SUBMITTED BY:
Namisha Goyal
CSE DUAL
17MI550
SUBMITTED TO:
Dr. Sangeeta Sharma
Cloud Cryptography: User End Encryption
ABSTRACT
•Cloud computing has made data storage so much easier, accessible and affordable.
•Business corporation consumers of cloud computing can store, manage, process and access
their big data with quite an ease.
•But, the security and privacy of users' data remains vulnerable in cloud computing.
•Many public and private cloud services have experienced security breaches and unauthorized
access incidents.
•This paper suggests user end cryptography of data before uploading it to a cloud storage
service platform like Google Drive, Microsoft, Amazon and CloudSim etc.
INTRODUCTION
•Cloud computing is the technology where service providers use network for distributed
processing and parallel computing of users’ data.
•Cloud computing offers a lot of advantages, like flexible storage, easier access, automatic updates
and pay per use service etc.
•Security, Availability, Integrity and Confidentiality are the three primary elements that users
consider before signing up for cloud computing services.
•Confidentiality or privacy or security is the key challenge, for cloud service providers.
•Many public and private cloud services have experienced security breaches and unauthorized
access incidents.
CRYPTOGRAPHY
●Cryptography is the art of encoding secret information in illegible hidden format using an
encryption key.
●The data is retrieved in its actual form on receiver end by decryption using the same secret key.
●Only the person with the secret key knowledge has access to the encrypted data and the right to
decrypt it.
●The main ingredients of cryptography process are: plain data, secret key, encryption algorithm,
cipher data and decryption algorithm.
●Cryptography has two main types: symmetric or private or single key type cryptography and
asymmetric or public key type cryptography
CRYPTOGRAPHY
NEED OF CRYPTOGRAPHY
●Sometimes, cloud service providers do not enforce data security measures while moving users’ data internally
between their own datacentres, encouraging hackers to penetrate the loopholes in cloud services and access users’
data without authorization.
●This problem of data theft in transit and another important concern of users about trusting the service providers to
grant open access to their data can be solved by adding an extra layer of encryption on user end.
●The user can encrypt their data before loading their files in cloud storage and get secured.
CRYPTOGRAPHY MODEL
●Users can encrypt their data using a symmetric/ private key encryption algorithm before uploading it to a
web based cloud space and then download the data from cloud, decrypt it with the help of encryption key
and decryption algorithm and be the only ones to have useful access to their personal data.
●The proposed cryptography algorithm is based on symmetric key cryptography model.
●Single private key will be used for data encryption and decryption.
●The detailed steps of the algorithm includes:
1.Data Encryption
2.Key Generation and Verification
3.Data Decryption
CRYPTOGRAPHY MODEL
1.Data Encryption 2. Key Generation and Verification 3. Data Decryption
IMPLEMENTATION AND RESULTS
●After starting the homepage, it requires data owner to log in and then the encryption process initiates.
●User needs to create a bucket and folder for his account and then upload the data file for encryption.
●The web based cloud service encrypts the data in an encryption file and stores it in user’s local system. It also
generates a key encryption file and saves it along with the cipher data file.
● Once the file is successfully stored on the cloud service and user gets the key encryption file on his system and can
download the encrypted cipher data file from the cloud and apply decryption algorithm on it by verifying the key.
● In the end the user successfully retrieves the original file after decryption.
●All of this work has been done and the algorithms have been verified using the proposed cryptography model with
Amazon S3 platform.
LIMITATIONS AND FUTURE WORK
●This research provides the first step towards users’ self-effort in securing their
personal data and information before giving it all away on a cloud storage service.
●The research has explored the method of encrypting and decrypting text files using
symmetric key cryptography.
● More complex data like audios, videos and images can also be encrypted and
decrypted in the same but advanced manner.
CONCLUSION
●The paper suggests user end cryptography of data before uploading it to a cloud storage service platform like
Google Drive, Microsoft, Amazon and CloudSim etc.
●Different types of unauthorized data access incidents can happen when unencrypted data is stored on a cloud
storage service. Therefore, security and confidentiality remain the top hot areas of these cloud services.
●If the user implements cryptography algorithm before storing their data on the cloud, they can have the security of
their information from service providers and all other outside unauthorized access parties.
●For user end cryptography of storage service data, the paper presents a symmetric key encryption algorithm along
with secret key generation.
●The secret key file will only be in user’s knowledge who will download encrypted data stored on cloud service and
retrieve it through decryption.
REFERENCE PAPER
●Sameer A. Nooh, “Cloud Cryptography: User End Encryption”, 2020 International
Conference on Computing and Information Technology (ICCIT-1441)