Store, Access and Share Confidential Data Using Elliptic Curve Cryptosystem on Cloud Ashlekha Jain1, Prof
Total Page:16
File Type:pdf, Size:1020Kb
ISSN XXXX XXXX © 2019 IJESC Research Article Volume 9 Issue No. 5 Store, Access and Share Confidential Data using Elliptic Curve Cryptosystem on Cloud Ashlekha Jain1, Prof. Dr. Aradhana. D2 Student1, Guide2 Department of CSE Ballari Institute of Technology & Management, Ballari, India Abstract: Cloud is the big paradigm shift from storing data on local storage devices to storing digital data on centralized cloud. With many advantages, Cloud storage comes with once major user concern: Security and Privacy. The pace with which cloud usage is increasing, demand for user data integrity has also increased because user data on Cloud could be exposed to bigger audience if compromised. Therefore, presently RSA has been the most popular cryptographic scheme used by Cloud Service Provider to secure Cloud Data.This paper is intended to design a security service for Cloud data using Elliptic Curve Cryptography Scheme (ECC). This scheme has advantage of smaller key size compared to RSA for same level encryption and decryption. Various studies have also shown that ECC requires less resources in terms of CPU cycle and memory. Keywords: Cloud Architecture, Cloud Security, Cloud Services, Cloud Service Model, Cryptography and Elliptic Curve Cryptography. I. INTRODUCTION Applications can be easily migrated from one physical server to another. Cloud is the method to save data to another off-site storage system that is owned and maintained by a third party. Rather A. The Cloud Architecture than storing information to user’s own computer's hard drive The basic architecture for cloud data storage is or other local storage device, he/she saves it to a remote illustrated in figure 1. The three different identifiable network database. The Internet is the communication channel that entities are as follows: User, Cloud Service Provider (CSP) connects user to the remote storage. Security is one of the and Software Applications. challenging issues in terms of upload and store confidential data to cloud system. In this paper, we have discussed implementation concepts for cloud security using Elliptic curve algorithm as this is better than RSA in terms of key size and security level about confidential data. II. CLOUD STORAGE SYSTEM When Why Cloud computing? Various advantages of Cloud have made it the most preferable technology in current scenario. For better understanding of cloud as technology, first step is to know about its characteristics. a. Automated Service Catering: Once the user configures computing logic and requirements, system automatically cater services such as server time and network storage without further human intervention. Figure.1. cloud data storage architecture. b. Range of access technology supported: Data is stored on User can store and access data through any digital media servers and can be accessed through single standard protocol devices like workstation or smart phones or handheld by using like Laptops, Desktops, tablets or mobile phones. devices, using Internet as the communication channel. User c. On-Demand Optimum Resource utilization: The Service Interface is responsible for converting User Requests into a Provider owns resources like storage, processing, memory and Service Provisioning Request. Software Application network bandwidth. The Cloud Service Provider uses multi- processes the request and provides Cloud Storage Services to tenant model and allocate both physical and virtual resources the User and same configuration request is sent over to to multiple consumers based on demand. Cloud Servers. Cloud Storage Servers are the physical d. Transparency in Service Usage: Resource usage can be resources owned and controlled by a third-party service monitored, controlled, and reported, providing transparency provider. To cater requirement of user that varies from one to for both the provider and consumer of the utilized service. other users, virtual storage pools are created and assigned to e. Virtualization: Virtualization technology allows servers respective users, this is charged by the Cloud Service and storage devices to be shared and utilization is increased. Provider. International Journal of Engineering Science and Computing, May 2019 22448 http://ijesc.org/ B. Cloud Service Models One issue with cloud computing is that the management of the The Cloud Security Alliance has defined three delivery models data which might not be fully trustworthy; the risk of in cloud architecture, which are shown in the Figure 2 Below. malicious insiders in the cloud and the failure of cloud services have received a strong attention by companies.” [2] III. CHOICE OF EFFICIENT ENCRYPTION TECHNIQUE A. Concept of Cryptography There are mainly two