an advantage over algorithms-3DES, DES and RC2 in terms of execution time (in milliseconds) with different packet size and throughput (Megabyte/Sec) of encryption as well as decryption. Also in the case of changing data type such as image instead of text, it has been found that AES has an advantage over RC2, RC6 and Blowfish in terms of consuming time[7]. Figure 6:Comparison of Time and Block Size. The key-size of the algorithms may vary. Like-Key size of Blowfish algorithm contains128 to 448 bits and AES algorithm contains 128,192,256 bits. The key length of AES is less than Blowfish. 2048 bits of asymmetric key are equivalent to 112 bits of symmetric key.
  • 5. Enhancing Cloud Computing Security for Data Sharing Within Group Members DOI: 10.9790/0661-1725110114 www.iosrjournals.org 114 | Page VII. Conclusion According to report,security plays a major role in data sharing[8] within a group members.The user can avail cloud services[9] and cloud providers have a justify security issue. AES algorithm is used to encrypt the data before sharing the data within a group members.AES algorithm performs well in both hardware and software when comparing to other encrypted algorithms.It requires only less memory consumption and there is no serious weak keys in the AES.It supports any block size and key sizes. According to AES algorithm is better than other algorithms. Though each cloud infrastructure has its own security strengths; the user can choose infrastructure according to his security requirements.[10] AES provides security to cloud users as encrypted data in the cloud is safe from many attacks. References [1]. Armbrust. M, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010. [2]. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and JingboYan,“Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.24, NO. 6, JUNE 2013 [3]. F. Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”,IDCeXchange, Available: <http://blogs.idc.com/ie/?p=730> [Feb. 18, 2010]. [4]. MohitBhansali and AbhaSachde“Enhancing Cloud Computing Security using AES Algorithm”International Journal of computer apllications(0975 – 8887) Volume 67- No.9, April 2013. [5]. NIST, FIPS PUB 197, “Advanced Encryption Standard (AES),” November 2001 [Online]. Available:http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. [6]. Sanchez-Avila, C., and R. Sanchez-Reillol. "The Rijndael block cipher (AES proposal): a comparison with DES." Security Technology, 2001 IEEE 35th International Carnahan Conference on. IEEE, 2001 [7]. Elminaam, DiaaSalama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud."Performance Evaluation of Symmetric Encryption Algorithms." IJCSNS International Journal of Computer Science and Network Security 8.12 (2008): 280-286. [8]. Enterprise and Individual Users to fuel Growth in Cloud Computing [Online]. Available:http://www.redorbit.com/news/technology/1112692915/cloud-computing-growth-paas-saas-091212/ [9]. Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast [Online]. Available:http://www.idc.com/getdoc.jsp?containerId=236552. [10]. John Harauz, Lori M. Kaufman and Bruce Potter, ―Data security in the world of cloud computing ―, 2009 IEEE CO Published by the IEEE Computer and Reliability.