You are on page 1of 6

International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

Analyzing Storage and Time Delay by Hybrid


Blowfish-Md5 Technique
Anushka Gaur Dr. Anurag Jain
M. Tech. Student, Computer Science Department, Assistant Professor (SG), Virtualization Department
Chandigarh Engineering college, Landran Mohali School of Computer Science and Engineering
meanushkagaur@gmail.com University of Petroleum & Energy Studies, Dehradun
anurag.jain@ddn.upes.ac.in

Dr. Amit Verma


Professor & Head, Computer Science Department
Chandigarh Engineering College, Landran, Mohali
hodcse@cecmohali.org

Abstract— In the field of networking, one of the emergent and administration remain intact and client’s duty. Some of
technologies is cloud computing whose popularity is increasing the attractive points associated with cloud are given as:
day by day. Various types of cloud services are provided by many
software companies(such as Salesforces, Microsoft, Amazon, etc) Resource Outsourcing: In cloud computing model, the
to their users. The cloud employment is reduced as the encrypted cloud vendor is responsible for acquisition and maintenance of
data storage and time increases. As the encrypted data is not hardware devices. The consumers are not required to provide
sliced or distributed form which increases its possibility of being their own hardware devices.
hacked or attacked. In this research paper, the hybrid
Utility computing: In case additional resources are
cryptographic algorithm is used to enhance data security by
using an encryption algorithm in the cloud and the results are
requested by the consumer or if there is no more need of the
analyzed on the basis of parameters like storage space and time ( resources then they can be allotted or released anytime.
both encryption and decryption time). This paper consists of the Large numbers of machines: A large number of
combination of Blowfish algorithm and MD5 hashing algorithm inexpensive machines construct a cloud. As a result, more
and comparison with EDS-AES cryptographic algorithm is capacity can be added easily using cloud vendor and failing
shown. machines are replaced instantly.
Keywords— Cloud Computing, Virtualization, Data Security, Automated resource management: The system
Encryption algorithms. administrator is responsible for managing all the typical
configuration work. For an instance, the backup and retrieval
I. INTRODUCTION options are being provided by many clouds. Malicious activity
offered, are monitored by some clouds.
On-demand computing is recognized as cloud computing
considering as computing which is based on the internet in Pay-per-use: Because the cloud computing allows its
which processing resources and computers are shared by customers to use resources as per their requirement so this
administering and other devices on the internet. In cloud makes it cost efficient up to some extent as it cuts the need to
computing processing and storage of data can be done in data purchase a software.
centers which may belong to a third party. In the present
scenario, cloud computing is seen as a fast developing area Virtualization: In clouds, usually there are virtual hardware
that can instantly supply extensible services by using internet resources because multiple users are sharing them for
with the help of hardware and software virtualization. The efficiency improvement. Virtualization is responsible for
biggest advantage of cloud computing is flexible lease and enhancing the utilization of hardware as it makes it possible to
release of resources as per the requirement of the user. Other share resources among multiple consumers [16].
benefits encompass betterment in efficiency, compensating the Although, there are numerous benefits of adopting the
costs in operations. It curtails down the high prices of latest cloud technology still there are privacy issues involved
hardware and software. in cloud computing because in the cloud at any time the data
From user’s perspective, the burden on users such as can outbreak the service provider and the information is
installation and maintenance of the software, framework, deleted purposely.
storage capacity etc. are transferred to the cloud service There are security issues of various kinds related with
provider. The responsibility such as installation and cloud computing falling into two broader categories: First, the
maintenance of hardware of the cloud is shifted away from the issues related to the cloud security that the cloud providers
customer. However, the application at a higher level of stack face (like software provided to the organizations,

