Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm
Data Storage Security in Cloud Computing Using AES Algorithm and MD5 Algorithm
https://doi.org/10.22214/ijraset.2022.43570
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
Abstract: The proposed method uses cryptographic techniques to maintain security as security is a critical issue for the cloud,
and keeping secure data is a major concern today. Overload due to data duplication is a new challenge for clouds. This article
presents the data a download algorithm based on MD5 and AES. Because MD5 more secure than other hashing algorithms,
goal Using MD5 algorithm for duplicating data and bringing data to server after uninstalling duplicate copy server. Purpose of
use AES security is encrypting data and storing it securely on a server. Update the hash of a newly uploaded file using AES.
Results and provides a comparison of several hashing algorithms, showing that MD5 is much safer and takes less time than
others. The basic method, which does not use duplicate testing, uses additional storage space and takes longer. The main goal
storing useful data in the cloud.
Keywords: Cloud Computing, Security, AES Algorithm, MD5 Algorithm
I. INTRODUCTION
Since its beginnings, cloud computing has been used by billions of users all over the world as an innovation and final solution for
utility and distributed computing on Web applications. Its use and impact are felt in a variety of industries, disciplines, and
businesses all around the world. Nonetheless, cloud computing has encountered some challenges; the purpose of this research is to
identify the factors impacting performance and provide some remedies or advice to cloud users who may encounter performance
issues:
1) The ability to transform data from a variety of sources into intelligence and deliver it to the appropriate individuals and systems.
2) When several users access the cloud service, load balancing and traffic control are required.
3) Large-scale data, high-performance computing, automation, response speed, rapid prototyping, and rapid time to production are
all issues that must be addressed.
4) Using the cloud as a platform to help create a more dynamic business intelligence environment
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5052
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
Performance is compared using different parameters such as data blocking, block size, encryption / encryption speed, processing
time, and integration time. The main reason for this test was to exploit the success of the newly converted AES over real AES using
a real-life application. A new key deployment process, a proper switch key method, and a complete Mix-Column process have been
introduced. This paper provides statistics based on the AES-128 bit version, but the proposed algorithm may also apply to other
versions. The goal was to get faster performance and less memory usage while keeping security difficult to break.
Brent Waters [4] A new way to get Ciphertext-Policy Attribute is introduced. Encryption (CPABE) is achieved in a standard model
under tangible and non-cryptographic assumptions. Any encryptor can display access controls through any access system on top of
system attributes using our solutions. The amount of ciphertext, encryption time, and encryption duration all measure according to
the complexity of the access formula in our most efficient way.. The only previous attempt made to determine these parameters was
evidence of a typical group model. Within our framework, we display three structures. The Parallel Bilinear Diffie-Hellman
Exponent (PBDHE) decision-making, which is not considered a common BDHE hypothesis, is used to argue that our first system is
selectively protected. Our next two solutions suggest compromising performance to gain potential protection under the (weak)
Bilinear-Diffie-Hellman decision system.
III. RESULTS AND DISCUSSION
A. Proposed System
This study includes the technique for duplicate data in a proposed algorithm design, and when users upload a file to the cloud, they
should first check which duplicate data comes from which category. Figure 1 shows that on the client side, the first empty file is
read by a byte, and the function of MD5 is to create a file hash, and then compare it between files in the duplicate test section. If the
hash map file is the same, it receives duplicate data and retrieves data from the server after extracting duplicate copies. If the file
hash map does not match, create a private key with AES-256 and save the encrypted data to the server.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5053
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
B. Methodology
AES Algorithm :- AES is a duplicate of the Feistel cipher. Based totally on 'substitution - permutation network'.. Includes a series of
connected functions, some of which include replacing input (modified) inputs and others involving slicing pieces (permissions).AES
works with data bytes instead of bits. Since the block size is 128 bits, the cipher processes 128 bits (or 16 bits) of input data at a time.
C. Results
Step 1:New file successfully uploaded to the server using the AES encryption algorithm after checking the hash function using MD5
algorithm
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5054
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
IV. CONCLUSIONS
In the proposed system, with all data stored on the cloud and the internet, it is critical to maintain data security as a top priority. To
encrypt confidential data, we utilised the most secure algorithm we've ever used. To guarantee the highest level of security, we used
the AES, and MD5 algorithms in the suggested system. However, there are still numerous holes that can be addressed by improving
the effectiveness of these strategies .To make the computer accessible to cloud service users, more effort is needed in this field.
This project is about data security and privacy, with a focus on data storage and cloud computing. It aims to improve trust between
cloud service providers and consumers by protecting data in cloud computing environments.
REFERENCES
[1] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, no. 1, pp. 69–73, 2012.
[2] Sailee Wakhare, Priya Pise, Rutuja Khalate, Shivani Birajdar, Sonali Survase, “Secure Login System using MD5 and AES Attribute Based Encryption
Algorithm”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075 (Online), Volume-9 Issue-8, June 2020
[3] Sadi Arman; Tanjila Rehnuma; Mahfuzur Rahman ,” Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique”,
2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), Electronic ISBN:978-1-6654-
1917-8 ,Print on Demand(PoD) ISBN:978-1-6654-3027-2
[4] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization: Brent Waters
[5] S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image
data,” IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411–3425, 2016.
[6] Mohamed Ismail, Badamasi Yusuf ” ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING WITH ADVANCED ENCRYPTION
STANDARD (AES) AND AUTHENTICATION SCHEME (AS)” International Journal of Information System and Engineering Vol. 4 (No.1), ISSN: 2289-
7615.
[7] Khalid, U., Ghafoor, A., Irum, M. &, Shibl, M. A., 2013.” Cloud Based Secure and Privacy Enhanced Authentication and Authorization Protoco. Procedia”,
Volume 22, pp. 680-688..
[8] Kokane, M., Jain, P. & Sarangdhar, P., 2013.”Data Storage Security in Cloud Computing”. International Journal of Advanced Research in Computer and
Communication Engineering , 2(3), pp. 1388- 1389.
[9] Wang, G., Q. Liu, J. W. & Guo, M., 2011. “Hierarchical Attribute Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers.
Computers and Security”, 30(5), pp. 320-331.
[10] Tidke, P. M. P. a. P. B., 2014. “Improving Data Integrity for Data Storage Security in Cloud Computing”. International Journal of Computer Science and
Information Technologies (IJCSIT), 5(5), pp. 6680-6684.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 5055