You are on page 1of 5

IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015

An Approach For Securing Data On Cloud


Using Data Slicing And Cryptography.
Mr. Rupesh R Bobde Prof. Amit Khaparde. Prof. Dr.M. M. Raghuwanshi
Dept. Of Computer Science & Engg. Dept. Of . Information Technology. Dept of Computer Technology
R. G. C. E. R Nagpur. R. G. C. E. R Nagpur. Y. C.C.E RTMNU Nagpur
R.T.M.N.U Nagpur University, India R.T.M.N.U Nagpur University, India University, India.
Email :- rupeshbobde@gmail.com Email :-khaparde.amit@gmail.com Email:m_raghuwanshi@rediffmail.com

ABSTRACT: Cloud computing is one of the major point users can store their critical data in servers and can access
of discussion in IT industries. The Cloud provides their data anywhere they can with the Internet and do not
service to the user on demand basis. The trend of using need to worry about system breakdown or disk faults, etc.
cloud environments is growing for storage and data Also, different users in one system can share their
processing needs. Data security is one of the major information and work, as well as play games together.
issues in cloud environment. The data owner has not Different Reputed companies such as Amazon, Google,
control over the data after it is uploaded on cloud. For IBM, Microsoft, and Yahoo provide the various cloud
data security we have to trust on security mechanism computing services.. Basically there are mainly three types
provided by third party. We proposed a scheme in this of clouds: Internal clouds, External clouds and hybrid
the original data get sliced into different slices. The data clouds [2]. Internal clouds: internal cloud is also called
in each slice can be encrypted by using different Private clouds; these are the private networks that offer
cryptographic algorithms and encryption key before enormous cloud computing services for a very restrictive set
storing them in the Cloud. The objective of this of users within internal network. For example, some
technique is to store data in a proper secure and safe colleges, companies and universities can use their internal
manner in order to avoid intrusions and data attacks networks to provide cloud computing services for their own
meanwhile it will reduce the cost and time to store the users. These centralized storage of data in clouds offer the
encrypted data in the Cloud Storage. highest level of security and control, but they require the
company to still purchase and maintain all the software and
Keywords: Cloud Security, Authentication, Encryption, infrastructure, which reduces the cost savings. External
Decryption , Cloud storage., intrusion detection, attacks, Slice. clouds: It is refer as public cloud. It is use for the public
users such as enterprises that provide cloud computing
services. Hybrid clouds these are the clouds that is
I INTRODUCTION combination of various multiple private and/or public
clouds [4]. Providing security in a private cloud and a public
cloud computing is a computing environment in which large cloud is easier, comparing with a hybrid cloud since
group of remote servers are networked which allows the commonly a private cloud or a public cloud only has one
central storage of data and it provides online access to service provider in the cloud. To access the various cloud
computer resources or services. This computing services user should have it’s own identity. This unique
environment allows enormous customer of cloud and digital identity authenticate user to access different services
service it allows it users to access this applications without from different clouds.
installation it provides services ex- sending various files at
any machine connected in a network with internet access.
By centralized data storage processing and bandwidth
provides more efficient computing. This is one of the new
trends for IT enterprises. Cloud computing environments is
a network of computers, connected via internet, exchanging
,sharing the various resources provided by Cloud providers
satisfying the need like scalability, usability, resource
requirements. The various problems like sharing computing
resources, users can easily solve their problems with the Fig 1: Cloud Computing Types
resources provided. By using cloud computing service,
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015

The three widely referenced cloud computing service Security, cloud has lot of difficulties. The provider’s must
models are illustrated as follows: make sure that the client does not face any problem such as
1. Software as a Service (SaaS): It refers to services that is data loss or data theft. There is also a possibility where a
provided to the users by giving users’ the efficacy to malicious user can penetrate the cloud by impersonating a
access services of cloud by running on a simple software legitimate user and there by infecting the entire cloud thus
like a browse. Examples: Gmail, Google Groups. This affecting many customers who are sharing the infected
model is also known as Application Service Provider or cloud.
ASP model.
2. Platform as a Service (Paas): This service allows the The various problems faced by the cloud computing can be
users’ to develop applications and deploy them. Examples: classified as:
Google App Engine allows developers to create customized
apps. 1. Infected Application: Vendor should have the complete
3. Infrastructure as a Service (IaaS): This service allows access to the server for monitoring and maintenance, thus
users’ to access the servers’ computational and storage preventing any malicious user from uploading any infected
infrastructure in a centralized service [2] [3] [6]. Say for an application onto the cloud which will severely affect the
example, we have Amazon Web Services. It allows remote customer. The applications are available as a service on
access to Amazon.com’s computing services. cloud , Cloud providers ensure that services to users and
secure these application by implementing testing and
acceptance procedures for outsourced or packaged
application code. It also requires application security
measures (application level firewalls) be in place in the
production environment.