978-1-5386-1887-5/17/$31.00 ©2017 IEEE

2985
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

infrastructure as a service). Secondly, the issues related to the Liu, Chang et al. in [7]have proposed a big structure which
cloud security that the customers experience (organizations provides an analysis on cloud authentication-based data
who store data on the cloud).The secure infrastructure and verification methods. In a simple aspect, a research problem is
applications protection are ensured by the service provider analyzed. First, the research motivations and methodologies
although their applications reinforced as the dimensions are are summarized for illustrating the research problem.
taken by the user and using strong passwords and Secondly, the representative approaches several current
authentication measures. A hybrid cryptographic algorithm is achievements are summarized and compared. Finally, future
proposed using Blowfish and MD5 schemes, which also developments view possibilities are introduced.
ensures the security.
Jain, Anurag et al. in [8] have analyzed different public
key cryptosystem and their respective homomorphic
properties. As people store their sensitive data on the cloud
which raise the risk of data confidentiality and integrity.
Although security can be enhanced by encryption that creates
a problem in searching the encrypted data and updating it. In
their work authors have used homomorphic encryption
techniques and have proposed a security model to enhance the
confidentiality and integrity of data.
Baek, Joonsang et al. in [9] have introduced smart grids for
big data information management and a safe cloud computing
based model called as Smart Frame. Cloud computing
hierarchical structure is built in their framework which
Fig 1: Cloud Computing Security model provides cloud services of a different type for managing all the
Symmetric block cryptographic algorithm weakness is information and doing analysis of the big data. By addressing
overcome by using a hybrid Blowfish-MD5 cryptographic critical security issues in the proposed framework, a security
algorithm. Hybrid Blowfish-MD5 algorithm efficiency and solution is provided which is planted on identity-based
effectiveness are demonstrated in the performance analysis encryption, signature and proxy re-encryption.
and experimental outcome obtained by showing its Sookhak et al. in [10] proposed an efficient Remote Data
comparison with EDS-AES cryptographic algorithm. Auditing (RDA) technique for cloud storage system which is
based on algebraic signature properties that incur minimum
II. LITERATURE REVIEW computational and communication costs. Divide and Conquer
Li et al. in [4] have described how many cloud applications table (DCT), a new data structure is also presented which can
has been restricted because of the critical issues of data support dynamic data structure efficiently such as append,
security and privacy. As sensitive data is reachable to the insert, modify and delete. In comparison between another state
cloud operators so an intelligent cryptography approach is of art RDA techniques and their proposed approach shows
proposed. Data is not directly reachable to the cloud service their approach is highly efficient and secure which helps in
operators. The distributed cloud servers is used to store the reducing the communication and computational costs on the
data after dividing the data file and the approach used is server and auditor.
Security-Aware Efficient Distributed Storage (SA-EDS) Gai, Keke et al. in [11] focuses on big data issues and its
model, including Alternative Data Distribution (AD2) practical implementation is considered in cloud computing. To
Algorithm, Secure Efficient Data Distributions (SED2) maximize the privacy protections efficiently, the approach
Algorithm and Efficient Data Conflation (EDCon) Algorithm. designed is Dynamic Data Encryption Strategy (D2ES). DED
Zhao et al. in [5] have proposed a security model for G- algorithm is what mainly support D2ES model that was
Hadoop which depends upon security methods such as SSL developed for encryptions of the dynamically alternative data
protocol and public key cryptography. The job submission package having different time constraints. The main aim of
process and users authentications are simplified by this this approach is maximizing the privacy protection with the
security framework. The traditional attacks protection is use of selective encryption strategy with the specific execution
provided to the G-Hadoop system by different security time requirements.
mechanisms in the designed security framework. Pasupuleti et al. in [12] described an effective way for
Manogaran et al. in [6] have proposed a Meta Cloud Data preserving the privacy of data which is used for mobile objects
Storage Architecture in Cloud Computing Environment for big data outsourcing and encrypting the data in the cloud
data protection. The user’s number that logged into the cloud environment by using probabilistic public key encryption
data center are found by using Map Reduce framework and algorithm. To retrieve an encrypted file from the cloud, the
the various data elements map to providers is protected by ranked keyword search is invoked. The aim of this approach is
using the proposed framework that is a Meta Cloud Data to achieve a data encryption system that is efficient without
Sortage interface. High implementation effort is required by data privacy sacrifice.
this proposed approach providing cloud computing Sood, Sandeep K. in [13] have given a specialized
environment valuable information. procedure and different techniques in a framework in which

