Professional Documents
Culture Documents
Applying Encryption Algorithm For Data Security in Cloud Storage
Applying Encryption Algorithm For Data Security in Cloud Storage
Applying Encryption Algorithm For Data Security in Cloud Storage
1 Introduction
A. Kartit
LTI, University Chouaib Doukkali, ENSA, El Jadida, Morocco
© Springer Science+Business Media Singapore 2016 141
E. Sabir et al. (eds.), The International Symposium on Ubiquitous Networking,
Lecture Notes in Electrical Engineering 366,
DOI: 10.1007/978-981-287-990-5_12
142 Z. Kartit et al.
trust and reputation of the provider. This weakness has motivated us to think about
solutions that enable users to secure their data to prevent malicious use.
In recent years, STaaS in Cloud gained popularity among both companies and
private users [1]. It allows the end-user to take advantage of the maximum compu-
ting capability with minimum hardware requirement. However, data privacy, secu-
rity, reliability and interoperability issues still have to be adequately solved. But
the most important problem is security and how cloud provider assures it. Data
security in cloud storage is a major obstacle limiting its spread. There are various
opinions on the security of cloud computing with pros and cons [2].
Our contribution aims to provide a solution that ensures the storage of data se-
curely in the cloud. The data must be encrypted before sending them to the cloud.
We used the symmetric encryption algorithm AES in order to benefit from its
advantages in terms of robustness and speed. The AES key will be encrypted by
the asymmetric encryption algorithm RSA and will be stored in a private server
away of the cloud. The integrity and confidentiality of the data is ensured by
providing access to the data only on successful authentications (authentication in
cloud and authentication in private server). The authorized user can also download
the file and read it on the system. This hybrid model that we have proposed allows
to secure the data and to enhance the resistance to attacks.
This document is organized as follows: The first section gives a comprehensive
definition and the characteristics of cloud computing. The second section de-
scribes layers and their technologies related to this concept. The third section
describes the different types of cloud computing and their characteristics. The
fourth section describes our model proposed of securing data in cloud storage
algorithm for encryption/decryption for outsourcing data in cloud storage and then
the general conclusion.
2.1 Definition
Cloud Computing is an important concept in computer development in recent
years. This concept refers to the use of computing capacity and storage of comput-
ers and servers in the world over the Internet. Cloud services allow individuals and
businesses to use software and hardware that are managed by third parties at re-
mote locations. Examples of cloud services include online file storage, social
networking sites, webmail, and online business applications. Cloud computing
provides a shared pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and user applications.