kinds of cryptographic systems 1. Symmetric key cryptography 2. Public key cryptography. Figure.2. Cloud Service Model 1. Symmetric-key algorithm – There is single secret key that is used by both sender and receiver. Secure Key sharing with “Infrastructure as a Service (IaaS): IaaS provides cloud sender and receiver must be performed before data consumers high level of control and responsibility of transmission. As same key is used for both encryption and configuration and utilization of IT-resources like virtual server decryption, security of Key and its sharing is important aspect. instances and storage, APIs hardware, networks and operating 2. Asymmetric – Set of two keys viz: Public Key & Private systems. Key are used at both sender and receiver. The public key is Platform as a Service (PaaS): PaaS provides cloud consumers made available to all whereas sender and receiver maintain a ready-made environment comprised of already deployed and Private Key individually. Encrypt is used by using Private configured IT resources. Here, consumers have lower level of Key of sender and Public Key of receiver, similarly decryption control over the deployed applications. is performed using Public Key of Sender and Private Key of Software as a Service (SaaS): SaaS provides cloud consumers receiver. to use and configures cloud service. A cloud consumer has 3. Combined: Key used for encryption/decryption is very limited administrative control over SaaS implementation symmetric but is transferred between sender and receiver The maintenance, management and implementation of cloud using Asymmetric method. [3] services are done by cloud service provider.” [1] a. Cryptography is used for addressing the network security problems. C. Cloud Classification 1. Data Integrity: It refers to maintain correctness of data Clouds are classified into 4 types depending upon their sizes where data is not edited by any unauthorized person or is and usage. compromised in any sense. “Public cloud: A public cloud is an infrastructure or 2. Authentication: It determines whether data is accessed by environment, which is publicly accessible and is owned by an authenticated user or not, to whom access, or permission third party cloud service provider. In this, CSP provides the has been granted. same infrastructure resources over the Internet to all the 3. Non-Repudiation: It deals with the assurance that sender customers of public cloud with limited configurations, security cannot deny sending a message that they originated. protection and dynamic availability. 4. Secrecy: Security of data. [4] Private cloud: A private cloud is an infrastructure or b. Data Storage on Cloud includes security, key storage, CPU environment that is meant for an organization. Data in private usage etc. RSA has been found the most commonly used cloud are more secured and controlled as compared cryptographic scheme for Cloud Data. In RSA algorithm the to the public cloud. Private cloud can be hosted in on premise security strength is directly proportional to the key size. or by externally trusted third party. Therefore, larger the key size more is the security. But larger Community cloud: A Community cloud is an infrastructure key size demands for more storage capacity to store key in or environment that is meant for more than one organization key server. The cryptosystem called elliptic curve with specific community i.e. shares common and specific cryptography which uses two set of keys Public and Private. needs such as policy compliance, security and privacy. Cloud Even with lesser key size compared to RSA. [5] service provider may manage the community cloud or organizations and may be hosted on-premises or off c. ECC is chosen over RSA due to following advantages: premises. Shorter keys are as strong as long key for RSA. Hybrid cloud: Integration of two or more clouds (private, Low on CPU consumption. community, or public) forms hybrid cloud to meet the unique Low on memory usage. requirements of an organization by performing different Size of encrypted data is smaller. functions.” [1] In today’s world ECC algorithm is used in case of key exchanges by certificate authority (CA) to share the public D. Security Threats in Cloud key certificates with end users. Elliptic Curve Cryptography Security is considered as one of the most critical aspects in is a secure and more efficient encryption algorithm than RSA everyday computing and it is not different for cloud as it uses smaller key sizes for same level of security as computing due to sensitivity and importance of data stored on compared to RSA. For e. g. a 256-bit ECC public key the cloud. “Cloud Computing infrastructure uses new provides comparable security to a 3072-bit RSA public key. technologies and services, most of which haven’t been fully The aim of this work is providing an insight into