2986
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

from beginning to end the data is being protected efficiently. chunks. Generally, the storage of encrypted files increases the
The three cryptographic parameters that the user presented are amount of space utilization which limits down the
based on the data classification i.e., Confidentiality (C), employment of cloud environment. So the proposed
Availability (A) and Integrity (I). Also follows method for framework helps to overcome this problem and also reduce the
information protection which involves the SSL (Secure Socket encryption as well as decryption time.The aim is to lessen the
Layer) 128-bit encryption and which can be brought upto 256- storage requirement of the encrypted information and reduce
bit as per the requirement, for integrity data check MAC the cracking probability of any data segment by employing the
(Message Authentication Code) is used. method of encryption by blowfish algorithm.
Shaikh, Rizwana et al. in [14] describe that how in cloud
computing, the active area of experimentations and research is A. Blowfish Algorithm
data security and privacy. A classification technique is Blowfish algorithm is a true robust symmetric key based
proposed in which on various dimensions basis, parameters cryptographic algorithm. It is mainly used for encrypting the
are defined. On the level bases, data security is provided in original data former to uploading the actual data to the cloud.
which protection is required and on data set classification Blowfish algorithm has a changeable key length of 332-448
bases at the storage security provisions is applied according to bits and it is a 64-bit block cipher[1]. There are two
their dimensions. The classification scheme that is proposed procedures that construct the blowfish algorithm: initializing
having sample dataset collected on the bases of which its the key and the phase in which data is encrypted. A user
efficiency is analyzed. variable key is expended in the first phase to subkey arrays of
4168/8336-byte, which is presented with element arrays size
Li, Yibin, et al. in [15] proposed an approach for secure of 4-byte or format arrays element size of 8-byte. The subkey
financial services in cloud computing on multimedia big data arrays (P entry-18 and four S arrays entry-256) generation
that novel approach is Semantic-Based Control (SBAC). The process is user key dependent. There is an increase in the
entitled proposed approach is Intercrossed Secure Big security level with the complexity enhancement of sub-keys
Multimedia Model (2SBM). This approach is basically and user key relation. In encryption process lately, instead of a
designed for secure accesses of the various media through user key, sub-keys that are updated are used. The input of 32-
multiple platforms provided by the cloud. The proposed model bit is divided into an input of 4 eight-bit quarters to S-boxes.
is supported by the main algorithms which include Ontology- The modular 232 is added to output and for producing the
Based Access Recognition (OBAR) Algorithm and the final output of 32-bit, XOR operation is used. Feistel network
Semantic Information Matching(SIM) Algorithm. is adopted by the blowfish for iterating the 16 (rounds) times a
Tripathi, Abhuday et al. in [16] have explored many simple function of encryption[2]. Similarly, for Blowfish
frameworks related to cloud computing and explained that decryption, cipher text is used as input. The same process is
their security requirements are different from traditional followed but in reverse order which is the main difference.
computing model. They have made an analysis of various The Blowfish algorithm is preferred universally because of the
methods to get rid of security risks and demerits of present below mentioned reasons:
cryptographic techniques. They have also compared elliptic • Quick: It is capable to encode the data on 32-bit
curve cryptographic technique for applications that are linked microprocessors at a speed of 26 clock cycles per
to the cloud to RSA associated techniques. byte.
Jensen, Meiko et al. in [17] tried to find out the current risk
• More compress: It requires a very small memory
factors related with XML application Signature and the Web
space to run nearly 5KB.
Services security models, they have also highlighted the
advantages of securing the browser with respect to Software as • Easy: Blowfish uses very simple and easy operations,
a service aspect of cloud computing, tried to boost attention such as addition, XOR with 32-bit operands, which
regarding the integrity of data and problems related to (PaaS), makes its framework easy to understand and manage.
and presented the fear of attacks like flood attack on the
Cloud. • Safe: As the length of key is changeable, which
ranges from 32-448 bits, forming it flexible and safe.
Buyya et al. in [18] stated cloud computing system a
variety of both parallel as well as distributed system which is B. Message Digest-5 algorithm ( MD-5)
made up of interconnected and virtual computers and which
are being provisioned dynamically and are given with more MD5 is a message digest algorithm which is applied at the
than one linked computing resources that are established on cloud side to produce a hash value after the data has been
various levels of services which lie between the service uploaded to the cloud server. Hash values can also be
provider and the customers. considered as fingerprints of the original data[3]. A
cryptographic algorithm is used to process the data that is
included in a file and a different numeric value which is also
III. PROPOSED FRAMEWORK known as the hash value is obtained that is used to identify the
The proposed framework involves the combination of two content present in the file. However, if the contents are
algorithms Blowfish and MD5. Blowfish algorithm is used at changed in any way, the corresponding hash value will also
the client side and other on the cloud side. The designed get changed accordingly. For recovery purpose the calculated
framework encrypts the text files by dividing them into small hash value is often resend to the owner. In Message-Digest

