Security Enhancement and Time Delay Consumption For Cloud Computing Using AES and RC6 Algorithm
Security Enhancement and Time Delay Consumption For Cloud Computing Using AES and RC6 Algorithm
1, March 2019 1
I. INTRODUCTION
the information has been encrypted, it can be stored on good for his data.
insecure media or transmitted on an insecure network (like the 3. Some time with the use of TPA extra hardware or
Internet) so that it cannot be read by anyone except the cryptographic coprocessor is needed.
intended recipient. We use Symmetric key and Asymmetric 4. As the data sent from cloud data owner premise is in
key(AES,RC6) algorithm for encryption and decryption of encrypted form and the required credentials to
data. In data storage correction data integrity verification can decrypt the same are kept hidden from cloud service
performed with use of hash function such as RC6 using this provider, during regulatory compliance, laws which
hash function we create unique signature of data for later make the data owner responsible for protection of his
verification of data integrity. data can be followed.
5. During any legal investigation, cloud service provider
II. EXISTING SYSTEM cannot handover the data to any statutory body
In Existing system they use Third party auditor to check the without consulting to data owner.
integrity of data in this Scheme having three components: 6. No file sharing mechanism between cloud user.
7. High Computational and communication cost in
1. Cloud User (CU)
2. Cloud Service Provider (CSP) & Cloud Server (CS) IV. PROPOSED SYSTEM
3. Third party Auditor (TPA)
Without TPA in Cloud Storage
5. DO Grant file Access Rights (Sharing of file) to other widely symmetric block cipher algorithm used in
cloud user. worldwide. This algorithm has an own particular
6. Propose algorithm are: structure to encrypt and decrypt sensitive data and is
1. AES algorithm 2.RC6 algorithm applied in all over the world. It is extremely difficult
to hackers to get the real data when encrypting by
V. DATA SECURITY & INTEGRITY VERIFYING AES algorithm.
1. Using Cryptographic Algorithm: Cryptography is Till date is not any evidence to crake this algorithm. AES
the mathematics process to encrypt and decrypt has the ability to deal with 3 different key sizes such as AES
information. Once the information has been 128, 192 and 256 bit and each of this ciphers has 128 bit block
encrypted, it can be stored on insecure media or size. It will provide an overview of AES algorithm and explain
transmitted on an insecure network. so that it cannot several crucial features of this algorithm in details and
be read by anyone except the intended recipition. We demonstration some previous researches that have done on it
use Symmetric key of (AES) and Asymmetric key of with comparing to other algorithms such as DES, 3DES.
(RC6) algorithm for encryption and decryption of
data. VI. BLOCK DIAGRAM OF AES
2. AES Algorithm: Advanced Encryption Standard AES is an iterative rather than Faster cipher. It is based on
(AES) algorithm is one on the most common and ‘substitution– permutation network’.
It comprises of a series of linked operations, some of which upload and download files through the internet.
involve replacing inputs by specific outputs (substitutions) and 2) File Uploading and Downloading: User can login
others involve shuffling bits around (permutations). from anywhere using their username and password and
Interestingly, AES performs all its computations on bytes upload file, using their own file key. And later they can
rather than bits. Hence, AES treats the 128 bits of a plaintext download the file using the same key. When uploading the
block as 16 bytes. These 16 bytes are arranged in 4 columns file the content will encrypted using AES encryption
and 4 rows for processing as a matrix format. before saved in to the database. Also the content will be
distributed to different blocks. So the chance for attack and
Unlike DES, the number of rounds in AES is variable and
depends on the length of the key. AES uses 10 rounds for 128- uploading time are reduced. If there occur any
bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit unauthorized access an SMS alert will send to the
authorized user.
keys. Each of these rounds uses a different 128-bit round key,
3) Delay Calculation: In real cloud environment due to
which is calculated from the original AES key.
increase in number of users, the data traffic become high.