2. Authentication: The authentication of the respondent


device or devices like IP spoofing, RIP attacks, ARP
poisoning (spoofing), and DNS poisoning are all too
common on the Internet. TCP/IP has some “unfixable
flaws” such as “trusted machine” status of machines that
have been in contact with each other, and tacit assumption
that routing tables on routers will not be maliciously altered.
One way to avoid IP spoofing by using encrypted protocols
wherever possible. They also suggest avoiding ARP
poisoning by requiring root access to change ARP tables;
using static, rather than dynamic ARP tables; or at least
Fig Services of cloud
make sure changes to the ARP tables are logged.

3. Data Verification: Things like tampering, loss and theft,


II. ISSUES IN CLOUD SECURITY
while on a local machine, while in transit, while at rest at
the unknown third-party device, or devices, and during
A guaranteed security service will enhance the business
remote back-ups. Resource isolation ensures security of data
performance of the cloud service provider. Security is an
during processing, by isolating the processor caches in
Essential service to be provided to the clients, a cloud
virtual machines, and isolating those virtual caches from the
service provider should assure. Secure cloud is a reliable
Hypervisor cache.
source of information. Protecting the cloud is a very
important task for security professionals who are in charge
4. Availability: Cloud providers assure customers that they
of the cloud. Cloud can be protected by protecting the data,
will have regular and predictable access to their data and
making sure data is available for the customers, delivering
applications.
high performance for the customers, using Intrusion
Detection System on cloud and to monitor any malicious
5. Data protection: To be considered protected, data from
activities. For the safety purpose, the provider’s must
one customer must be properly segregated from that of
provide a support system for the client’s so that every client
another; it must be stored securely when “at rest” and it
must be able to recover their own data loss in the cloud
must be able to move securely from one location to another.
environment. Therefore, the encryption technique must be
Cloud providers have systems in place to prevent data leaks
adopted in cloud by the provider’s to their client’s for
or access by third parties. Proper separation of duties should
integrity and authentication of data. When it comes to
ensure that auditing or monitoring cannot be defeated, even
by privileged users at the cloud provider.
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015

