MITS5002 Cloud Computing: Encryption Algorithms for Data Security

Verified

Added on  2022/12/15

|13
|780
|167
Report
AI Summary
This report explores the critical aspects of securing user data within cloud computing environments. It begins by highlighting the transformative impact of cloud computing on IT and the challenges it presents, particularly concerning data security, ownership, and integrity. The report proposes the use of security algorithms to address these concerns, focusing on four key encryption methods: RSA, AES, DES, and Blowfish. It details the functionality of each algorithm, explaining how they contribute to data protection, user authentication, and secure data storage and retrieval. The report concludes by emphasizing the increasing importance of both cloud and user security, asserting that these algorithms play a crucial role in mitigating security risks and meeting current and future demands. References to relevant academic papers are provided to support the analysis.
Document Page
Securing User Data In Computing Of Cloud
Using Encryption Algorithm
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud Computing
Cloud computing is transforming the information technology.
Altering the working environment of all the IT professionals in a
drastic manner.
Solving a number of problems of conventional computing.
Handling the peak loads and the software update installation.
Several organizations are investing a huge amount of money upon
this new technology.
Document Page
Security Issues and Concerns
Data security
Data ownership
Data Storage trans-coding
Loss of physical security because of the sharing of resources with
other organizations. No knowledge and control present for running all
resources [1].
Lack of existence of a single and common standard for ensuring data
integrity. Ensuring of integrity of data means alteration in response to
several transactions which are particularly authorised.
Document Page
Contd..
Chance of facing huge damage to the service provider’s reputation of
the cloud and customers may be suing the providers of service if
there are any type of privacy rights which are violated [4].
Control of both the encryption and the decryption keys.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Proposed Planning and Algorithms
Security algorithms are to be utilised for removing all the concerns
related to data loss, privacy and segregation during the web
application upon the cloud [2].
Algorithms to be utilised:
RSA
DES
AES
Blowfish
Document Page
RSA Algorithm
Ensures data security in the cloud computing.
Data encrypted for providing security.
Securing data by only letting all the users who are authenticated to
access data.
Data is stored in the cloud.
Request to be placed to the provider of cloud.
Cloud provider authenticates the user and delivers data to the user
which is specified.
Document Page
Contd..
Every message is mapped to a particular integer.
Public key is known by all but Private Key is known by only the
particular user owning the data.
Encryption is done by the cloud service provider.
Decryption is done by the cloud user or cloud consumer.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
AES Algorithm
Used for information Security.
It is a block cipher which is mainly symmetric.
Extremely analysed.
Widely utilised.
User take decision for utilising the cloud services and then migrates the
data upon the cloud.
User submits all the service requirements with the cloud service
provider and then choose the best services offered by the provider.
Request for reading data occurs after decryption on the user end and
then a plain text is read by the user finally.
Replaces DES as a standard approved for wide range of applications.
Document Page
DES Algorithm
Data Encryption Standard is a block cipher.
Encrypts data in a number of blocks having size 64bits each.
Plan text of size 64bits goes as input to DES [3].
Cipher text produced of size 64bits.
Both common key as well as algorithm used for encryption and
Decryption.
Symmetric Algorithm.
Document Page
Blowfish Algorithm
Symmetric Key Algorithm.
Cryptographic.
Encrypts 64bit blocks having key length variable between 128-
448bits.
Fast rate of encryption on the 32bits microprocessors.
Execute less than 5kb memory.
Utilises primitive operations like XOR or addition.
Simple implementation.
Simple design.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
Due to the incrementing demand of cloud, both cloud security as well
as user security are the topmost concerns and all these algorithms
will be helping a lot for all the needs of today and also in decreasing
all the risks of security.
Document Page
References
[1] R. Arora, A. Parashar and C.C.I Transforming. Secure user data in
cloud computing using encryption algorithms. International journal of
engineering research and applications, 3(4), pp.1922-1926, 2013.
[2] M. Almorsy, J. Grundy and I. Müller. An analysis of the cloud
computing security problem. arXiv preprint arXiv:1609.01107, 2016.
[3] S. Pearson. Privacy, security and trust in cloud computing.
In Privacy and security for cloud computing (pp. 3-42). Springer,
London, 2013.
[4] X. Chen. Decentralized computation offloading game for mobile
cloud computing. IEEE Transactions on Parallel and Distributed
Systems, 26(4), pp.974-983, 2015.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]