Professional Documents
Culture Documents
International Journal of Computer Engineering and Applications
International Journal of Computer Engineering and Applications
International Journal of Computer Engineering and Applications
ABSTRACT
Data transmitted through internet is getting larger every day .Therefore an algorithm is required
by which our data can be transferred speedily and securely. The main aim of this particular
research is to protect the transmitted data with the help of encryption and decryption techniques.
This research paper presents a model for encrypting the data transmitted through cloud. The
algorithms used in this model are: AES, DES, RC4 and Steganography. This hybrid algorithm
will help users and cloud service provider to transmit their data without being stolen or affected.
Keywords - Cloud Security, Cloud computing, Hybrid Encryption, AES, DES, RC4,
Steganography
[1] INTRODUCTION
Cloud computing is a term used for providing services over the internet. Basically
it is a technique which is used to store, process and manage data over the remote servers
and network. Services are divided into three categories: Infrastructure as a service (IaaS),
Software as a service (SaaS) and Platform as a service (PaaS).
Data Integrity in cloud storage:
benefits such as: mobility, backup and recovery, universal data access with independent
geographical locations.
The consistency, accuracy, validity and precision of remotely stored data are called data
integrity and it is a fundamental component of information security.
Cloud Computing makes these advantages more alluring than ever, some challenging
security threats towards the user’s outsourced data is it’s side effects. One of the biggest concerns
with cloud storage is of data integrity verification at unknown servers. For example, the service
provider (storage), which experiences tortuous failure occasionally, may decide to hide the data
errors from the clients for the benefit of their own.
Cloud Service Providers (CSP) needs to convince their clients that their data has remained
unaltered and it is kept safe from corruption, remoulding or unauthorized disclosure by using these
techniques.
ENCRYPTION
One of the most prime method for providing data security, especially for end-to-end
transmission of data over the networks. Encryption is the method by which a data or plain text is
transformed to an encoded form that can only be decoded by one who has the key. The data which
is unencrypted is called plain text and the data which is encrypted is referred as cipher text. There
are two main types of encryption asymmetric and symmetric encryption.
ALGORITHMS
a) RC4
RC4 is a shared key stream algorithm requires a unassailable exchange of shared key. In
this algorithm stream of random characters is fully unconventional of plain text used. An 8*8 S-
Box in which each of the entries is a permutation of the numbers from 0 to 255 and permutation is
method of the mutable length key. The two counters I and j are both set to zero in this algorithm.
Mostly used for successive generation of pseudo arbitrary bytes and after that generates a random
stream which is a XORED with the plaintext to provide the cipher text.
b) AES
c) DES
A symmetric key block cipher DES(Data Encryption Standard) based on Feistel Cipher.
Works on 16 round Fiestel Structure and with a block size of 64 bit. It has a effective key length of
56 bits. As 8 of the 64 bits of the key are not used by the algorithm(8 of those bits are used for
parity checks). It can run in four different modes by encrypting blocks individually or by making
cipher block dependent on previous blocks. But it is very easy to crack the key with the brute force
which involves trying every possible key until you find the right one and maximum it would take
2^56. So company came with the successor to DES which is 3DES IN which we perform three
iterations of the DES algorithm to increase key length from 56 bit to 168 bits but it’s comparatively
slower than DES.
d) STEGANOGRAPHY
images, articles or some other co-text and, ideally, secret messages, are in invisible ink
between visual lines of a private letter. The advantage of steganography compared to cryptography
is that the message does not draw attention to itself. Clearly visible encrypted messages - no matter
how unobtrusive - will create suspicion and trap themselves in countries where encryption is
illegal. Therefore, cryptography where the data is protected, steganography The data and the
communicating party can both be defended.
Even with various benefits of cloud computing users and consumers are unwilling to adopt
this technology. Security is a broad topic in cloud computing. It has basically two broad categories
i.e security issues faced by cloud users and issues faced by cloud providers. Therefore, there are
new requirements for security in cloud compared to traditional environments.
We often use snapchat, Instagram, google drive bottom line is, if we use any social
networking program or data storage we are almost using cloud computing. we also use cloud
services such as email offloading that helps a lot in reducing the companies cost of development
and maintenance despite the immense benefits of the cloud computing the privacy of the data is the
biggest concern of the organizations and individual users have. current technologies used to protect
the data include firewalls, a technology developed by IBM called airavat. In a research project, we
are leading our aim is to provide cloud data security and privacy protection. Although cloud
computing has many advantages there are still many problems that need to be solved and in our
research project we have created a suite of algorithms for scalable control and computation of
encrypted data in the cloud. This will go to help the cloud providers to control and manage the
physical infrastructure and make sure the data on the cloud remains secure. There can be data
vulnerabilities the susceptible to attackers looking to exploit and attack the data to gain complete
control over it or steal it but our hybrid encryption will help in getting over it.
[3] RESULT
In this proposed model of RC4, AES, DES and Steganography algorithms are used for
securing the data. Proposed system is a collection RC4, AES, DES, and Steganography. All these
algorithms are symmetric key encryption algorithm. These algorithms uses the 128 bit key size and
to hide the data into image using LSB technique. The encoding and the decoding time of the
encryption is calculated with the help of the java program. All the operations will be performed on
the single text file which will be further divided into the three parts.
As shown in figure 7 proposed system need less time for file encoding. It is so because in proposed
model combination of symmetric key encryption algorithms are run concurrently. Hybrid
algorithm needs 18% to 20% less time for text file in comparison with the existing technologies.
With single algorithm u cannot provide high security to cloud data.
As shown in figure 8 current system require 14% to 16% maximum time for decryption of file
compared to hybrid algorithm . AES algorithm takes less time for decryption but doesn’t provide
good security to data . As in AES if size of key increases then directly the number of rounds
increases than encoding and decoding time also increases.
[4] CONCLUSION
Issues of cloud storage are solved using encryption and steganography techniques. Data
security is achieved using RC4, AES, DES and key security is accomplished using the LSB
technique. Delay is kept low using multithreading technique with the help of this security
technique data integrity, confidentiality, authentication is achieved. While the proposed text file
encryption takes 17% to 20% less time than AES and even more less than DES and RC4. So
finally the proposed solution will help the users to overcome the fraudulence and will help in
secure transmission of data.
REFERENCES
[1] Dr. S.H Patil and Rohini Khalkar, “Data Security Technique In Cloud Storage”, International
Journal of Computer Engineering and Technology, vol. 4, Issue. 2, pp:373-375, June 2013.
[2] Rohini Khalkar and Dr. S.H Patil, “Data Integrity Proof Techniques In Cloud Storage”,
International Journal of Computer Engineering and Technology, vol. 4, Issue.2, pp:454-458, April 2013.
[3] V.S. Mahalle and A. K. Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid
(Rsa & Aes) Encryption Algorithm”, IEEE , INPAC,pp 146-149,Oct. 2014.