Paper id 27201448

I

Vol 2 Issue 7

International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
133 
Security as a Service: Cryptology on Demand 
Venkatesh Ranga1, M.S.V. Sashi kumar2, Dr. C.R.K.Reddy3 
M.Tech CSE1 , Assistant Professor CSE2, Professor CSE3, Osmania University1,2,3 
venkuranga@gmail.com1, sashi.mamidanna@gmail.com2, crkreddy@gmail.com 
Abstract- Cloud Computing is becoming more and more popular today and is ever increasing in popularity with 
large organizations as they sharing valuable resources in a cost effective way. By doing like this increasing 
demand for more clouds there is an ever growing threat of security becoming a major issue. Achieving strong 
security would often require large IT resource and also result in difficulty of usage. To increase security while 
reducing the spending on IT & improving the ease of use, we require a security technique which can configure 
itself, as requested, for services offered in a Cloud environment. This paper mainly focus on by the usage of less 
resources how can we provide security to the end user. The security architecture is driven by security policies 
based on these inputs into consideration. 
1. Network Access Risk 
2. User Data. 
3. Key size 
With these inputs in place, the security policies can generate security parameters which in turn are used to 
configure mechanisms to alter security (including algorithms and protocols) at every domain for protection of 
specific security services. Security requirements from users and services in cloud computing in turn building 
trust for the end users via Security at their ease & also data control. 
Key words: Cloud; Encryption; Security. 
1. INTRODUCTION 
Cloud computing has been defined by NIST as a 
model for enabling ubiquitous, on- demand network 
access to a shared pool of configurable computing 
resources that can be rapidly provisioned and released 
with minimal management effort or service provider 
interaction . In simple words cloud computing is a 
accessing some one’s software in some one’ hardware 
in some one’s data centre .Cloud computing can be 
considered a new computing paradigm with 
implications for greater flexibility and availability at 
lower cost. Cloud computing is a promising 
computing paradigm which recently has drawn 
extensive attention from both academia and industry. 
The term itself is often used today with a range of 
meanings and interpretations. 
Three referenced service models have evolved: 
Software-as-a-Service (SaaS): Is a way of delivering 
applications over the Internet. Instead of installing 
and maintaining software, you simply access it via the 
Internet. SaaS applications are sometimes called Web-based 
software or hosted software. Whatever name we 
can call it as, SaaS applications run on a SaaS 
provider’s servers. The provider manages the access 
to the application, includes security, availability, and 
performance. It can reduce the total cost of hardware 
and software development and operations. 
Platform-as-a-Service (PaaS): Platform as a Service 
(PaaS) is a way to use some one’s hardware, operating 
systems, storage and network capacity over the 
Internet. The service delivery models are allows the 
customer to rent virtualized servers and associated 
services for running existing applications or 
developing and testing new ones. It can reduce the 
cost and managing hardware and software 
components of the platform. 
Infrastructure-as-a-Service (IaaS): Infrastructure as 
a Service is a provision model in which an 
organization outsources the equipment used to support 
operations, including storage, hardware, servers. The 
service provider maintains the equipment and is 
responsible for housing, running and managing it. The 
client typically pays on a how much they are use that 
much amount customers will pay to service providers 
pay per use basis. 
The most popular cloud types are namely 
private, public and hybrid clouds. In a private cloud, 
total infrastructure for implementing the cloud is 
controlled completely by the enterprise. Typically, 
private clouds are maintained and implemented in the 
enterprise data centre and managed by internal 
resources. A private cloud maintains all data in 
resources under the control of the legal and 
contractual umbrella of the organization. This 
eliminates the regulatory and legal security concerns 
represented with information being processed on third 
party computing resources. In a public cloud, external 
organization provides the infrastructure and 
management required to implement the cloud. Public 
clouds orderly simplify implementation and are 
typically billed based on usage of resources. This 
transfers the cost from a capital expenditure to an 
operational expense and can quickly be scaled to meet 
the organization’s needs. 
Security has been and is the biggest 
challenge to cloud computing. It is hard for the users
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
134 
to believe in cloud computing due to invisibility of the 
user’s data storage and how are they protected. 
Research says that as of now there is no way to know 
if the cloud providers properly remove a client’s data, 
or whether they have saved it for some unidentified 
reason. Currently, the study on cloud security still lies 
in the preliminary study. For data storage, a TPA 
(Third Party Auditor) is proposed to verify the 
integrity of the dynamic data stored in the cloud. 
In trust management field, some experts 
considered that multiple security policies should be 
used in user’s authentication and identity 
management, and those policies must be able to avoid 
intrusion of data by unauthorized users. 
2. PROBLEM DESCRIPTION: 
Security parameters even differ for a specific 
service for two different users depending on the 
sensitivity of the information. The solution for these 
issues can simply be the usage of a highly 
complicated and secure algorithm popularly used to 
safeguard all services in the network. Potentially, this 
might not be effective way for cloud service providers 
to use the same security mechanism throughout the 
services since it consumes a lot of IT resources every 
time. It would not be a solution to consume resources 
for security itself, as we counteract the advantage of 
cloud computing platform wasting the available 
resources. 
