Securing User Data In Computing Of Cloud Using Encryption Algorithm

Verified

Added on  2022/12/15

|13
|780
|167
Presentation
AI Summary
This presentation discusses the importance of securing user data in cloud computing and the use of encryption algorithms such as RSA, DES, AES, and Blowfish. It highlights the security issues and concerns in cloud computing and the need for data integrity. The presentation also explains how these algorithms work and their role in ensuring data security. References are provided for further reading.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Securing User Data In Computing Of Cloud
Using Encryption Algorithm

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cloud Computing
Cloud computing is transforming the information technology.
Altering the working environment of all the IT professionals in a
drastic manner.
Solving a number of problems of conventional computing.
Handling the peak loads and the software update installation.
Several organizations are investing a huge amount of money upon
this new technology.
Document Page
Security Issues and Concerns
Data security
Data ownership
Data Storage trans-coding
Loss of physical security because of the sharing of resources with
other organizations. No knowledge and control present for running all
resources [1].
Lack of existence of a single and common standard for ensuring data
integrity. Ensuring of integrity of data means alteration in response to
several transactions which are particularly authorised.
Document Page
Contd..
Chance of facing huge damage to the service provider’s reputation of
the cloud and customers may be suing the providers of service if
there are any type of privacy rights which are violated [4].
Control of both the encryption and the decryption keys.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Proposed Planning and Algorithms
Security algorithms are to be utilised for removing all the concerns
related to data loss, privacy and segregation during the web
application upon the cloud [2].
Algorithms to be utilised:
RSA
DES
AES
Blowfish
Document Page
RSA Algorithm
Ensures data security in the cloud computing.
Data encrypted for providing security.
Securing data by only letting all the users who are authenticated to
access data.
Data is stored in the cloud.
Request to be placed to the provider of cloud.
Cloud provider authenticates the user and delivers data to the user
which is specified.
Document Page
Contd..
Every message is mapped to a particular integer.
Public key is known by all but Private Key is known by only the
particular user owning the data.
Encryption is done by the cloud service provider.
Decryption is done by the cloud user or cloud consumer.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
AES Algorithm
Used for information Security.
It is a block cipher which is mainly symmetric.
Extremely analysed.
Widely utilised.
User take decision for utilising the cloud services and then migrates the
data upon the cloud.
User submits all the service requirements with the cloud service
provider and then choose the best services offered by the provider.
Request for reading data occurs after decryption on the user end and
then a plain text is read by the user finally.
Replaces DES as a standard approved for wide range of applications.
Document Page
DES Algorithm
Data Encryption Standard is a block cipher.
Encrypts data in a number of blocks having size 64bits each.
Plan text of size 64bits goes as input to DES [3].
Cipher text produced of size 64bits.
Both common key as well as algorithm used for encryption and
Decryption.
Symmetric Algorithm.
Document Page
Blowfish Algorithm
Symmetric Key Algorithm.
Cryptographic.
Encrypts 64bit blocks having key length variable between 128-
448bits.
Fast rate of encryption on the 32bits microprocessors.
Execute less than 5kb memory.
Utilises primitive operations like XOR or addition.
Simple implementation.
Simple design.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
Due to the incrementing demand of cloud, both cloud security as well
as user security are the topmost concerns and all these algorithms
will be helping a lot for all the needs of today and also in decreasing
all the risks of security.
Document Page
References
[1] R. Arora, A. Parashar and C.C.I Transforming. Secure user data in
cloud computing using encryption algorithms. International journal of
engineering research and applications, 3(4), pp.1922-1926, 2013.
[2] M. Almorsy, J. Grundy and I. Müller. An analysis of the cloud
computing security problem. arXiv preprint arXiv:1609.01107, 2016.
[3] S. Pearson. Privacy, security and trust in cloud computing.
In Privacy and security for cloud computing (pp. 3-42). Springer,
London, 2013.
[4] X. Chen. Decentralized computation offloading game for mobile
cloud computing. IEEE Transactions on Parallel and Distributed
Systems, 26(4), pp.974-983, 2015.
Document Page
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]