1) User Registration: Each user has a unique account. This will affect overall system performance. The huge data
Hence, each users have to register initially before they traffic result delay and congestion. In real environment
accessing the cloud system. The registration is done by the different factors causes the delay i.e. size of uploaded file,
user only once to create an account with username and network speed etc. The model proposed here measure the
password. Then they can login into the system from delay occurred when uploading files with different size at
anywhere using the username and password and can also
different time in a real cloud platform. When uploading a Where capacity is calculated by the formula [4]:
file initially the file split into different blocks before the
encryption. The size of each block depends on the file size.
Delay metrix is calculated as the sum of delay occurred
during block wise uploading to different location in the If the scheduling policy is Space share-Timeshare or
cloud database. Timeshare- Timeshare, it is determined by the formula (4),
To measure the effect of load balancing can be based on (5):
many factors, but the most important are two factors: load and
load performance. Load is the CPU queue index and CPU
utilization. Performance is the average response time required
by the user. Where capacity is calculated by the formula [5]:
The load balancing algorithm is based on input parameters
such as the configuration of virtual machines, the length of the
cloudlet tasks, the arrival time, the completion time of the
tasks, and then the expected completion time. of each task,
In formulas
expected response time.
(2), (3), (4)
Response time is the processing time plus the cost of the and (5):
request or task transmission time, queued through the network 1 eft(p) is the expected completion time of the
nodes. Expected response time is calculated according to the Cloudlet p.
following formula. est is the arrival time of Cloudlet p.
where: F: time to complete the task, A: arrival time of the rl is the total number of instructions the Cloudlet p
task., Tdelay: transfer time of the task . must execute on a processor.
capacity is the average processing power (in MIPS) of
Because the algorithm that performs load balancing is that
a core for Cloudlet
of Datacenter Broker, the level of the algorithm only affects
ct is the current simulation time.
the processing time in a local environment of a data center.
cores(p) is the number of cores required by Cloudlet.
Therefore the communication delay parameter can be omitted,
Calculate average execution time and average response
so Tdelay = 0. Calculate expected task completion time [4]: time of all tasks (without TTP):
The scheduling policy is Spaceshare-Spaceshare or • Average execution time: 284.65 (ms).
Timeshare-Spaceshare, then the formula is defined by the • Average response time: 1686.467 (ms).
formula (2), (3):
VII. WORKING STRUCTURE
RC6 Algorithm: We proposed the RC6 block cipher. RC6 Encryption Algorithm: Select a file to store in a cloud
is an improvement of RC5, designed to meet the requirements before apply rc6 algorithm, Read a selected file and convert
of the Advanced Encryption Standard (AES). Similar to RC5, data in to byte array Then perform following steps;
RC6 makes essential use of data.
Key Explanation
Expected Response Time = F – A + Tdelay(1) 1. A key generate according to system time in mille
dependent rotations. New features of RC6 include the use second.
of 4 working registers instead of 2, and the inclusion of integer 2. Store that key in database with file name and pass the
multiplication as an additional primitive operation. The use of key expansion function.
multiplication greatly increases the diffusion achieved per 3. Key expansion function generate key in fixed byte
round, allowing for greater security, fewer rounds, and Format in byte array.
increased throughput. Encryption Function
1. Pass data and key in the form of byte array pass in
VIII. BLOCK DIAGRAM OF RC6 encryption function.
2. Encryption function return encrypted data in the form
of byte array.
3. Write encrypted data in file and store them in cloud.
Decryption Algorithm: Select a file in cloud then
following step will be perform.
1. Access key from database according to file in the
cloud.
2. Pass the key in key expansion function and generate
key in the form of fixed byte array Read data from
selected file and convert encrypted data in byte array.
3. Pass data and key byte array in decryption function.
4. Decryption function returns decrypted data in the
form of byte array then write this data in temporary
file.
