Professional Documents
Culture Documents
Cloud Cryptography User End Encryption
Cloud Cryptography User End Encryption
Volume: 01, Issue: ICCIT- 1441, Page No.: 397 - 400, 9th & 10th Sep. 2020.
Abstract— Cloud computing has made the life of individual Security, Availability, Integrity and Confidentiality are the
users and work of business corporations so much easier by three primary elements that users consider before signing up
providing them data storage services at very low costs. for cloud computing services. Confidentiality or privacy or
Individual users can store and access their data through
security is the key challenge, for cloud service providers.
shared cloud storage service anywhere anytime. Similarly,
business corporation consumers of cloud computing can store,
Many public and private cloud services have experienced
manage, process and access their big data with quite an ease. security breaches and unauthorized access incidents.
However, the security and privacy of users’ data remains Microsoft’s employees suffered the consequences of a
vulnerable in cloud computing Availability, integrity and security breach in 2010 and Apple’s iCloud went through a
confidentiality are the three primary elements that users similar security hack in 2014 [1].
consider before signing up for cloud computing services.
Many public and private cloud services have experienced Cryptography is the way to take care of the security worries
security breaches and unauthorized access incidents. This of both users and service providers. Cryptography is the
paper suggests user end cryptography of data before
technique of encoding users’ data to make it
uploading it to a cloud storage service platform like Google
Drive, Microsoft, Amazon and CloudSim etc. The proposed
incomprehensible and impenetrable during storage or
cryptography algorithm is based on symmetric key transmission [2]. The very basic security threat that users
cryptography model and has been implemented on Amazon face, while signing up for a cloud service, is giving open
S3 cloud space service. access to a service provider to their personal data. The
second threat comes from other users in a shared virtual
Keywords— Cloud Computing Security, Cryptography, Key environment and the third security hazard is privileged
Generation, Encryption, Decryption access abuse from an outside source [9]. Most cloud
computing security solutions are related to cryptography of
I. INTRODUCTION user’s data on service provider’s end so that no shared user
Cloud computing is the technology where service providers or outside source can violate a particular user’s personal
use network for distributed processing and parallel data access rights. However, the primary element of
computing of users’ data. They facilitate their users by encryption, the key that encrypts any user’s data and is used
providing software, platform and infrastructure services all to decrypt it, still remains in service provider’s knowledge
in one package [10].They make virtual environment known and can be used for unwanted intrusion. In order to free the
as cloud for users to upload, store and access their data user from all kinds of security threats, the best step will be
anytime anywhere they want. Users can take advantage of to implement user end encryption algorithm before
this cloud service using just internet without going through uploading any personal data onto a cloud service. This can
the trouble of downloading the application or running out of be done for both individual user case and any business
storage [3]. Simplest example of this type of public cloud enterprise scenario.
computing is Google drive, where any individual user can
sign up and store and access hundreds of megabytes of data. II. CRYPTOGRAPHY
Cryptography is the art of encoding secret information in
Business companies also use cloud computing for storage illegible hidden format using an encryption key. The data
and maintenance of their enterprise tools and contents. is retrieved in its actual form on receiver end by decryption
Cloud service providers offer these companies a shared data using the same secret key [3]. Only the person with the
storage space at low costs. Small business companies pay secret key knowledge has access to the encrypted data and
them depending upon their data size requirements and the right to decrypt it. The main ingredients of any
utilize the remote control of cloud space. An example of cryptography process are: plain data, secret key, encryption
such community cloud is Amazon. However, bigger algorithm, cipher data and decryption algorithm [2].
business corporations or government agencies have Cryptography has two main types: symmetric or private or
developed their own cloud computing platforms for trouble single key type cryptography and asymmetric or public key
free storage and practical applications. Well-known type cryptography [8, 12]. Fig. 1 explains the regular flow
example of business enterprises’ private cloud computing of a cryptography process.
platform is SharePoint by Microsoft [4].
978-1 -7281-2680-7/20/S31.00 ©2020 IEEE Volume: 01, Issue: ICCIT- 1441, Page No.: 397 - 400, 9th & 10th Sep. 2020.
Authorized licensed use limited to: MIT-World Peace University. Downloaded on July 26,2022 at 04:27:28 UTC from IEEE Xplore. Restrictions apply.
S. A. Nooh: User End Encryption...
Authorized licensed use limited to: MIT-World Peace University. Downloaded on July 26,2022 at 04:27:28 UTC from IEEE Xplore. Restrictions apply.
S. A. Nooh: User End Encryption...
2. Conversion of character into ASCII code. value into four sets of two bits and switching their places
3. Conversion of ASCII code in binary value. and conversion of the resulted binary number into decimal
4. Addition of zeroes in case the binary value is less than value. The ASCII character of that final value is written
8 bits. back into the decryption file. At the end of the decryption
5. Division of the 8-bit binary value into four sets of two algorithm, the cipher data is converted back to original file
bits and switching their places. as shown in Fig. 7.
6. Attachment of the switched four sets back together into
8-bit binary code.
7. Binary 1’s complement of the above binary value.
8. Conversion of step 7 binary value back into ASCII
value.
9. Transmission of the ASCII value character as cipher
text.