By considering all the applications in the 
cloud environment, all the applications are using Sha1 
for authentication.AES and DES security algorithms 
to secure the data. Most of the applications are using 
same symmetric key algorithm for encrypting the any 
amount data and providing security to the user’s data. 
By using same variable key length for the 
any amount of data it will take more time for 
encryption/decryption and processing of the data 
.Using the same key for encryption/ decryption take 
same time when the data size is differ. If the data size 
is small then it will take same time and increases the 
data size. In our approach we can change the 
algorithm key size. When the size of the data changes 
If we uploading large data we can use large for foe 
security. If transferring data is small than we can go 
for small key to encrypt the data. Depending on the 
size of the file we can change the algorithm key size. 
By doing like this we can boost the performance of 
the CPU. 
3. CRYPTOGRAPHIC ALGORITHM: 
As far we are saying that every application is 
using same encryption key for encrypting the data. 
Most of the applications are using SHA1 for 
providing the security for the user authentication and 
some symmetric key algorithm for the encrypting the 
users data. In this paper we are using other symmetric 
algorithm called Blowfish. As per Researches 
Blowfish has been shown better results compare to 
other encryption algorithms. So In my Application we 
are using blowfish algorithm for encrypting the data. 
Blowfish algorithm is a symmetric block cipher that 
can be effectively used for both encryption and 
safeguarding of data. Blowfish algorithm is a Feistel 
Network and 64-bit block size and a variable key 
length from 32 bits to 448 bits in length, to calculate 
sub keys, which are used in the actual encryption and 
decryption. The P-array consists of 18 32-bit values 
while the 4 s-boxes consist of 256 32-bit values. The 
P-array is initialized first and followed by the S-boxes. 
It is a 16-round Feistel network for encryption 
and decryption. The algorithm was developed to 64- 
bit plaintext into 64 bit cipher securely. 
ENCRYPTION: 
Blowfish has 16 rounds. 
The input is a 64-bit data element, X 
Divide x into 32-bit halves, XL, XR; 
Then i= 1 to 16; 
XL = XL XOR Pi 
XR = F (XL) XOR XR; 
Swap XL and XR; 
After the 16th round, swap XL and XR again to undo 
the last swap. 
Then, XR = XR XOR P17 and XL =XL 
XOR P18, Finally, recombine XL and XR to get the 
cipher. 
Decryption same as encryption, except that 
P1, P2, P3, P4…... and P18 are used in the reverse 
order. 
Blow fish is incorporated a bitwise 
exclusive-operation to be performed on the left 32 – 
bits before modified by the F function or propagated 
to the right 32-bits for the next round. Blowfish also 
incorporated two exclusive-or operations to be 
performed after the 16 rounds and a swap operation.
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
135 
F- Function: 
All the applications are using same 
encryption algorithm and same key large key for 
protecting the data. For providing the security to the 
users the application developers are using large key. 
By using the large key it will more computation and 
time. So In my approach we are differentiating the 
users considering the network from where the user is 
accessing the application and user computation. By 
considering these two factors we can provide security 
to the users. We can differentiate the user’s security 
type by writing the policies in the application.” 
4. APPLICATION SCENARIO: 
In this paper am trying to show the 
application which it is self configure the security by 
taking the above parameters into the consideration. As 
per my knowledge all the existing applications are 
using same security mechanism in the applications for 
all the users. So by this there is a chance of wastage of 
resources. As we already know in the cloud security is 
the biggest challenge. For transmitting the data 
between the two users we can not the transfer the data 
directly. We are using some encryption mechanism to 
transfer the data. For that we have to choose best 
encryption algorithm to give better results. If the 
conversation between the two friends i.e. normal 
information there is no need usage of large bit key 
.Whenever we are transmitting secret information 
(confidential) then we need more security so there we 
can use large key to encrypt the data. By considering 
the user’s network we can change the algorithm key 
bit length. If the two user’s are from same network 
then we can use small encryption key to transfer the 
data and if the user’s are from different and untrusted 
network then we can increase the bit size. By using 
same key for everytime the system is more 
computation for encrypting and decrypting the data. 
So differcting the key lenth we can reduce the usage 
of computation in the system and time as well as we 
can also reduce the power. 
For Example: 
In an Enterprise the users are connected to 
each other then they are considered to be internal 
network. From the figure we can observe that User1, 
User2 and User3 are in same private ntework 
acessing the application hosted some where in the 
cloud environment, User4 and User5(mobile user) 
with different processing power devices are from 
public network and accessing the same application 
from the outside other than the office network. 
Whenever User1 is tranferring the data to the User2 
then we can provide security with 128-bit(small) 
key. 
User 1 
User User 
Proxy 
server 
In the internal network the users can access 
the application through the proxy server which is 
mainted in the internal network. The internal network 
users are access the application which is loacated in 
the cloud with the help of proxy server( which 
maitains the cloud application) . If the users are 
intrating in the public network users then increse 
the algorithm bit size to 256-bit key for encrypting the 
data. If the user is trying to access the application 
from the public network then we can increase the 
algorithm bit size i.e to 448-bit key to encrypt the data 
to incearse the security. In our approach we are tested 
our application with two symmetric encryption 
algorithms i.e blowfish and AES. Most of the 
application developers are using AES for encrypting 