5. Now user can view that data from temporary file.
Delay Calculation: In real cloud environment due to
increase in number of users, the data traffic become high. This
will affect overall system performance. The huge data traffic
result delay and congestion. In real environment different
factors causes the delay i.e. size of uploaded file, network
In cryptography, RC6 (Rivest cipher 6) is a symmetric key speed etc. The model proposed here measure the delay
block cipher derived from RC5. It was designed by Ron occurred when uploading files with different size at different
Rivets, Matt Robs haw, Ray Sidney, and Yiqun Lisa Yin to time in a real cloud platform. When uploading a file initially
meet the requirements of the Advanced Encryption Standard the file split into different blocks before encryption. The size
(AES) competition. The algorithm was one of the five of each block depends on the file size. Delay metric is
finalists, and also was submitted to the NESSIE, CRYPTREC calculated as the sum of delay occurred during block wise
projects. It was a patented by RSA Security. uploading to different location in cloud database.
RC6 proper has a block size of 128 bits and supports key The observed delay is calculated using equation, which is
sizes of 128, 192, and 256 bits up to 2040-bits, but, like RC5, the difference between time after uploading and time before
it may be parameterized to support a wide variety of word- uploading. Delay is calculated using the equation 4. It is the
lengths, key sizes, and number of rounds. sum of delay occurred during the block wise upload of file in
three cloud location.
IX. WORKING STRUCTURE
X. CONCLUSION
In this Scheme provides encrypt and decrypt data using
Symmetric (AES) and Asymmetric (RSA) Algorithms and use
hash function for generating hash code. This system provides
high security, lightweight data integrity verification, data
hiding, time delay consumption and secure access right to
other cloud data file requester. In future this proposed scheme
should be enhance for large data style. We provide mechanism
for Cloud Data Requester to access file on Cloud Server. This
scheme work faster and secure to check integrity of data on
cloud server.
REFERENCES
[1] Cloud Security Alliance, “Security Guidance for critical areas of focus
in Cloud ComputingV3.0”
https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[2] National Institute of Standards and Technology- Computer Security
Resource Center www.csrc.nist.gov
[3] http://en.wikipedia.org/wiki/Cloud_computing
[4] B. Patel Hiren, D.R. Patel, B. Borisaniya and A. Patel, “Data storage
security model for cloud computing”, In International Conference on
Advances in Communication, Network, and Computing, Pp. 37-45,
2012.
[5] C. Wang, Student Member, IEEE, Sherman S. M. Chow, Qian Wang,
Student Member, IEEE, KuiRen, Member, IEEE, and Wenjing Lou,
Member, IEEE “Privacy-Preserving Public Auditing for Secure Cloud
Storage, IEEE-2012, 2013.
[6] W. Cong, Q. Wang, K. Ren and W. Lou, “Privacy-preserving public
auditing for data storage security in cloud computing”, In proceedings
IEEE infocom, Pp. 1-9, 2010.
[7] V. Moorthy and Dr.S. Sivasubramaniam, “Implementing Remote Data
Integrity Checking Protocol for Secured Storage Services with Data
Dynamics and Public Verifiability In Cloud Computing”, IOSR Journal
of Engineering, Vol. 2, No. 3, Pp. 496-500, 2012.
[8] H. Chittaranjan, S. Sanka, M. Rajarajan and S.K. Nair, “Capability-
based cryptographic data access control in cloud computing”,
International Journal of Advanced Networking and Applications, Vol. 3,
No. 3, Pp. 1152-1161, 2011.
[9] G. Rosario and D. Wichs, “Fully Homomorphic Message Authenticators
IBM Research”, TJ Watson, Vol. 23, 2012.
[10] K. Kajendran, J. Jeyaseelan and J. Joshi, “An Approach for secures Data
storage using Cloud Computing”, International Journal of Computer
Trends and Technology, 2011.
[11] L. Wenjun and G. Bai, “Ensuring the data integrity in cloud data
storage”, IEEE International Conference on Cloud Computing and
Intelligence Systems, Pp. 240-243, 2011.
[12] S. Sunil, C. Hota and M. Rajarajan, “Secure data access in cloud
computing”, IEEE 4th International Conference on Internet Multimedia
Services Architecture and Application, Pp. 1-6, 2010.
[13] S. Hovav and B. Waters, “Compact proofs of retrievability”,
International Conference on the Theory and Application of Cryptology
and Information Security, Pp. 90-107, 2008.