
International Journal of Pure and Applied Mathematics Volume 120 No. 6 2018, 27-38 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ DATA SECURITY IN CLOUD STORAGE USING ELLIPTICAL CURVE CRYPTOGRAPHY 1S. Arun, M.E., 2N. R. Shanker 1Research Scholar, 2Ph.D, Professor/ Supervisor-Aalim Muhammed Salegh College of Engineering Department of Computer and Science Engineering PRIST University, Thanjavur, Tamilnadu Abstract: Computational applications and data cloud computing. The elements of the cloud architecture processing are increasing rapidly that large servers and were interfaced through the application programs. The data centre is required for quick processing within the application program was divided into two segments specified time. A major shift in the way Information namely front end and back end. Providing an example for Technology (IT) and computing services is that the a cloud computing, the user stores the data and program results are delivered and purchased results in the cloud in the cloud memory, the cloud agent provides the link computing development. The out of control power cost between the data and program components in such a way that includes personal hardware, electricity generation that the program codes do not know the location of the and data centre's limited space have promoted a specific stored data. The users gain profit by reducing its work of number of enterprises to transfer many infrastructures scheduling their workload, and the cloud agents provide into a third-party cloud. However, Cloud computing the interfaces between different users interfaced with the needs that organisations should prove that the platforms cloud infrastructure. This process of providing maximum of a service provider are secured and should provide control to the cloud agents generate many security enough level of integrity for the client's data. Elliptical concerns in maintaining integrity and confidentiality in curve cryptography is a public key encryption method accessing the workload by cloud users. that is based on elliptical curve theory, and this method The main advantage of the cloud computing is can be applied for creating faster, smaller and efficient providing virtualisation. The virtualisation can be cryptographic keys. A critical factor is the strength of the generated for hardware’s, application programs and also key that is the problem in key and acquiring the plain for middlewares. A security system is required to text. overcome the security threat in the virtualisation environment. Many researches are taking place to Keyword: ECC, RSS, Honey Algorithms, Symmetric, improve the security in virtual environments. The Asymmetric algorithm, cloud computing. research in the cloud security provides the knowledge that existing security schemes will not be perfect for 1. Introduction securing the cloud systems. The security requirement and the threat models are unique for the cloud system. The The origin of grid computing promoted the development security in the cloud system was implemented in two of cloud computing, providing security for the cloud data layers. First layer is to isolate the workloads from each is a major issue faced by Information Technology user and second is to provide security for their Community. Cloud computing is a new concept which workloads. Many solutions are provided to generate becomes a rising technology that increasing the attentions isolation of workloads were virtualisation based security of industrial organisations and educational institutions. mechanism is promoted for providing isolation between The limitations in the maintenance of storage devices the users. promote the enterprises to move to cloud computing, Securing an individual workload is a harder task were the cloud storages are maintained by the third party were the cloud computing provides the support for grid providers. Cloud computing provides a link between the computing which provides the link between physical and central remote servers and the network to handle data and virtual servers. The network framework of the cloud remote services. This technology provides flexibility in computing is represented in figure 1. handling the applications and data from the cloud without installing any additional software in their computers only need is to connect their computers with the internet. Handling the data in the cloud provides more advantages on maintaining the hardware system. The Cloud architecture comprises of client systems which provide the data and applications to the cloud storage and the cloud components which provides the 27 International Journal of Pure and Applied Mathematics Special Issue Figure 1. Cloud Computing Architecture Figure 2. Symmetric Encryption Three entities involved in the cloud computing are The Asymmetric key algorithm uses different keys users, cloud service providers and the third party to encrypt and decrypt the data bit. The keys are auditors. Securing the data in cloud service required represented as public and private keys, where the data cryptographic encryptions which isolates the users from owner handles the private key, and the public key is accessing others information or workload. The data provided to the authorised recipients. The specific private stored in the cloud server was encrypted and the user key will decrypt the data encrypted by the recipient access the data from the cloud server will decrypt the public key. Figure 3 shows the flow of the asymmetric data with the key provided for access. The encryption is algorithm. The data is more secured in transmitting using the process of converting the plain information into a asymmetric encryption. The asymmetric algorithm takes chipper text. The chipper text is an order less or much time for execution than the symmetric algorithm. meaningless information which is generated by the encryption algorithm in the certain pattern. Decryption is the process of converting the chipper text into the original plain text. The decryption algorithm reverses the process of encryption to generate the plain text. The main aim of the encryption algorithm is to generate a tough chipper text which should be ordered to decrypt without using the proper decrypt key. The size of the key proportionally toughens the decryption of chipper text without a proper key. Selecting the encryption algorithm is very important. The quality of the encryption algorithm should be maintained strictly. The algorithm looks promising may be very easy to break. A tougher encryption algorithm to be selected to secure the data from attack. The encryption algorithms are divided into two important types. They are symmetric and asymmetric encryption algorithm. The type is generated based on the type of key Figure 3. Asymmetric Encryption used to encrypt and decrypt the information bit. Symmetric encryption uses a common key for This process also provides authentication for the users. encryption and decryption process. Thus maintaining the Digital signatures are also used for authentication of security in exchanging key between sender and receiver users. Hashing is used to generate fixed length variables plays a vital role. Figure 2 shows the flow of the which are used to generate the digital signature to protect symmetric key algorithm. the data form unauthorised users. Drawbacks of the symmetric algorithm Symmetric key cryptography needs to exchange key with the receiver before transferring the chipper text. Any mode of communication is vulnerable to attack so transferring the key through the network is vulnerable to 28 International Journal of Pure and Applied Mathematics Special Issue attack only way to exchange the key securely is by decrypt, & sign to this number of attributes in the transferring personally. functions. [3] Digital signatures cannot be used for authenticating Sensors integration along with cloud-based on the users in the network. analysis and data storage has the potential to increase the efficiencies, adaptability and resilience of dealing with 2. Literature Survey the smart infrastructure. A standout context application is a smart grid; it gives an electricity rescue service on an In Ciphertext-policy, attribute-based encryption (CP- ability to protect, monitor and optimise the different ABE) aim is a key management collaborative protocol. functions are connecting the components by using the Our structure makes as a distributed generation, storage service provider into a consumer. An ability to manage and issue of private keys it is not contributing extra and read smart grid evaluations are remotely by infrastructure. A quick attribute revocation and fine- employing the wireless sensors significantly that grained is allowed for key modify.[1] The known appropriate grid operators to load balance, on-demand technology is cryptography that is based on Attribute to enable services and efficiently for different entities. fine-grained access data control and guarantee data.[3] A Anywhere the cloud infrastructure adoption in smart grid fine-grained access data control system along with poses to deal with the sensor data, its important risks to computation outsourcing and ciphertext update in fog consumers privacy and data security. This data can be calculating for an Internet of Things (IoT).[3] This disclosed to unwarranted parties or malicious, on the advanced collaborative mechanism is effectively solve potential for different security attacks, its accountability, key exposure and key escrow issues.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages12 Page
-
File Size-