the data . In our approach we are replacing the AES 
with Blowfish.We use blowfish for 
encryption/decryption of data.From the study learnt 
that blowfish performance is better when compare to 
other algorithms. So we can change the encryption 
algorithm according to the user requirement. We are 
tested two algorithms with different files size of data 
by using changing the algorithm key sizes . We got 
below results when tested with different algorithm 
key sizes. 
5. RESULTS: 
Application 
Server 
Public Network 
Public Network 
Amazon EC2 
Public Network
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
136 
Table 1 Encryption and decryption times(in milli sec) using 
with 128 –bit key 
Table 2 Encryption and decryption times(in milli sec) using 
with 192 –bit key 
Input 
In KB 
Encryption 
time for 
blowfish 
with 192- 
bit key 
Encryption 
time for 
AES with 
192-bit 
key 
Decryption 
times for 
Blowfish 
192-bit 
key 
Decryption 
times for 
AES 192- 
bit key 
312 46.87 147.995 436.715 1594.123 
512 60.087 156.341 447.156 1900.74 
1536 142.58 283.82 423.55 1237.054 
2048 184.984 391.643 440.152 1429.581 
5120 409.484 761.41 417.677 1215.91 
10240 725.4906 748.392 721.291 1194.154 
Table 3 Encryption and decryption times(in milli sec) using 
with 256 –bit key 
Input 
in KB 
Encryption 
time for 
blowfish 
with 256- 
bit key 
Encryption 
time for 
AES with 
256-bit 
key 
Decryption 
times for 
Blowfish 
256-bit 
key 
Decryption 
times for 
AES 256- 
bit key 
312 47.187 160.1749 450.955 1966.08 
512 58.975 176.32 428.948 1646.9 
1536 136.563 301.1285 425.802 1254.111 
2048 183.296 435.471 424.453 1418.943 
5120 401.911 759.309 389.548 1117.111 
10240 752.497 717.192 784.397 958.822 
Table 4. Encryption and decryption times(in milli sec) using 
AES 256-bit key and 448-bit key 
Figure :1 Encryption and Decryption times for Blowfish and 
AES with 128-bit Key 
2000 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
312 KB 
512 KB 
1536 KB 
2048 KB 
5120 KB 
10240 KB 
Encrypeion time in milli seconds 
File Size in KB 
Encryption time 
for blowfish 
with 128-bit 
key 
Encryption time 
AES with 128- 
bit key 
Decryption timr 
for Blowfish 
128 -bit key 
Decryption time 
for AES 128 -bit 
key 
Input 
in KB 
Encryption 
time for 
blowfish 
with 128- 
bit key 
Encryption 
time for 
AES with 
128-bit 
key 
Decryption 
times for 
Blowfish 
128-bit 
key 
Decryption 
time for 
AES with 
128 -bit 
key 
312 46.46 146.544 405.75 1316.767 
512 47.187 147.921 433 1776 
1536 128.288 212.455 413.253 1152.631 
2048 194.824 284.029 440.054 1133.744 
5120 401.911 698.02 389.548 1412.936 
10240 686.988 671.422 674.928 1277.063 
Input 
In KB 
Encryption 
time for 
AES 256- 
bit key 
Encryption 
time for 
Blowfish 
448-bit key 
Decryption 
time for 
AES 256- 
bit key 
Decryption 
time for 
Blowfish 
448-bit key 
512 176.32 64.608 1646.9 771.544 
1536 301.1285 143.8252 1254.111 846.725 
2048 435.471 196.234 1418.943 465.208 
5120 759.309 414.739 117.111 738.094 
10240 717.192 808.402 958.822 717.601
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
137 
Figure 2. Encryption and Decryption times for Blowfish and 
AES with 192-bit Key 
2000 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
Encryption tomes in milli seconds 
Input file sizes in KB 
Encryption 
time for 
blowfish 
with 192- 
bit key 
Encryption 
time for 
AES with 
192-bit key 
Decryption 
tims for 
Blowfish 
192-bit key 
Decryption 
tims for 
AES 192- 
bit key 
Figure 3. Encryption and Decryption times for Blowfish and 
AES with 256-bit Key 
2500 
2000 
1500 
1000 
500 
0 
312 KB 
512 KB 
1536 KB 
2048 KB 
5120 KB 
10240 KB 
Encryption times in milli seconds 
Input file size in KB 
Encryption time 
for blowfish with 
256-bit key 
Encryption time 
for AES with 256- 
bit key 
Decryption tims 
for Blowfish 256- 
bit key 
Decryption tims 
for AES 256-bit 
key 
Figure 4 Comparision Between the Encryption and Decryption 
Times with AES 256 and Blowfish 448- bit 
1800 
1600 
1400 
1200 
1000 
800 
600 
400 
200 
0 
Encryption times in milli seconds 
Input file size in KB 
Encryption 
time for AES 
256-bit key 
Encryption 
time for 
Blowfish 448- 
bit key 
Decryption 
time for AES 
256-bit key 
Decryption 
time for 
Blowfish 448- 
bit key
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
138 
6. CONCLUSION : 
In this paper we conclude that depending on 
the network users are being a part of, type of the 
application working on & the compute system used, 
we can provide the required security strengh by using 
best suited algorithm and varied key size. Transferring 
files from one network to another can be provided 
with on demand security level by increasing the bit 
size of the key. This feature can be provided on varied 
applications and deploying right security policy, the 
performance of the systems can be improved. From 
the comparision of two algorithms we found that 
blowfish performs well in all situations, but the key 
establishment still remains the concern. In traditional 
applications for encrypting any size of data, 
developers are using same key size for cryptography. 
In our scenario , we have varied the key size of the 
algorithm and the chosen algorithm depends on file 
size, user requirement and type of network. Usage of 
same key for encrypting and decrypting any amount 
of data, the allocation time for encryption and 
decryption taken more resouces in hardware and 
more time for processing the data will decrease the 
performance of the CPU. Applying right algorithm in 
the requirement will boost the performence of the 
CPU, reduce the usage hardware inturn reduce the 
processing time. 
REFERENCES: 
[1] P. Mell, T. Grance (2009), The NIST Definition 
of Cloud Computing, Version 15, National 
Institute of Standards and Technology. 
[2] Jianyong Chen, Yang Wang, Xiaomin Wang 
(2011), On demand security architecture for 
Cloud Computing, Dept.of Computer science 
and Technology, China. 
[3]M. Anand Kumar and Dr.S.Karthikeyan (2012), 
“Investigating the Efficiency Blowfish and 
Rejineal (AES)Algorithms”, I.J computer 
network and Information Technology. 
[4] Pratap Chandra Mandal (2012),”Superiority of 
Blowfish Algorithm” IJARCSSE, 
WestBengal,India. 
[5]http://docs.aws.amazon.com/gettingstarted/latest/C 
ompute basis/web-app-hosting-intro.html 
[6] http://en.wikipedia.org/wiki/Blowfish (cipher).