III. BACKGROUND AND RELATED WORK Block tag authentication is made to handle the data from the
cloud storage efficiently. For the data that is stored in the
cloud database, there is need for remote data integrity check
An overview of different data security issues related to which assurers the cloud users with a sense of security
cloud computing provided by Joshi et al. in 2010, [8] This regarding their data. The third party audit ting has to be
piece of work focuses on how to achieve the security in made available in such a way that no additional burden is
cloud computing and which are various ways to enhance the introduced to the cloud users. A single Third Party Auditor
secure trustworthy cloud environment. on the basis of is capable of handling multiple auditing tasks, which is
various issues identifies Farzad Sabahi [9], proposed a achieved with the bilinear aggregate signature technique.
system that deals with the problem of ensuring the integrity The author Arjun Kumar specifies a method in 2012 [1]
of data storage in cloud with the help of a Third Party that allows user to store and access the data securely from
Auditor. Data integrity is achieved through the public the cloud storage. It also guarantees that no one except the
auditing that is carried out on the users data by the Third authenticated user can access the data neither the cloud
Party Auditor. storage provider. This method ensures the security and
In 2011, Ashish Agarwal et al. [10], This paper talks about privacy of data stored on cloud. A further advantage of this
security issues concerned with cloud computing. It has method is that if there is security breach at the cloud
revealed many about many serious security threats that provider, the user’s data will continue to be secure since all
prevails this field. Kui Ren [13], proposed the publicly data is encrypted. Users also need not to worry about cloud
auditable cloud data storage which is able to help the cloud providers gaining access to their data illegally.
economy become fully established. This auditing service In 2013 ,the author Mr. Prashant Rewagad , Ms.Yogita
helps the data owners’ to maintain their data effectively that Pawar [2] focuses on the idea of security and authentication
is present in the cloud storage. The proposed system His piece of work makes use of a combination of
accounts the users regarding the usage of their data by both authentication technique and key exchange algorithm
the user himself and the TPA. Services for the legacy users blended with an encryption algorithm. This combination is
is made available, who may not only access but also modify referred to as “Three way mechanism” because it ensures all
the data in the cloud. the three protection scheme of authentication, data security
The author Prashant Rewagad et al. [2] propose an and verification, at the same time.
architecture for providing security in cloud network. These The author S. Kamara and K. Lauter [3][2] in this paper,
systems architecture uses the combination of digital make use of digital signature and Diffie Hellman key
signature algorithm of Diffie Hellman and AES encryption. exchange blended with (AES) Advanced Encryption
The author Ashutosh Kumar et al.[11] highlights on Standard encryption algorithm to protect confidentiality of
providing a secure architectural framework for data data stored in cloud. Even if the keyin transmission is
gathering and sharing. This spectacular work of this project hacked, the facility of Diffie Hellman key exchange render
of this work is that the authors have made a permission it useless, since key in transit is of no use without user’s
hierarchy at different levels. private key, which is confined only to the legitimate user.
The authors have focused on security but with view of use Author Mohamed Nabeel, Elisa Bertino Fellow in this
hierarchy. M.Venkatesh et al .In 2012, [12] proposes paper, focused on the utilization of encrypted cloud data
RSASS system for data security. The scheme uses RSA with practical system usability and high-level user searching
algorithm for encrypting large files and storing the data. The experience. Focus on encryption of data using RSA
system can be used for storing large databases. But the use algorithm. [4]
of linear methods compromises with the data retrieval The author Sushmita Ruj, Milos Stojmenovic, Amiya
speed. Hence, this system is good for static data. Farzad Naya[5]in this paper an approach, based on two layers of
Sabahi [9] explains about the scope of various enterprises encryption, the data owner performs a coarse-grained
migrating to cloud. The author explains how migration to encryption, whereas the cloud performs a fine-grained
cloud can benefit various enterprises. Cloud computing encryption on top of the owner encrypted data.
migration involves considering the gravity of issue of The author Xueli Huang and Xiaojiang Du [6] “Efficiently
security. Secure Data Privacy on Hybrid cloud” This present a
Aderemi A. Atayero [7], proposed an auditing system which privacy preserving access control scheme for clouds. This
is carried out in such a way that the Third Party Auditor paper not only provides fine-grained access control but also
does its job without demanding the copy of user’s data. Also authenticates users who store information in the cloud. The
the Third Party Auditor is not capable of deriving the user’s cloud however does not know the identity of the user who
data while performing the auditing task. To verify the stores information, but only verify the user’s credentials.
correctness of the cloud data on demand from the cloud Key distribution is done in a decentralized way. One
users the Third Party Auditor is used, who without limitation is that the cloud knows the access policy for each
retrieving a copy of the whole data or introducing additional record stored in the cloud.
online burden to the cloud users performs the auditing.
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015

The author Orner K. Jasim Mohammad, Safia Abbas, EI- converted into ciphertext. This various encryption algorithm
Sayed M. EI-Horbaty : In this Paper[7] The sensitive data is provide more security than using single encryption
separated from non-sensitive data, and only the non- algorithm to encrypt the data. The technique works in
sensitive data is outsourced to public cloud. following manner.

