(Cloud Security Alliance) security in cloud computing is a biggest

advertisement
Establishment of Secure Channel for Data Communication in Cloud
Computing
Nishit Mishra1, Anil Saroliya2, Varun Sharma3
1,2,3
Amity School of Engineering & Technology, Amity University Rajasthan
data
Abstract
Cloud computing is one of the hottest
security.
This
hybrid
Mechanism
guarantees the confidentiality of the data in
topics trending right now and when a new
the clouds.
technology
Keywords: Cloud Computing, DES, RSA,
is
introduced
there
also
challenges with it, the biggest concern is
MD5, Hybrid Encryption.
security. According to CSA (Cloud Security
Alliance) security in cloud computing is a
1. Introduction:
biggest challenge. To enhance the security of
Cloud computing is the backbone for many
Data communication in cloud computing, a
small, medium and large scale companies and
hybrid of cryptographic algorithm based on
many user look for cloud services, the major
DES and RSA is introduced. In this paper our
concern is the security of their data in the
targeted proposed approach is based on
cloud. Securing data is always of vigorous
hybrid cryptographic DES algorithm that will
importance and because of the critical nature
be used in between data transmission due to
of cloud computing and the large amount of
its faster encryption speed. RSA will be used
complex data it carries, the necessity is even
for encrypting the data as per its stronger
more essential. Hereafter, concerns regarding
encryption power and safe key distribution.
the data security and privacy are
This dual encryption ensures the safe
the hurdle to the wide acceptance of cloud
communication of data in clouds. Digital
computing services.
becoming
abstract algorithm MD5 is also used. By
To secure data communication in cloud
comparing the Digital Signature sent by the
computing a hybrid encryption algorithm
sender and the result of the digital signature
which is based on RSA and DES encryption
of the plaintext by the receiver ensures the
it also includes MD5 and digital signature for
3. HYBRID ENCRYPTION
secure communication [1].
Hybrid Encryption is a technique of
2. SECURITY CONCERNS IN CLOUD
COMPUTING
combining two or more encryption schemes.
Cloud computing is the latest trending
combines the convenience of a public key
topic in every field. Now a days cloud
cryptosystem with the efficiency of a
computing
many
symmetric key cryptosystem. In this, DES
applications whether it is for mobile or
(data encryption standards) and RSA (Rivest
Desktop or in Medical field it is everywhere.
Shamir Adleman) algorithms are used along
In
with MD5 to ensure the safe and reliable
every
are
new
integrated
application
in
clouds
are
A
hybrid
cryptosystem
is
one
which
integrated, Technology giants like Microsoft
transmission
and Google Provides many services based on
algorithms have their individual strengths and
cloud like cloud storage, resource sharing and
weaknesses and by combining the strengths
on demand services are some of its examples.
of these algorithms we get a hybrid which has
Not only big companies
but
small
companies are investing in cloud services
because of its elasticity, pay per use, on
demand service and etc. But the bigger
of
information.
Both
the
advantages of both which overcomes their
disadvantages [3, 4].
4. PROPOSED ALGORITHM
4.1 Sending side
question is are they secure, are the security
standards enough to secure the essential
Find Message Digest using
Step 1
:
Step 2
:
information of the user.
According
to
CSA
(Cloud
Security
Calculate 2’s Compliment of
Alliance) Data breach is the top threat in
cloud computing along with Account of
Message.
Calculate XOR of 2’s
Step 3
:
Step 4
:
Encrypt XOR using RSA
Step 5
:
Encrypt MD using DES
Service Hijacking and Insecure interface or
API are included [2, 5].
MD5.
compliment and MD5
Send Encrypted MD and
Step 6
:
Encrypted Data
Figure 1 presents the flow of algorithm of
sender. Encrypted MD can be sent once for a
session.
4.2 Receiving Side
Step 1
:
Decrypt MD using DES.
Step 2
:
Decrypt Data using RSA
Step 3
:
Calculate XOR of Decrypted
Data and Decrypted MD
Step 4
:
Take 2’s Complement of
resultant
Figure 2 presents the flow of algorithm of
receiver side.
Figure2: Flow Diagram at receiver side
This algorithm applied on the both sending
and the receiving side and then we get the
efficient method for the encryption and
decryption.
4. Conclusion
Today, cloud computing has become the
backbone
of
technologies
the
are
society.
depending
All
the
upon
latest
Cloud
Technology as it offers low infrastructure cost
and helps in reducing the investment whether its
infrastructure or platform or software.
Figure1: Flow Diagram at sender side
Through this paper we have endeavored to
Cloud Computing”, International journal
present a hybrid algorithm which first establishes
of Advanced Research in Computer
a secure channel for data communication using
Science and Software Engineering., ISSN:
RSA and DES cryptographic algorithms, with the
227 128X, pp 110-114
help of generated Message Digest which will
ensures that the data will be transferred reliably.
4. References
[1]. L. Yu, Z. Wang and W. Wang, “The
Application
of
Hybrid
Encryption
Algorithm in Software Security”, IEEE
Computer Society, 762-765 , pp 10-112009
[2]. CLOUD SECURITY ALLIANCE the
Notorious Nine: Cloud Computing Top
Threats in 2013.
[3]. W. Ren and Z. Miao, “A Hybrid
Encryption Algorithm Based on DES and
RSAin Bluetooth Communication”, IEEE
Computer Society, 221-225 , pp 10-112009
[4]. Elichiro Fujisaki, Tatsuaki Okamoto,
David Pointcheval and Jacques Stern,
RSAOAEP is secure under the RSA
assumption, Journal of Cryptology, 2002
[5]. K.S. Suresh and K.V. Prasad, “Security
Issues
and
Security
Algorithms
in
Download