Recomendados

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
30 visualizações3 slides
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit... por
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
9 visualizações5 slides
Big data security_issues_research_paper por
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
99 visualizações5 slides
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
298 visualizações6 slides
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
15 visualizações9 slides
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ... por
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
151 visualizações6 slides

Mais conteúdo relacionado

Mais procurados

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
22 visualizações2 slides
Secry poster por
Secry posterSecry poster
Secry posterALIN BABU
239 visualizações1 slide
Secure Medical Data Computation using Virtual_ID Authentication and File Swap... por
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
41 visualizações5 slides
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
246 visualizações3 slides
Survey on securing outsourced storages in cloud por
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
337 visualizações3 slides
Survey on securing outsourced storages in cloud por
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
86 visualizações3 slides

Mais procurados(20)

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor22 visualizações
Secry poster por ALIN BABU
Secry posterSecry poster
Secry poster
ALIN BABU239 visualizações
Secure Medical Data Computation using Virtual_ID Authentication and File Swap... por IJASRD Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal41 visualizações
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 visualizações
Survey on securing outsourced storages in cloud por eSAT Publishing House
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House337 visualizações
Survey on securing outsourced storages in cloud por eSAT Journals
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals86 visualizações
El35782786 por IJERA Editor
El35782786El35782786
El35782786
IJERA Editor190 visualizações
H1803035056 por IOSR Journals
H1803035056H1803035056
H1803035056
IOSR Journals149 visualizações
J018145862 por IOSR Journals
J018145862J018145862
J018145862
IOSR Journals145 visualizações
Implementation of De-Duplication Algorithm por IRJET Journal
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal31 visualizações
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity... por IRJET Journal
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal5 visualizações
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal21 visualizações
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte... por IRJET Journal
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal6 visualizações
262 265 por Editor IJARCET
262 265262 265
262 265
Editor IJARCET961 visualizações
Cloud Auditing With Zero Knowledge Privacy por IJERA Editor
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor172 visualizações
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE por AM Publications,India
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India71 visualizações
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM por Journal For Research
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research112 visualizações
SECRY - Secure file storage on cloud using hybrid cryptography por ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU2.1K visualizações
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography por IRJET Journal
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal171 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 visualizações

Destaque

Paper id 252014121 por
Paper id 252014121Paper id 252014121
Paper id 252014121IJRAT
176 visualizações6 slides
Paper id 26201493 por
Paper id 26201493Paper id 26201493
Paper id 26201493IJRAT
313 visualizações8 slides
Paper id 27201419 por
Paper id 27201419Paper id 27201419
Paper id 27201419IJRAT
797 visualizações7 slides
Paper id 21201495 por
Paper id 21201495Paper id 21201495
Paper id 21201495IJRAT
307 visualizações5 slides
Paper id 24201467 por
Paper id 24201467Paper id 24201467
Paper id 24201467IJRAT
309 visualizações5 slides
Paper id 2520141232 por
Paper id 2520141232Paper id 2520141232
Paper id 2520141232IJRAT
360 visualizações6 slides

Destaque(20)

Paper id 252014121 por IJRAT
Paper id 252014121Paper id 252014121
Paper id 252014121
IJRAT176 visualizações
Paper id 26201493 por IJRAT
Paper id 26201493Paper id 26201493
Paper id 26201493
IJRAT313 visualizações
Paper id 27201419 por IJRAT
Paper id 27201419Paper id 27201419
Paper id 27201419
IJRAT797 visualizações
Paper id 21201495 por IJRAT
Paper id 21201495Paper id 21201495
Paper id 21201495
IJRAT307 visualizações
Paper id 24201467 por IJRAT
Paper id 24201467Paper id 24201467
Paper id 24201467
IJRAT309 visualizações
Paper id 2520141232 por IJRAT
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
IJRAT360 visualizações
Paper id 24201474 por IJRAT
Paper id 24201474Paper id 24201474
Paper id 24201474
IJRAT362 visualizações
Paper id 252014107 por IJRAT
Paper id 252014107Paper id 252014107
Paper id 252014107
IJRAT285 visualizações
Paper id 252014144 por IJRAT
Paper id 252014144Paper id 252014144
Paper id 252014144
IJRAT273 visualizações
Paper id 21201481 por IJRAT
Paper id 21201481Paper id 21201481
Paper id 21201481
IJRAT395 visualizações
Paper id 21201422 por IJRAT
Paper id 21201422Paper id 21201422
Paper id 21201422
IJRAT487 visualizações
Paper id 28201438 por IJRAT
Paper id 28201438Paper id 28201438
Paper id 28201438
IJRAT362 visualizações
Paper id 27201434 por IJRAT
Paper id 27201434Paper id 27201434
Paper id 27201434
IJRAT248 visualizações
Paper id 25201433 por IJRAT
Paper id 25201433Paper id 25201433
Paper id 25201433
IJRAT359 visualizações
地方財政、預算經驗談-陳錦稷(2014.09.23) por 平台 青
地方財政、預算經驗談-陳錦稷(2014.09.23)地方財政、預算經驗談-陳錦稷(2014.09.23)
地方財政、預算經驗談-陳錦稷(2014.09.23)
平台 青1.3K visualizações
Paper id 24201453 por IJRAT
Paper id 24201453Paper id 24201453
Paper id 24201453
IJRAT242 visualizações
Paper id 21201475 por IJRAT
Paper id 21201475Paper id 21201475
Paper id 21201475
IJRAT285 visualizações
Paper id 21201429 por IJRAT
Paper id 21201429Paper id 21201429
Paper id 21201429
IJRAT364 visualizações
Paper id 212014126 por IJRAT
Paper id 212014126Paper id 212014126
Paper id 212014126
IJRAT294 visualizações
Paper id 2120143 por IJRAT
Paper id 2120143Paper id 2120143
Paper id 2120143
IJRAT174 visualizações

