Rsa Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)

Implementing Digital Signature with RSA Encryption


Algorithm to Enhance the Data Security of Cloud in Cloud
Computing
#1
Uma Somani, #2 Kanika Lakhani, #3 Manish Mundra
#1
urmisom2005@gmail.com , #2 kanikalakhani@yahoo.co.in ,
#3
manishmundra.2010@gmail.com

Abstract The cloud is a next generation technology. It has become an IT buzzword


platform that provides dynamic resource for the past a few years. Cloud computing
pools, virtualization, and high availability. has been often used with synonymous terms
Today, we have the ability to utilize such as software as a service (SaaS), grid
scalable, distributed computing computing, cluster computing, autonomic
environments within the confines of the computing, and utility computing . SaaS is
Internet, a practice known as cloud only a special form of services that cloud
computing. Cloud computing is the Concept computing provides. Grid computing and
Implemented to decipher the Daily cluster computing are two types of
Computing Problems, likes of Hardware underlying computer technologies for the
Software and Resource Availability development of cloud computing.
unhurried by Computer users. The cloud It is often difficult to define the
Computing provides an undemanding and cloud computing. Computing is a virtual
Non ineffectual Solution for Daily pool of computing resources. It provides
Computing. The prevalent Problem computing resources in the pool for users
Associated with Cloud Computing is the through internet. It provides a mandatory
Cloud security and the appropriate application programming environment. It
Implementation of Cloud over the Network. can deploy, allocate or reallocate computing
In this Research Paper, we have tried to resource dynamically and monitor the usage
assess Cloud Storage Methodology and of resources at all times
Data Security in cloud by the Cloud computing collects all the
Implementation of digital signature with computing resources and manages them
RSA algorithm automatically through software. In the
process of data analysis, it integrates the
1. Introduction history data and present data to make the
collected information more accurate and
provide more intelligent service for users
Cloud computing is the Internet- and enterprises. The users need not care
based development and is used in computer how to buy servers, software solutions and

211
978-1-4244-7674-9/10/$26.00 ©2010 IEEE
so on. Users can buy the computing 3 High reliability: Cloud uses data multi-
resource through internet according to their transcript fault tolerant, the computation
own needs. Cloud computing does not node isomorphism exchangeable and so on
depend on special data center, but we can to ensure the high reliability of the service.
look it as the inevitable product of grid Using cloud computing is more reliable
computing and efficiency computing. Cloud than local computer.
computing is easy to extend, and has a 4 Versatility: Cloud computing can
simple management style. Cloud is not only produce various applications supported by
simply collecting the computer resource, cloud, and one cloud can support different
but also provides a management mechanism applications running it at the same time.
and can provide services for millions of 5. High extendibility: The scale of cloud
users simultaneously. Organizations can can extend dynamically to meet the
provide hardware for clouds internally increasingly requirement.
(internal clouds), or a third party can 6. On demand service: Cloud is a large
provide it externally (hosted clouds). A resource pool that you can buy according to
cloud might be restricted to a single your need; cloud is just like running water,
organization or group (private clouds), electric, and gas that can be charged by the
available to the general public over the amount that you used.
Internet (public clouds), or shared by
multiple groups or organizations (hybrid 7. Extremely inexpensive: The centered
clouds). management of cloud make the enterprise
needn’t undertake the management cost of
2. Characteristics of Cloud data center that increase very fast. The
versatility can increase the utilization rate of
Computing the available resources compared with
traditional system, so users can fully enjoy
1 Ultra large-scale: The scale of the low cost advantage. Various application
cloud is large. The cloud of Google has and advantage of cloud computing are listed
owned more than one million servers. Even below:
in Amazon, IBM, Microsoft, Yahoo, they 1 Cloud computing do not need
have more than hundreds of thousands high quality equipment for user, and it is
servers. There are hundreds of servers in an easy to use.
enterprise. 2 Cloud computing provides
2.Virtualization:Cloud computing dependable and secure data storage center.
makes user to get service anywhere, You don’t worry the problems such as data
through any kind of terminal. You can loss or virus
complete all you want through net service 3 Cloud computing can realize
using a notebook PC or a mobile phone. data sharing between different equipments.
Users can attain or share it safely through 4 Cloud provides nearly infinite
an easy way, anytime, anywhere. Users can possibility for users to use internet.
complete a task that can’t be completed in a
single computer.