IV. PROBLEM STATEMENT

The Securing user data is the responsibility of cloud


provider. So, efficient security mechanism needs to be
design using encryption The related above work had
considered the various security issues. They are provided
various mechanism for securing large volume of data on ,
only use of cryptography for encryption/ decryption doesn’t
prove to be much effective for cloud systems as this
conversion involves huge and very complex mathematical
computations and All types of data are stored using the
same and single encryption algorithms. The cost of storing
the data on Cloud is high. Here will need more space for
storage. The required time to encrypt and decrypt the data
to/from the Cloud is long. Step1:-
Load master data into dataset.
V. PROPOSED SYSTEM
Step2:-
Segment the data set.
In proposed approach we are splitting the data into various
slices, then applying here various different encryption
algorithms according to their security level. The level of Step 3:-
Apply different security algorithm on each segments
complexity of security varies according levels and complex
encryption algorithm will going to choose. This various simultaneously.
encryption algorithm provide more security than using
single encryption algorithm to encrypt the data. After doing Step 4:-
Store segments on cloud.
this we will going to see the comparative analysis of the
encrypting the complete data without classification and the
proposed scheme to analysis space, time and cost VI. CONCLUSION
requirement for both.
Cloud computing has recently emerged as a paradigm for
managing and delivering services over the internet. The rise
V. DATA SLICING AND CRYPTOGRAPHY of this technology is changing rapidly the way of IT, and
providing the promise for computation of utilities in a
Data slicing is done using data fragmentation technique reality. The benefits offered by this technology, the current
horizontal or vertical or mixed fragmentation technique to technologies are not matured enough to realize its full
creates the segments of data. The whole data set get slice potential. So many challenges are here in this domain
into 3 segments either by using vertical, horizontal or mixed Infected Application, Data protection, Availability, Data
fragmentation technique. This slices of segments are Verification, Authentication . All this mentioned problems
encrypted using 3 different encryption algorithm. And then are because of there is not clear method to divide the data
upload this chunk of segments to the cloud. On this chunk into various slices and used different encryption algorithms
of segments use encryption & decryption process before according to the security of encryption algorithm. In this
uploading chunk of data on cloud and after downloading of proposed scheme we solve the problem security and
chunk of data from cloud server. Each chunk encrypted increase the security level of data than previous techniques.
with different cryptographic algorithm.

Encryption is a process in which the readable data is VII. REFERENCES


processed and converted into to unreadable cipher text.
Different cryptographic algorithm applied on segments the [1].Arjun Kumar , Byung Gook Lee, Hoon Jae Lee.” Secure
algorithm like AES, DES, 3DES are implemented on Storage and Access of Data in Cloud Computing” In
individual segments. This individual algorithm works on ICTC2012.
each segments simultaneously. The plaintext encrypted and [2] Mr. Prashant Rewagad , Ms.Yogita Pawar. “Use of
Digital Signature with Diffie Hellman Key Exchange and
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015

AES Encryption Algorithm to Enhance Data Security in


Cloud Computing. In International Conference on
Communication Systems and Network Technologies 2013.
[3]S. Kamara and K. Lauter, “Cryptographic cloud storage,”
in Proceedings of Financial Cryptography: Workshop on
Real-Life Cryptographic Protocols and Standardization
2010, January 2010.
[4]. Mohamed Nabeel, Elisa Bertino Fellow.IEEE” Privacy
Preserving Delegate Access Control in Public
Clouds”.January 2012
[5]. Sushmita Ruj, Milos Stojmenovic, Amiya Naya “
Privacy Preserving Access Control with Authentication for
Securing Data in Clouds”.2012
[6]. Xueli Huang and Xiaojiang Du “Efficiently Secure Data
Privacy on Hybrid
Cloud”. IEEE ICC 2013 - Communication and Information
Systems Security Symposium.
[7]. Orner K. Jasim Mohammad, Safia Abbas, EI-Sayed M.
EI-Horbaty : “A Comparative Study between Modern
Encryption Algorithms based On Cloud Computing
Environment” -2013 IEEE .
[8] Joshi, J.B.D., Gail-Joon Ahn. Security and Privacy
Challenges in Cloud Computing Environments. IEEE
Security Privacy Magazine, Vol 8, IEEE Computer Society,
2010, p.24-31.
[9] Farzad Sabahi. Cloud Computing Security Threats and
Responses. Communication Software and Networks
(ICCSN), 2011 IEEE 3rd International Conference.
[10]Ashish Agarwal, Aparna Agarwal. The Security Risks
Associated with Cloud Computing. International Journal of
Computer Applications in Engineering Sciences [VOL I,
SPECIAL ISSUE ON CNS, JULY 2011] [ISSN: 2231-
4946].
[11]Ashutosh Kumar Dubey, Animesh Kumar Dubey,
Mayank Namdev, Shiv Shakti Shrivastava. Cloud-User
Security Based on RSA and MD5 Algorithm for Resource
Attestation and Sharing in Java Environment. Software
Engineering (CONSEG), CSI Sixth International
Conference, Sept. 2012
[12]M.Venkatesh, M.R.Sumalatha, Mr.C.SelvaKumar.
Improving Public Auditability, Data Possession in Data
Storage Security for Cloud Computing. Recent Trends In
Information Technology (ICRTIT), 2012 International
Conference, April 2012.
[13] Kuyoro S. O, Ibikunle.F and Awodele O, Challenges
and Security Issues in Cloud Computing International
Journal of Computer Networks, Vol. 3, No. 5, pp. 247-255,
2011

You might also like