Similar a Paper id 27201448

A Review On Cryptography In Cloud Computing por
A Review On Cryptography In Cloud ComputingA Review On Cryptography In Cloud Computing
A Review On Cryptography In Cloud ComputingJim Jimenez
2 visualizações6 slides
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT por
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
3 visualizações10 slides
Accessing secured data in cloud computing environment por
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
348 visualizações10 slides
Kp3419221926 por
Kp3419221926Kp3419221926
Kp3419221926IJERA Editor
428 visualizações5 slides
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham por
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
3 visualizações3 slides
Encryption Technique for a Trusted Cloud Computing Environment por
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
143 visualizações8 slides

Similar a Paper id 27201448(20)

A Review On Cryptography In Cloud Computing por Jim Jimenez
A Review On Cryptography In Cloud ComputingA Review On Cryptography In Cloud Computing
A Review On Cryptography In Cloud Computing
Jim Jimenez2 visualizações
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT por IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal3 visualizações
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal348 visualizações
Kp3419221926 por IJERA Editor
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor428 visualizações
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham por IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal3 visualizações
Encryption Technique for a Trusted Cloud Computing Environment por IOSR Journals
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals143 visualizações
H017155360 por IOSR Journals
H017155360H017155360
H017155360
IOSR Journals110 visualizações
Encryption Technique for a Trusted Cloud Computing Environment por IOSR Journals
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals110 visualizações
Encryption Technique for a Trusted Cloud Computing Environment por IOSR Journals
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals305 visualizações
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 visualizações
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 visualizações
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C... por IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal31 visualizações
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 visualizações
Cloud Cryptography por ijtsrd
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd1.4K visualizações
Secure Cloud Environment Using RSA Algorithm por IRJET Journal
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
IRJET Journal63 visualizações
Data Grid Privacy and Secure Storage Service in Cloud Computing por ijbuiiir1
Data Grid Privacy and Secure Storage Service in Cloud ComputingData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing
ijbuiiir13 visualizações
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu... por IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal11 visualizações
Improving Data Storage Security in Cloud using Hadoop por IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 visualizações
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag... por IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal9 visualizações
Target Unncryption Case Study por Evelyn Donaldson
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
Evelyn Donaldson2 visualizações

Mais de IJRAT

96202108 por
9620210896202108
96202108IJRAT
134 visualizações4 slides
97202107 por
9720210797202107
97202107IJRAT
107 visualizações5 slides
93202101 por
9320210193202101
93202101IJRAT
36 visualizações4 slides
92202102 por
9220210292202102
92202102IJRAT
46 visualizações9 slides
91202104 por
9120210491202104
91202104IJRAT
75 visualizações3 slides
87202003 por
8720200387202003
87202003IJRAT
176 visualizações4 slides

Mais de IJRAT(20)

96202108 por IJRAT
9620210896202108
96202108
IJRAT134 visualizações
97202107 por IJRAT
9720210797202107
97202107
IJRAT107 visualizações
93202101 por IJRAT
9320210193202101
93202101
IJRAT36 visualizações
92202102 por IJRAT
9220210292202102
92202102
IJRAT46 visualizações
91202104 por IJRAT
9120210491202104
91202104
IJRAT75 visualizações
87202003 por IJRAT
8720200387202003
87202003
IJRAT176 visualizações
87202001 por IJRAT
8720200187202001
87202001
IJRAT151 visualizações
86202013 por IJRAT
8620201386202013
86202013
IJRAT124 visualizações
86202008 por IJRAT
8620200886202008
86202008
IJRAT133 visualizações
86202005 por IJRAT
8620200586202005
86202005
IJRAT128 visualizações
86202004 por IJRAT
8620200486202004
86202004
IJRAT120 visualizações
85202026 por IJRAT
8520202685202026
85202026
IJRAT133 visualizações
711201940 por IJRAT
711201940711201940
711201940
IJRAT32 visualizações
711201939 por IJRAT
711201939711201939
711201939
IJRAT33 visualizações
711201935 por IJRAT
711201935711201935
711201935
IJRAT46 visualizações
711201927 por IJRAT
711201927711201927
711201927
IJRAT47 visualizações
711201905 por IJRAT
711201905711201905
711201905
IJRAT17 visualizações
710201947 por IJRAT
710201947710201947
710201947
IJRAT21 visualizações
712201907 por IJRAT
712201907712201907
712201907
IJRAT26 visualizações
712201903 por IJRAT
712201903712201903
712201903
IJRAT36 visualizações

