Cloud Computing Security and Privacy Preservation: Using multi-level encryption (original) (raw)

Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)

2017

Data stored in the cloud is increasingly gaining popularity for all users including personal, institutions and business purposes. The data is usually highly protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in technology, the practical usefulness and longevity of cloud storage is limited in today’s systems. This paper provides a solution to the problem of securely storing the client’s data by maintaining the confidentiality and integrity of the data within the cloud. This paper addresses the problem of ensuring data confidentiality against cloud and against accesses beyond authorized rights. To resolve these issues, we designed a data encryption model that is in charge of storing data in an encrypted format in the cloud. To improve the efficiency of the designed architecture, the service in form of the model designed allows the users to choose the level of security of the data and according to this level different encryption al...

Enhancing Cloud Data Security Using Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms

2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)

Cloud computing is an IT model that offers a large number of storage space, unbelievable computing power and inconceivable speed of calculations. There are a number of costumers like corporate components, social media programs and individual customers are all moving towards to the vast area of cloud computing. The importance of cloud computing comes out with the security of data accessibility, reliability and reliability of information. The verification and permission is more necessary to access information as 'cloud' is only assortment of actual super computer speed through the world. There are many research has been done on security of file encryption with AES

A Novel Technique of Data Security in Cloud Computing based on Blowfish with MD5 method

In cloud computing, users transfer their burden of installing the software, data maintenance, infrastructure, storage space etc. on the cloud service provider. These providers offer to their clients the possibility to store, retrieve and share data with other users in a transparent way [1]. In this paper, a method is implemented for ensuring the data security of the files being uploaded to the cloud by different clients. This security is achieved through a technique of encryption using blowfish with the MD5 method. The results of the proposed method have shown that the size of the encrypted file is decreased as compared to that of existing techniques. So, the storage space of the cloud is used in a much efficient manner when the proposed technique is implemented. Moreover, the replay attack is also defended more efficiently through the proposed method thus increasing the security level of the cloud. With the use of MD5 method along with blowfish, the data is encrypted in lesser time hence making it difficult for the attacker to hack the data, of the client, which is uploaded to the cloud.

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

2018

Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level of security such as privacy, confidentiality and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as when needed.

Cloud data security and various cryptographic algorithms

International Journal of Electrical and Computer Engineering (IJECE), 2023

Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients' valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.

Encryption algorithm in cloud computing

Materials Today: Proceedings, 2021

The exponential growth of cloud computing, an efficient data security system becomes essential for cloud computing-based environments. Encryption algorithms perform a critical role not only in information security systems, but also plays a significant role for several cloud computing-based systems. In this research article, we have proposed a new encryption-based algorithm for cloud computing analyzed. The proposed algorithm has been compared with various other traditionally used popular encryption algorithms primarily including DES, AES, Blowfish as well as proposed algorithm. Various parameters like time for encryption for the various sizes of the blocks, the avalanche effect on the plain text, have been used to analyse the performance of the proposed algorithm. The analysis of experimental results implemented on MATLAB highlights that proposed algorithms performs 64 percent better with considered parameters and with the key has 57 percent better results as compared with the other traditional existing algorithms.

A Review on Data Encryption Algorithm in Cloud Computing

International Journal of Advance Research and Innovative Ideas in Education, 2017

Cloud computing provides an illusion to the customers of using infinite computing resources that are available from anywhere, any time on demand. Cloud computing provide secure data transmission. Security of data becomes a large concern to insure various attribute like integrity, confidentiality, authentication etc. .cryptography techniques like DES,Blowfish,RC5, AES, RSA, 3DES ,Diffie-Hellman plays a major roles in protecting the data in those application which are running in a network environment. In this paper providing comparative analysis on various security algorithm which are already available.

Securing Cloud Data Storage through Encryption

Cloud computing is a modern technology that realizes the dream of on demand, virtualized, scalable and economical internet based computing. However, there are number of threats which make cloud vulnerable. Data Storage and Backup service of cloud can suffer due to data loss, external security breach or malicious attack from within the cloud itself. The virtualized and multitenant nature of cloud make data security attacks more intense and diversified. Encryption is the most effective method to protect integrity and security of cloud data storage. Many novel encryption techniques have been developed especially keeping cloud in view. In this paper we have discussed various approaches of cloud data encryption and popular methods under these approaches with benefits and drawbacks of each method. We have also pointed out some open problems and highlighted the scope of research in this field.

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

International Journal for Research in Applied Science and Engineering Technology, 2019

With the growing rate of cloud computing and Information sharing, there is a growth in users and security breach into the system and data. Cryptography based on identity has allowed us to define an innovative solution to ensure the confidentiality of data stored on remote servers. This paper presents, data security technique based on AES (Advanced Encryption Standard) cryptography approach for secure data sharing among users of the cloud. Our approach is to provide secure data before storing on the cloud using the AES algorithm. Using this approach only authorized users of the application can access the available resources and facilities. In this research proposed a new algorithm called DSICE (Data Security in Cloud using Encryption), which encrypt the file using secure key, uploaded by the user at the cloud end and DSICD (Data Security in Cloud using Decryption), which decrypt the file data using secure key from the cloud at the other end. The application has been implemented through a multi-tier web application based on Java technology, Apache Server and Mysql database. Security of data can be reached using AES cryptography and the overall system has been tested using the JMeter application and the comparative study was taken into account between localhost and cloud.

Enhancement of Cloud Data Security by Multi-Cloud Data Encryption and Decryption

Everyday trillion bytes of data are generated, 90%of which has been created in the last two years alone, from this it can predict the amount of data that will be generated in future. It is necessary, to introduce some techniques for providing security such a huge amount data and to deal with limitation of 'Cloud Security'. Such cloud security can be used nearly in every aspect of cloud environment system. The motive of this paper is to understand how cloud security is prime and the necessity of multi cloud system. This paper also gives a short glimpse of multi cloud security implications in the real world and its role in every field along with challenges and advantages. This paper also explores various techniques, algorithms such as Shamir Secret and Blowfish, systems of multi cloud system in various sectors of digital world.