212
3. Cloud Security Challenges computing power that exceeds that
contained within their own physical worlds.
Although virtualization and cloud To enter this virtual environment requires
computing can help companies accomplish them to transfer data throughout the cloud.
more by breaking the physical bonds Consequently, several data storage concerns
between an IT infrastructure and its users, can arise. Typically, users will know neither
heightened security threats must be the exact location of their data nor the other
overcome in order to benefit fully from this sources of the data collectively stored with
new computing paradigm. This is theirs. To ensure data confidentiality,
particularly true for the SaaS provider. integrity, and availability (CIA), the storage
Some security concerns are worth more provider must offer capabilities that, at a
discussion. With the cloud model, you lose minimum, include a tested encryption
control over physical security. In a public schema to ensure that the shared storage
cloud, you are sharing computing resources environment safeguards all data; stringent
with other companies. In a shared pool access controls to prevent unauthorized
outside the enterprise, you don’t have any access to the data; and scheduled data
knowledge or control of where the backup and safe storage of the backup
resources run. Exposing your data in an media. Legal issues arise, such as e-
environment shared with other companies discovery, regulatory compliance (including
could give the government “reasonable privacy), and auditing .The range of these
cause” to seize your assets because another legal concerns reflects the range of interests
company has violated the law. Simply that are currently using or could use cloud
because you share the environment in the computing. These issues and their yet-to-be-
cloud, may put your data at risk of seizure. determined answers provide significant
Storage services provided by one cloud insight into how security plays a vital role
vendor may be incompatible with another in cloud computing continued growth and
vendor’s services should you decide to development...
move from one to the other. Vendors are
known for creating what the hosting world A. Use in Cyber crime
calls “sticky services”—services that an end
user may have difficulty transporting from Cyber crime’s effects are felt
one cloud vendor to another. Data integrity throughout the Internet, and cloud
is assurance that the data is consistent and computing offers a tempting target for many
correct. Ensuring the integrity of the data reasons. Providers such as Google and
really means that it changes only in Amazon have the existing infrastructure to
response to authorized transactions. deflect and survive a cyber attack, but not
every cloud has such capability. If a cyber
criminal can identify the provider whose
4. Security and Responsibility vulnerabilities are the easiest to exploit,
then this entity becomes a highly visible
Within the cloud computing world, target. If not all cloud providers supply
the virtual environment lets user access adequate security measures, then these

213
clouds will become high-priority targets for just a few lines by a using “hashing
cyber criminals. By their architecture’s algorithm". These few lines are called a
inherent nature, clouds offer the opportunity message digest. Software then encrypts the
for simultaneous attacks to numerous sites, message digest with his private key. Then it
and without proper security, hundreds of will produce digital signature .Software will
sites could be comprised through a single Decrypt the digital signature into message
malicious activity. digest with public key of sender’s and
his/her own private key. We are using
5. Digital Signature with RSA Digital signatures so that we are able to
encryption algorithm to enhance distribute software, financial transactions,
over the network and in other cases where it
Data Security in Cloud is important to detect forgery and
tampering.
In Cloud computing, we have problem like
security of data, files system, backups,
network traffic, host security .Here we are 6. Proposed Internal Working
proposing a concept of digital signature Steps Taken in Digital Signature
with RSA algorithm, to encrypting the data with RSA Algorithm
while we are transferring it over the
network. .A digital signature or digital Let us assume we have two
signature scheme is a mathematical enterprises A and B. An enterprise A have a
scheme for demonstrating the authenticity public cloud with data, software’s and
of a digital message or document. A valid applications. .Company B wants a secure
digital signature gives a recipient reason to data from A’s Cloud .We are here, trying to
believe that the message was created by a send a secure data to B by using Digital
known sender, and that it was not altered in signature with RSA algorithm. We are
transit. taking some steps to implementing Digital
We proposed digital signature with RSA signature with RSA encryption algorithm.
algorithm scheme to ensure the security of Suppose Alice is an employee of
data in cloud. RSA is probably the most an enterprise A and Bob is an employee of a
recognizable asymmetric algorithm. RSA company B.
was created by Ron Rivest, Adi Shamir, and Step1.Alice takes a document
Leonard Adleman in 1978. Till now, it is from cloud, which Bob wants.
the only asymmetric (i.e. needs two Step2.The document will crunched
different keys) algorithm used for into few lines by using some Hash function
private/public key generation and the hash value is referred as message
encryption.We include both digital digest.(Figure 1)
signature scheme and public key
cryptography to enhance the security of
cloud computing.
In Digital Signature, software
will crunch down the data, document into