2987
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

algorithm 5, the 512-bit blocks as input message are broken message length is indicated by appending the portion of 64-
down into sub-blocks of sixteen 32-bit. Later an operational bit. The state of 128-bit on which the MD5 algorithm operates
series, a message digest of 128-bit along with four blocks of that divides into four 32-bit words referred to as A, B, C and D
32-bit concatenated are produced by MD5 for file integrity. are initialized. In turn, message block of 512-bit each is
MD5 is a file authentication protocol which is used to verify applied for state modification. The message block processing
the content of the original file. It is essentially a mapping that comprises of four rounds that are similar, each one of these
is generally from a random text to a string that has a fixed bit rounds consist of similar 16 operations on the basis of F non-
length of 128 bits which satisfy a couple of criteria such as linear function, left rotation, and modular addition. Finally,
after final round completion, A, B, C, and D are cascaded
• Almost 50% of the hash can be changed by altering producing the MD5 output.
even a single bit in the source text.
The seven steps involved are:
• To obtain the original text from the hash is
computationally not possible. Step 1: Input the text and the input text is pre-processed.
Flowchart: Figure 2 shows the step by step flow of the Step 2: On the client side, the encryption key is generated
proposed framework. using Blowfish algorithm.
Step 3: Block symmetric algorithm is used for data
encryption (32-bit block).
Step 4: The encrypted data is being uploaded to the cloud.
Step 5: Message digest of the encrypted text is created by
using the MD5 algorithm and stored in the cloud.
Step 6: The client downloads the text from the cloud and
decrypts by using Blowfish and MD5 algorithm.
Step 7: Finally, the execution time and storage size is
being analyzed and compared with EDS-AES algorithm.
Working of proposed framework:
The flow chart of the proposed framework is shown in the
above figure. The working is explained by the following
points:
• The proposed approach is meant for encryption of the
text files only. Initially, the input text is applied to the
algorithm for encryption. Then input text file is pre
proceed. The method of data pre-processing includes
conversion of raw data into a format that is easy to
understand. The data present in the real-world can be
incorrect, difficult to understand, insufficient,
uncertain or may show different behavior. So, pre-
processing of data is a very effective method that is
capable to remove all such kind of problems. Further
processing is done once the data has been pre-
processed.
• At the client side blowfish algorithm will generate a
key for encryption of the text file. The role of ‘F’
function used in blowfish algorithm is to divide a 32-
bits input into four bytes which are supposed to be
used as indices into an S-array. To produce the output
the results are went through the addition and XOR
operation respectively.
• At the cloud side the MD5 algorithm will generate a
hash value that is added with the encrypted text file.
Then the file is stored in the cloud .The hash value is
Fig 2: Flowchart of proposed framework send back to the client.
For message digest computation, firstly appending the • When the file is downloaded from the cloud then to
padding bits for making congruent the length of the message decrypt it key generated by the blowfish algorithm is
to 448, 512 modulo and afterwards the length of bits. The real

2988
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

used. It means that the same key is used for Table 3: Comparison of decryption time.
encryption as well as for decryption. Decryption Decryptio
Input File
• Finally analyze the encryption time, decryption time Time By n time By
Input File Size
Blowfish-Md5 EDS-AES
and encrypted file size (storage space). Name (in bytes)
(in ms) (in bytes)