Último

Codes and Conventions.pptx por
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptxIsabellaGraceAnkers
9 visualizações5 slides
CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
13 visualizações337 slides
Final Year Presentation por
Final Year PresentationFinal Year Presentation
Final Year PresentationComsat Universal Islamabad Wah Campus
9 visualizações29 slides
START Newsletter 3 por
START Newsletter 3START Newsletter 3
START Newsletter 3Start Project
5 visualizações25 slides
MSA Website Slideshow (16).pdf por
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdfmsaucla
76 visualizações8 slides
Effect of deep chemical mixing columns on properties of surrounding soft clay... por
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...AltinKaradagli
9 visualizações10 slides

Último(20)

Codes and Conventions.pptx por IsabellaGraceAnkers
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptx
IsabellaGraceAnkers9 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez13 visualizações
START Newsletter 3 por Start Project
START Newsletter 3START Newsletter 3
START Newsletter 3
Start Project5 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli9 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdf
Hassan Khan11 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra815 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome28 visualizações
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn5 visualizações
Instrumentation & Control Lab Manual.pdf por NTU Faisalabad
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdf
NTU Faisalabad 6 visualizações
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain12 visualizações
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 visualizações
Investor Presentation por eser sevinç
Investor PresentationInvestor Presentation
Investor Presentation
eser sevinç25 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 15 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7883 visualizações
Introduction to CAD-CAM.pptx por suyogpatil49
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptx
suyogpatil495 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdf
MaryamTavakkoli28 visualizações