VI. CONCLUSION
The paper suggests user end cryptography of data before
Fig. 6. Proposed Design Symmetric Key Generation and Verification uploading it to a cloud storage service platform like Google
Drive, Microsoft, Amazon and CloudSim etc. All these
d. Data Decryption service providers facilitate individual and business
company consumers with efficient maintenance of their
Decryption algorithm is just the reverse procedure of applications, data and information at low costs. However,
encryption after verifying receiver’s key file and goes like security and confidentiality remain the top hot areas of
this: extraction of cipher text file character, conversion of these cloud services.
character into ASCII code and then to binary value, 1’s
complement of the binary value, division of the 8-bit binary
Voi. 01, No. IC C IT - 1441, pp. 397 - 400, 9th & 10th Sep. 2020.
Authorized licensed use limited to: MIT-World Peace University. Downloaded on July 26,2022 at 04:27:28 UTC from IEEE Xplore. Restrictions apply.
S. A. Nooh: User End Encryption...
Different types of unauthorized data access incidents can Communications and Networking, 2019:88, Pp. 1-15, 2019.
doi:10.1186/s13638-019-1399-z
happen when unencrypted data is stored on a cloud storage
service. Data theft during transit i.e. data interloping during [14] Saad Al-Mutairi, and S.Manimurugan .,"The clandestine image
its movement between datacenters of service providers, transmission scheme to prevent from the intruders", International
Journal of Advanced and Applied Sciences, Vol 4, No 2, Pages:
lack of standardization i.e. false claims of service providers 52-60, 2017.
about their end-to-end secure systems and privacy of data
from the service provider team itself are a few important [15] S.Manimurugan., and Saad Al- Mutari,"A Novel Secret Image
Hiding Technique for Secure Transmission", Journal of
user concerns [7,11]. If the user implements cryptography Theoretical and Applied Information Technology, Vol.95. No.1,
algorithm before storing their data on the cloud, they can pp. 166-176, January 2017.
have the security of their information from service
providers and all other outside unauthorized access parties.
For user end cryptography of storage service data, the paper
presents a symmetric key encryption algorithm along with
secret key generation. They secret key file will only be in
user’s knowledge who will download encrypted data stored
on cloud service and retrieve it through decryption.
REFERENCES
[1] Bradford, Contel, "7 Most Infamous Cloud Security Breaches -
Storagecraft", Storagecraft Technology Corporation, 2019,
https://blog.storagecraft.com/7-infamous-cloud-security-
breaches/.Eng.
[2] Hashem and H. Ramadan, “Using Cryptography Algorithms to
Secure Cloud Computing Data and Services”, Amer. J Eng. Res.
(AJER), vol. 6, no. 10, pp.334-337, 2017.
[3] S. Gunavathy, and C. Meena, "A Survey: Data Security In Cloud
Using Cryptography And Steganography". International Research
Journal of Engineering and Technology, Vol.6, No. 5, pp. 6792
6797, 2019
[4] A. N. Jaber, and M. F. Zolkipli, "Use of Cryptography In Cloud
Computing", 2013 IEEE International Conference On Control
System, Computing And Engineering, IEEE, 2013,
doi: 10.1109/iccsce.2013.671995 5.
[5] J. P. Kaur, and R. Kaur, “Security Issues and Use of Cryptography
in Cloud Computing”, Vol. 4, No. 7, pp. 599-606. 2014.
[6] G. C. Kessler, “An Overview of Cryptography”,
https://www.garykessler.net/library/crypto.html, 2019.
[7] S. Ortiz, "The Problem with Cloud-Computing Standardization",
Computer, IEEE, Vol. 44, no. 7, pp. 13-16, 2011.
doi: 10.1109/mc.2011.220.
[8] Y. Peng, et al, "Secure Cloud Storage Based on Cryptographic
Techniques", J China Univer. Posts Telecomm, Vol. 19, pp. 182
189, 2012. Doi: 10.1016/s1005-8885(11)60424-x.
[9] K. V. Pradeep, et al, "An Efficient Framework for Sharing a File
in a Secure Manner Using Asymmetric Key Distribution
Management in Cloud Environment", Journal of Computer
Networks and Communications, Hindawi Limited, pp. 1-8, 2019.
doi:10.1155/2019/9852472.
[10] X. Yan, et al, "The Research and Design of Cloud Computing
Security Framework", Lecture Notes in Electrical Engineering,
Springer Berlin Heidelberg, pp. 757-763, 2011. DOI:
10.1007/978-3-642-25541 -0_95.
[11] Shanmuganathan, M., Almutairi, S., Aborokbah, M. M.,
Ganesan, S., and Ramachandran, V., “Review of advanced
computational approaches on multiple sclerosis segmentation
and classification”, IET Signal Processing, Vol. 14, Issue 6, pp.
333-341, August 2020,
[12] S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N.
Chilamkurti, S. Ganesan and R. Patan, "Effective Attack
Detection in Internet of Medical Things Smart Environment
Using a Deep Belief Neural Network," in IEEE Access, vol. 8,
pp. 77396-77404, 2020, doi: 10.1109/ACCESS.2020.2986013.
[13] Almutairi, S., Manimurugan, S., and Aborokbah, M., “A new
secure transmission scheme between senders and receivers using
HVCHC without any loss”, EURASIP Journal on Wireless
Vol. 01, No. IC C IT - 1441, pp. 397 - 400, 9th & 10th Sep. 2020.
Authorized licensed use limited to: MIT-World Peace University. Downloaded on July 26,2022 at 04:27:28 UTC from IEEE Xplore. Restrictions apply.