IV. RESULT AND DISCUSSION Text file 1 32360268' 286 643

In this paper, a comparative study has been done on EDS- 11028459


Text file 2 97 197
AES (efficient data storage-advance encryption standard) ’
algorithm and blowfishmd5 hybrid approach on the basis on 21710563
Text file 3 184 391
different parameters like file sizes formed after encrypting ’
files, encryption time required to encrypt files and time Text file 4 3377065’ 28 63
involved while decrypting text files of different sizes. For each
parameter, a different table is made to show the results in a Text file 5 1631779’ 11
clear way and corresponding to each table a bar graph is made 31
for better understanding. The results achieved are shown as:
Table 1: Comparison of encrypted file size The above table shows the time taken by two different
algorithms (blowfish-md5 and EDS-AES) while decrypting
Encrypted File Encrypted text files of different sizes. The lesser the decryption time the
Input File
Input File Size By File Size By
Name
Size
Blowfish-Md5 EDS-AES more efficient the algorithm would be.
(in bytes)
(in bytes) (in bytes)

Text file 1 32360268' 2 32491024

Text file 2 11028459’ 9190386 11073232


Text file 3 21710563’ 1 21797168
Text file 4 3377065’ 2814226 3390752
Text file 5 1631779’ 1359820 1638096

In the above table, the experimental results between


Blowfish-MD5 and EDS-AES encryption algorithm are
shown. This table shows the size of different text files formed
by encrypting them with the above two mentioned algorithms.
Table 2: Comparison of encryption time.
Encryption Encryption Fig 3: Comparison graph of encrypted file size
Input File
Time By time By
Input File Size
Blowfish-Md5 EDS-AES This graph shows the size of input file after applying the
Name (in bytes)
(in ms) (in bytes) encryption algorithm. In this graph it is clearly visible that the
Text file 1 32360268' 512 648
file size is less when it is encrypted by applying the
blowfishmd5 algorithm.
Text file 2 11028459’ 516 194

Text file 3 21710563’ 302 391

Text file 4 3377065’ 47 63

Text file 5 1631779’ 21


31

In table 2, the parameter used for comparison is encryption


time (the time involved while encrypting the text files of
different sizes by applying the hybrid blowfish-md5 algorithm
and EDS-AES algorithm)

Fig 4: Comparison graph of encryption time

2989
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)

