Applying Encryption Algorithm For Data Security in Cloud Storage

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Applying Encryption Algorithm

for Data Security in Cloud Storage

Zaid Kartit, Ali Azougaghe, H. Kamal Idrissi, M. El Marraki,


M. Hedabou, M. Belkasmi and A. Kartit

Abstract *This paper proposes a simple, secure, and privacy-preserving architec-


ture for inter-Cloud data sharing based on an encryption/decryption algorithm
which aims to protect the data stored in the cloud from the unauthorized access.

Keywords Cloud storage · Data security · Cryptography · RSA · AES

1 Introduction

Cloud computing is the concept implemented to remedy the Daily Computing


Problems. Cloud computing is basically virtual pool of resources and it provides
these resources to users via internet. It provides IT services as on-demand ser-
vices, accessible from anywhere, anytime and by authorized user. It offers a range
of services for end users; among which there's Storage as a service. Storage as a
service (STaaS) is a Cloud business model in which a service provider rents space
in its storage infrastructure to individuals or companies. The data stored in the
cloud can be sensitive to the business. The problematic is that these data are likely
to be exploited by the provider or other unauthorized persons. Currently, most of
cloud storage users protect their data with SLAs contracts and are based on the

Z. Kartit() · H. Kamal Idrissi · M. El Marraki


LRIT, Faculty of Sciences, Mohammed V University, Rabat, Morocco
e-mail: z_kartit@yahoo.fr
A. Azougaghe · M. Belkasmi
SIME, Mohammed V University, ENSIAS, Rabat, Morocco
e-mail: azaling@gmail.com
M. Hedabou
ENSA de Safi, University of Cadi Ayyad, Marrakech, Morroco

A. Kartit
LTI, University Chouaib Doukkali, ENSA, El Jadida, Morocco
© Springer Science+Business Media Singapore 2016 141
E. Sabir et al. (eds.), The International Symposium on Ubiquitous Networking,
Lecture Notes in Electrical Engineering 366,
DOI: 10.1007/978-981-287-990-5_12
142 Z. Kartit et al.

trust and reputation of the provider. This weakness has motivated us to think about
solutions that enable users to secure their data to prevent malicious use.
In recent years, STaaS in Cloud gained popularity among both companies and
private users [1]. It allows the end-user to take advantage of the maximum compu-
ting capability with minimum hardware requirement. However, data privacy, secu-
rity, reliability and interoperability issues still have to be adequately solved. But
the most important problem is security and how cloud provider assures it. Data
security in cloud storage is a major obstacle limiting its spread. There are various
opinions on the security of cloud computing with pros and cons [2].
Our contribution aims to provide a solution that ensures the storage of data se-
curely in the cloud. The data must be encrypted before sending them to the cloud.
We used the symmetric encryption algorithm AES in order to benefit from its
advantages in terms of robustness and speed. The AES key will be encrypted by
the asymmetric encryption algorithm RSA and will be stored in a private server
away of the cloud. The integrity and confidentiality of the data is ensured by
providing access to the data only on successful authentications (authentication in
cloud and authentication in private server). The authorized user can also download
the file and read it on the system. This hybrid model that we have proposed allows
to secure the data and to enhance the resistance to attacks.
This document is organized as follows: The first section gives a comprehensive
definition and the characteristics of cloud computing. The second section de-
scribes layers and their technologies related to this concept. The third section
describes the different types of cloud computing and their characteristics. The
fourth section describes our model proposed of securing data in cloud storage
algorithm for encryption/decryption for outsourcing data in cloud storage and then
the general conclusion.

2 About Cloud Computing

2.1 Definition
Cloud Computing is an important concept in computer development in recent
years. This concept refers to the use of computing capacity and storage of comput-
ers and servers in the world over the Internet. Cloud services allow individuals and
businesses to use software and hardware that are managed by third parties at re-
mote locations. Examples of cloud services include online file storage, social
networking sites, webmail, and online business applications. Cloud computing
provides a shared pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and user applications.

2.2 Essential Characteristics


Cloud model promotes availability and is composed of five essential character-
istics [4]:

You might also like