214
Figure 1 Document crunched into message 2. Compute n = p q, where n is used as the
digest. modulus for both the public and private
Step 3. Alice software then keys
encrypts the message digest with his private 3. Compute the totient: phi (n) = (p !1) (q
key. The result is the digital !1)
signature.(Figure 2) 4. Choose an integer e such that 1 < e < phi
(n) , and e and phi(n) share no factors other
than 1 , where e is released as the public
key exponent
5. Compute d to satisfy the congruence
Figure 2 Encryption of message digest into relation d × e = 1 modulus phi(n); d is kept
Signature as the private key exponent
Step 4. Using RSA Algorithm, 6.The public key is (n, e) and the private
Alice will encrypt digitally signed signature key is (n, d). Keep all the values d, p, q and
with bob’s public key and Bob will decrypt phi secret.
the cipher text to plain text with his private Step2. Digital signing
key and Alice public key for verification of Sender A does the following:-
signature. (Figure 3) A) Creates a message digest of the
information to be sent by using hash
function.
Hash Function
1. Declare character ‘str’ of unsigned
long type.
2. Declare and initialize hash of unsigned
integer type
3. unsigned int hash = 0;
Figure3.Encryption of Digital Signature into int q;
Cipher text while (q = str+1)
hash =hash + q;
B .) Represents this digest as an integer m
7. Proposed Algorithm taken for between 0 and n-1
Implementing Digital Signature C.) Uses her private key (n, d) to compute
with RSA Algorithm the signature , s = md mod n.
D.) Sends this signature s to the recipient,
In this algorithm, n is known as the B.
modulus. ‘e’ is known as the encryption Step3. Encryption
exponent. ’d’ is known as the secret Sender A does the following:-
exponent or decryption exponent. 1.Obtains the recipient B's public key (n,
Step 1. Key Generation Algorithm e).
1. Choose two distinct large random prime 2. Represents the plaintext message as a
numbers p and q positive integer m
3. Computes the ciphertext c = me mod n.

215
4. Sends the ciphertext c to B. corresponding service model mature
Step4. Decryption enough, cloud computing will bring a
Recipient B does the following:- revolutionary change in the Internet. Cloud
1. Uses his private key (n, d) to compute m computing announced a low-cost super-
= cd mod n. computing services to provide the
2. Extracts the plaintext from the message possibility, while there are a large number
representative m. of manufacturers behind, there is no doubt
Step5. Signature verification that cloud computing has a bright future.
Recipient B does the following:-
1. Uses sender A's public key (n, e) to References
compute integer v = se mod n.
2. Extracts the message digest from this [1]http://en.wikipedia.org/wiki/Cloud_computin
integer. g
3. Independently computes the message
digest of the information that has been [2]http://www.cloudcomputingchina.cn/Article/l
signed. uilan/200909/306.html
4. If both message digests are identical, the
[3]http://searchcloudcomputing.techtarget.com/s
signature is valid. Definition/0, sid201_gci1287881,00.html

8. Conclusions [4]http://www.boingboing.net/2009/09/02/cloud-
computing-skep.html
Among the many IT giants driven
by trends in cloud computing has not [5] (U.S.) Nicholas. Carr, fresh Yan Yu, "IT is
doubtful. It gives almost everyone has no longer important: the Internet great change of
the high ground - cloud computing," The Big
brought good news. For enterprises, cloud Switch:Rewining the World,from Edison to
computing is worthy of consideration and Google, , CITIC Publishing House, October
try to build business systems as a way for 2008 1-1
businesses in this way can undoubtedly
bring about lower costs, higher profits and [6] Ya-Qin Zhang, the future of computing in the
more choice; for large scale industry, After "cloud - Client", The Economic Observer
the financial turmoil will be the cost of reported, http://www.sina.com.cn, 2008 Nian 07
infrastructure for large-scale compression Yue 12 Ri 14:30
seems likely; developers, when in the face
[7] Wang Haopeng (Air Force Aviation
of cloud computing, through the PaaS University of Computer Teaching, Jilin,
model can effectively improve their own Changchun 130022, China); Liu strong (Air
capacity, Therefore, the impact of cloud Force Air University, Research Department,
computing on the ISV is the largest of the Jilin, Changchun 130022, China), virtualization
many roles; for engineers and developers technology in the application of cloud
are concerned. There is the advent of cloud computing, TP313.A ,1009-3044 (2008 ) 25-
computing is bound to birth a number of 1554-01,2008 Year 25
new jobs. The clouds will grow in size as
soon as available bandwidth and the [8] http://www.emc.com/digital_universe

216

You might also like