The X-axis of the above graph represents the size of text [5] Zhao, Jiaqi, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv
files and the Y-axis denotes the time in milliseconds. An Ranjan, Joanna Koáodziej, Achim Streit, and Dimitrios Georgakopoulos.
"A security framework in G-Hadoop for big data computing across
algorithm which saves the time while encrypting a file is distributed Cloud data centres." Journal of Computer and System
desired which in this case is blowfidh-md5 algorithm. Sciences 80, no. 5 (2014): 994-1007.
[6] Manogaran, Gunasekaran, ChanduThota, and M. Vijay Kumar.
"MetaCloudDataStorage architecture for Big Data security in cloud
computing." Procedia Computer Science 87 (2016): 128-133.
[7] Liu, C., C. Yang, X. Zhang, and J. Chen. "External integrity verification
for outsourced big data in cloud and IoT: A big picture." Future
Generation Computer Systems (2015).
[8] Jain, Anurag, and Kumar Rajneesh. "Confidentiality enhanced security
model for cloud environment," In Proceedings of the Second
International Conference on Information and Communication
Technology for Competitive Strategies 2016 Mar 4, pp. 139-144,.
http://dl.acm.org/citation.cfm?id=2905199
[9] Baek, Joonsang, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, and Yang
Xiang. "A secure cloud computing based framework for big data
information management of smart grid." IEEE transactions on cloud
computing 3, no. 2 (2015): 233-244.
[10] Sookhak, Mehdi, Abdullah Gani, Muhammad Khurram Khan, and
Rajkumar Buyya. "Dynamic remote data auditing for securing big data
storage in cloud computing." Information Sciences 380 (2017): 101-116.
Fig 5: Comparison graph of decryption time [11] Gai, Keke, Meikang Qiu, Hui Zhao, and Jian Xiong. "Privacy-aware
Above given graph shows the comparison between the two adaptive data encryption strategy of big data in cloud computing." In
Cyber Security and Cloud Computing (CSCloud), 2016 IEEE 3rd
hybrid encryption algorithms which clarify the time required International Conference on, pp. 273-278. IEEE, 2016.
for decrypting the text files by the hybrid Blowfish-MD5 is [12] Pasupuleti, Syam Kumar, Subramanian Ramalingam, and Rajkumar
lesser in comparison to the EDS-AES algorithm. Buyya. "An efficient and secure privacy-preserving approach for
outsourced data of resource constrained mobile devices in cloud
computing." Journal of Network and Computer Applications 64 (2016):
V. CONCLUSION AND FUTURE SCOPE 12-22.
This is known that simulation-based approaches in Cloud [13] Sood, Sandeep K. "A combined approach to ensure data security in
computing systems and application behaviors offer many cloud computing." Journal of Network and Computer Applications 35,
significant benefits like to test the newly developed methods no. 6 (2012): 1831-1838.
and policies. In this paper, various parameters of the proposed [14] Shaikh, Rizwana, and M. Sasikumar. "Data classification for achieving
security in cloud computing." Procedia computer science 45 (2015):
algorithm are evaluated and experimental results obtained 493-498.
shows that the proposed algorithm has lesser encryption and [15] Li, Yibin, Keke Gai, Zhong Ming, Hui Zhao, and Meikang Qiu.
decryption time and needs less storage capacity in comparison "Intercrossed Access Controls for Secure Financial Services on
to EDS-AES algorithm. Future prominence is given to the Multimedia Big Data in Cloud Systems." ACM Transactions on
proposed framework implementation comparing with some Multimedia Computing, Communications, and Applications (TOMM)
other different algorithms to show their effectiveness. The 12, no. 4s (2016): 67.
work can also be extended by including an optimization [16] Tripathi, Abhuday, and Parul Yadav. "Enhancing security of cloud
computing using elliptic curve cryptography." International Journal of
technique along with this hybrid approach to make it as Computer Applications 57, no. 1 (2012).
perfect, effective and functional as possible. An optimization
[17] Jensen, Meiko, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. "On
technique can be used to compress the encrypted file size to a technical security issues in cloud computing." In Cloud Computing,
greater extent. Further, optimization technique can also detect 2009. CLOUD'09. IEEE International Conference on, pp. 109-116.
attacks like malware and spam both of which are greatest IEEE, 2009.
security threats. [18] Buyya, Rajkumar, Chee Shin Yeo, Srikumar Venugopal, James Broberg,
and Ivona Brandic. "Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as the 5th utility."
References Future Generation computer systems 25, no. 6 (2009): 599-616.
[19] Jain A, Kumar R. A Taxonomy of Cloud Computing. International
[1] Thakur, Jawahar, and Nagesh Kumar. "DES, AES and Blowfish:
Journal of Scientific and Research Publications. 2014 Jul; 4(7):1-5.
Symmetric key cryptography algorithms simulation based performance
http://www.ijsrp.org/research-paper-0714/ijsrp-p3128.pdf
analysis." International journal of emerging technology and advanced
engineering 1, no. 2 (2011): 6-12.
[2] Aurora, Tanjyot, and Parul Arora. "Blowfish Algorithm." International
Journal of Computer Science and Communication Engineering IJCSCE
Special issue on “Recent Advances in Engineering & Technology”
NCRAET 3, no. 4 (2013): 238-243.
[3] Zhao Yong-Xia, Zhen Ge, “MD5 Research,” Second International
Conference on Multimedia and Information Technology, pp. 271-273,
2010
[4] Li, Yibin, Keke Gai, Longfei Qiu, Meikang Qiu, and Hui Zhao.
"Intelligent cryptography approach for secure distributed big data
storage in cloud computing." Information Sciences 387 (2017): 103-115.

2990

You might also like