Paper id 27201448

  • 1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 133 Security as a Service: Cryptology on Demand Venkatesh Ranga1, M.S.V. Sashi kumar2, Dr. C.R.K.Reddy3 M.Tech CSE1 , Assistant Professor CSE2, Professor CSE3, Osmania University1,2,3 venkuranga@gmail.com1, sashi.mamidanna@gmail.com2, crkreddy@gmail.com Abstract- Cloud Computing is becoming more and more popular today and is ever increasing in popularity with large organizations as they sharing valuable resources in a cost effective way. By doing like this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. Achieving strong security would often require large IT resource and also result in difficulty of usage. To increase security while reducing the spending on IT & improving the ease of use, we require a security technique which can configure itself, as requested, for services offered in a Cloud environment. This paper mainly focus on by the usage of less resources how can we provide security to the end user. The security architecture is driven by security policies based on these inputs into consideration. 1. Network Access Risk 2. User Data. 3. Key size With these inputs in place, the security policies can generate security parameters which in turn are used to configure mechanisms to alter security (including algorithms and protocols) at every domain for protection of specific security services. Security requirements from users and services in cloud computing in turn building trust for the end users via Security at their ease & also data control. Key words: Cloud; Encryption; Security. 1. INTRODUCTION Cloud computing has been defined by NIST as a model for enabling ubiquitous, on- demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction . In simple words cloud computing is a accessing some one’s software in some one’ hardware in some one’s data centre .Cloud computing can be considered a new computing paradigm with implications for greater flexibility and availability at lower cost. Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. The term itself is often used today with a range of meanings and interpretations. Three referenced service models have evolved: Software-as-a-Service (SaaS): Is a way of delivering applications over the Internet. Instead of installing and maintaining software, you simply access it via the Internet. SaaS applications are sometimes called Web-based software or hosted software. Whatever name we can call it as, SaaS applications run on a SaaS provider’s servers. The provider manages the access to the application, includes security, availability, and performance. It can reduce the total cost of hardware and software development and operations. Platform-as-a-Service (PaaS): Platform as a Service (PaaS) is a way to use some one’s hardware, operating systems, storage and network capacity over the Internet. The service delivery models are allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. It can reduce the cost and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS): Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers. The service provider maintains the equipment and is responsible for housing, running and managing it. The client typically pays on a how much they are use that much amount customers will pay to service providers pay per use basis. The most popular cloud types are namely private, public and hybrid clouds. In a private cloud, total infrastructure for implementing the cloud is controlled completely by the enterprise. Typically, private clouds are maintained and implemented in the enterprise data centre and managed by internal resources. A private cloud maintains all data in resources under the control of the legal and contractual umbrella of the organization. This eliminates the regulatory and legal security concerns represented with information being processed on third party computing resources. In a public cloud, external organization provides the infrastructure and management required to implement the cloud. Public clouds orderly simplify implementation and are typically billed based on usage of resources. This transfers the cost from a capital expenditure to an operational expense and can quickly be scaled to meet the organization’s needs. Security has been and is the biggest challenge to cloud computing. It is hard for the users
  • 2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 134 to believe in cloud computing due to invisibility of the user’s data storage and how are they protected. Research says that as of now there is no way to know if the cloud providers properly remove a client’s data, or whether they have saved it for some unidentified reason. Currently, the study on cloud security still lies in the preliminary study. For data storage, a TPA (Third Party Auditor) is proposed to verify the integrity of the dynamic data stored in the cloud. In trust management field, some experts considered that multiple security policies should be used in user’s authentication and identity management, and those policies must be able to avoid intrusion of data by unauthorized users. 2. PROBLEM DESCRIPTION: Security parameters even differ for a specific service for two different users depending on the sensitivity of the information. The solution for these issues can simply be the usage of a highly complicated and secure algorithm popularly used to safeguard all services in the network. Potentially, this might not be effective way for cloud service providers to use the same security mechanism throughout the services since it consumes a lot of IT resources every time. It would not be a solution to consume resources for security itself, as we counteract the advantage of cloud computing platform wasting the available resources. By considering all the applications in the cloud environment, all the applications are using Sha1 for authentication.AES and DES security algorithms to secure the data. Most of the applications are using same symmetric key algorithm for encrypting the any amount data and providing security to the user’s data. By using same variable key length for the any amount of data it will take more time for encryption/decryption and processing of the data .Using the same key for encryption/ decryption take same time when the data size is differ. If the data size is small then it will take same time and increases the data size. In our approach we can change the algorithm key size. When the size of the data changes If we uploading large data we can use large for foe security. If transferring data is small than we can go for small key to encrypt the data. Depending on the size of the file we can change the algorithm key size. By doing like this we can boost the performance of the CPU. 3. CRYPTOGRAPHIC ALGORITHM: As far we are saying that every application is using same encryption key for encrypting the data. Most of the applications are using SHA1 for providing the security for the user authentication and some symmetric key algorithm for the encrypting the users data. In this paper we are using other symmetric algorithm called Blowfish. As per Researches Blowfish has been shown better results compare to other encryption algorithms. So In my Application we are using blowfish algorithm for encrypting the data. Blowfish algorithm is a symmetric block cipher that can be effectively used for both encryption and safeguarding of data. Blowfish algorithm is a Feistel Network and 64-bit block size and a variable key length from 32 bits to 448 bits in length, to calculate sub keys, which are used in the actual encryption and decryption. The P-array consists of 18 32-bit values while the 4 s-boxes consist of 256 32-bit values. The P-array is initialized first and followed by the S-boxes. It is a 16-round Feistel network for encryption and decryption. The algorithm was developed to 64- bit plaintext into 64 bit cipher securely. ENCRYPTION: Blowfish has 16 rounds. The input is a 64-bit data element, X Divide x into 32-bit halves, XL, XR; Then i= 1 to 16; XL = XL XOR Pi XR = F (XL) XOR XR; Swap XL and XR; After the 16th round, swap XL and XR again to undo the last swap. Then, XR = XR XOR P17 and XL =XL XOR P18, Finally, recombine XL and XR to get the cipher. Decryption same as encryption, except that P1, P2, P3, P4…... and P18 are used in the reverse order. Blow fish is incorporated a bitwise exclusive-operation to be performed on the left 32 – bits before modified by the F function or propagated to the right 32-bits for the next round. Blowfish also incorporated two exclusive-or operations to be performed after the 16 rounds and a swap operation.
  • 3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 135 F- Function: All the applications are using same encryption algorithm and same key large key for protecting the data. For providing the security to the users the application developers are using large key. By using the large key it will more computation and time. So In my approach we are differentiating the users considering the network from where the user is accessing the application and user computation. By considering these two factors we can provide security to the users. We can differentiate the user’s security type by writing the policies in the application.” 4. APPLICATION SCENARIO: In this paper am trying to show the application which it is self configure the security by taking the above parameters into the consideration. As per my knowledge all the existing applications are using same security mechanism in the applications for all the users. So by this there is a chance of wastage of resources. As we already know in the cloud security is the biggest challenge. For transmitting the data between the two users we can not the transfer the data directly. We are using some encryption mechanism to transfer the data. For that we have to choose best encryption algorithm to give better results. If the conversation between the two friends i.e. normal information there is no need usage of large bit key .Whenever we are transmitting secret information (confidential) then we need more security so there we can use large key to encrypt the data. By considering the user’s network we can change the algorithm key bit length. If the two user’s are from same network then we can use small encryption key to transfer the data and if the user’s are from different and untrusted network then we can increase the bit size. By using same key for everytime the system is more computation for encrypting and decrypting the data. So differcting the key lenth we can reduce the usage of computation in the system and time as well as we can also reduce the power. For Example: In an Enterprise the users are connected to each other then they are considered to be internal network. From the figure we can observe that User1, User2 and User3 are in same private ntework acessing the application hosted some where in the cloud environment, User4 and User5(mobile user) with different processing power devices are from public network and accessing the same application from the outside other than the office network. Whenever User1 is tranferring the data to the User2 then we can provide security with 128-bit(small) key. User 1 User User Proxy server In the internal network the users can access the application through the proxy server which is mainted in the internal network. The internal network users are access the application which is loacated in the cloud with the help of proxy server( which maitains the cloud application) . If the users are intrating in the public network users then increse the algorithm bit size to 256-bit key for encrypting the data. If the user is trying to access the application from the public network then we can increase the algorithm bit size i.e to 448-bit key to encrypt the data to incearse the security. In our approach we are tested our application with two symmetric encryption algorithms i.e blowfish and AES. Most of the application developers are using AES for encrypting the data . In our approach we are replacing the AES with Blowfish.We use blowfish for encryption/decryption of data.From the study learnt that blowfish performance is better when compare to other algorithms. So we can change the encryption algorithm according to the user requirement. We are tested two algorithms with different files size of data by using changing the algorithm key sizes . We got below results when tested with different algorithm key sizes. 5. RESULTS: Application Server Public Network Public Network Amazon EC2 Public Network
  • 4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 136 Table 1 Encryption and decryption times(in milli sec) using with 128 –bit key Table 2 Encryption and decryption times(in milli sec) using with 192 –bit key Input In KB Encryption time for blowfish with 192- bit key Encryption time for AES with 192-bit key Decryption times for Blowfish 192-bit key Decryption times for AES 192- bit key 312 46.87 147.995 436.715 1594.123 512 60.087 156.341 447.156 1900.74 1536 142.58 283.82 423.55 1237.054 2048 184.984 391.643 440.152 1429.581 5120 409.484 761.41 417.677 1215.91 10240 725.4906 748.392 721.291 1194.154 Table 3 Encryption and decryption times(in milli sec) using with 256 –bit key Input in KB Encryption time for blowfish with 256- bit key Encryption time for AES with 256-bit key Decryption times for Blowfish 256-bit key Decryption times for AES 256- bit key 312 47.187 160.1749 450.955 1966.08 512 58.975 176.32 428.948 1646.9 1536 136.563 301.1285 425.802 1254.111 2048 183.296 435.471 424.453 1418.943 5120 401.911 759.309 389.548 1117.111 10240 752.497 717.192 784.397 958.822 Table 4. Encryption and decryption times(in milli sec) using AES 256-bit key and 448-bit key Figure :1 Encryption and Decryption times for Blowfish and AES with 128-bit Key 2000 1800 1600 1400 1200 1000 800 600 400 200 0 312 KB 512 KB 1536 KB 2048 KB 5120 KB 10240 KB Encrypeion time in milli seconds File Size in KB Encryption time for blowfish with 128-bit key Encryption time AES with 128- bit key Decryption timr for Blowfish 128 -bit key Decryption time for AES 128 -bit key Input in KB Encryption time for blowfish with 128- bit key Encryption time for AES with 128-bit key Decryption times for Blowfish 128-bit key Decryption time for AES with 128 -bit key 312 46.46 146.544 405.75 1316.767 512 47.187 147.921 433 1776 1536 128.288 212.455 413.253 1152.631 2048 194.824 284.029 440.054 1133.744 5120 401.911 698.02 389.548 1412.936 10240 686.988 671.422 674.928 1277.063 Input In KB Encryption time for AES 256- bit key Encryption time for Blowfish 448-bit key Decryption time for AES 256- bit key Decryption time for Blowfish 448-bit key 512 176.32 64.608 1646.9 771.544 1536 301.1285 143.8252 1254.111 846.725 2048 435.471 196.234 1418.943 465.208 5120 759.309 414.739 117.111 738.094 10240 717.192 808.402 958.822 717.601
  • 5. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 137 Figure 2. Encryption and Decryption times for Blowfish and AES with 192-bit Key 2000 1800 1600 1400 1200 1000 800 600 400 200 0 Encryption tomes in milli seconds Input file sizes in KB Encryption time for blowfish with 192- bit key Encryption time for AES with 192-bit key Decryption tims for Blowfish 192-bit key Decryption tims for AES 192- bit key Figure 3. Encryption and Decryption times for Blowfish and AES with 256-bit Key 2500 2000 1500 1000 500 0 312 KB 512 KB 1536 KB 2048 KB 5120 KB 10240 KB Encryption times in milli seconds Input file size in KB Encryption time for blowfish with 256-bit key Encryption time for AES with 256- bit key Decryption tims for Blowfish 256- bit key Decryption tims for AES 256-bit key Figure 4 Comparision Between the Encryption and Decryption Times with AES 256 and Blowfish 448- bit 1800 1600 1400 1200 1000 800 600 400 200 0 Encryption times in milli seconds Input file size in KB Encryption time for AES 256-bit key Encryption time for Blowfish 448- bit key Decryption time for AES 256-bit key Decryption time for Blowfish 448- bit key
  • 6. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 138 6. CONCLUSION : In this paper we conclude that depending on the network users are being a part of, type of the application working on & the compute system used, we can provide the required security strengh by using best suited algorithm and varied key size. Transferring files from one network to another can be provided with on demand security level by increasing the bit size of the key. This feature can be provided on varied applications and deploying right security policy, the performance of the systems can be improved. From the comparision of two algorithms we found that blowfish performs well in all situations, but the key establishment still remains the concern. In traditional applications for encrypting any size of data, developers are using same key size for cryptography. In our scenario , we have varied the key size of the algorithm and the chosen algorithm depends on file size, user requirement and type of network. Usage of same key for encrypting and decrypting any amount of data, the allocation time for encryption and decryption taken more resouces in hardware and more time for processing the data will decrease the performance of the CPU. Applying right algorithm in the requirement will boost the performence of the CPU, reduce the usage hardware inturn reduce the processing time. REFERENCES: [1] P. Mell, T. Grance (2009), The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology. [2] Jianyong Chen, Yang Wang, Xiaomin Wang (2011), On demand security architecture for Cloud Computing, Dept.of Computer science and Technology, China. [3]M. Anand Kumar and Dr.S.Karthikeyan (2012), “Investigating the Efficiency Blowfish and Rejineal (AES)Algorithms”, I.J computer network and Information Technology. [4] Pratap Chandra Mandal (2012),”Superiority of Blowfish Algorithm” IJARCSSE, WestBengal,India. [5]http://docs.aws.amazon.com/gettingstarted/latest/C ompute basis/web-app-hosting-intro.html [6] http://en.wikipedia.org/wiki/Blowfish (cipher).