Repository and Retrieval of Data Using AES Security in Cloud Computing Environment
Repository and Retrieval of Data Using AES Security in Cloud Computing Environment
https://doi.org/10.22214/ijraset.2023.51255
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: The use of the internet is continuously expanding. People exchange vast amount of digital data every day. Some
information is critical and must be protected from unauthorised access. Encryption methods are critical for preventing
unauthorised access to original data. To encrypt data, a variety of algorithms can be utilised. The Advanced Encryption
Standard (AES) algorithm, which is extensively supported and used, is one of the most efficient algorithms available. The goal of
this work is to demonstrate how to create secure file transfer using AES encryption and decryption techniques in a cloud
environment. Hackers can intercept files as they are being sent from the source to the destination. If files are not wrapped, they
can be easily exploited. Thus, AES algorithm is used to safeguard file transfer networks. If AES is employed in file sharing
systems, it is claimed to dissuade thieves from attempting to steal data when sending files. According to the study's findings, AES
offers more protection during data encryption and decryption during file transfers without interruption from hackers attempting
to steal data intentionally.
Keywords: Security, Data owner, data user, cloud service provider, upload file, generate key.
I. INTRODUCTION
In today's world, computers are used for various purposes like gaming, designing, web surfing, and transferring information or files.
Internet connectivity plays a crucial role in transferring large amounts of data across different sectors. However, the security risks
associated with transferring files across a network pose a significant threat. Therefore, encryption using the AES algorithm is a
reliable method to secure the content of the file while it's being transferred, ensuring it reaches the intended destination safely.
Data is considered a vital asset for any organization as it forms the foundation of information, knowledge, and wisdom that can help
make accurate decisions and achieve goals. As data continues to grow exponentially, organizations face challenges in storing and
exploring the data due to limited resources. Cloud computing has emerged as a popular solution due to its many advantages such as
scalability, reliability, and cost-effectiveness. Despite its numerous benefits, cloud computing also faces several obstacles, mainly
related to security threats such as data privacy and sharing concerns. Users must trust cloud servers to store and manage their data,
making it vulnerable to unauthorized access and misuse. Additionally, data sharing among different stakeholders can result in
intentional or unintentional disclosure to unauthorized third parties. Therefore, it's crucial to address these issues effectively to
ensure the fast growth of cloud computing technology. Many applications of cloud computing include: 1) Hybrid Cloud 2) Testing
and Development 3) Recovery 4) Backup 5) Image Editing Applications 6) Antivirus Applications 7) URL Conversion Applications
8) Social Media Applications 9) Accounting Applications 10) Management Application.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4224
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
In the paper [3], various methods and schemes proposed to ensure secure data transfer and storage in cloud environments. The use
of RSA algorithm, numerical conversions, digital encoding, and mathematical series are all important in the encryption and
decryption of data. The Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme and the file hierarchy attribute-based
encryption scheme are also effective in providing access control and preventing attacks such as chosen plaintext attacks. However,
it's important to note that some schemes may have increased computation costs, which could be a potential disadvantage. Overall,
it's crucial for organizations to implement secure methods for data transfer and storage to prevent unauthorized access and ensure
the confidentiality, integrity, and authenticity of their data.
The RSA method [4] may require more storage space and the decryption procedure may take longer due to the longer key bits.
However, it is important to note that the RSA [5] method is still widely used for its security and reliability, especially in situations
where confidentiality is of utmost importance. Regarding the fair data access control scheme proposed by Liu et al., the use of fake
keys for obfuscation is an interesting approach to enhance security. However, the inefficiency of the authentication scheme should
be addressed in future studies to improve the overall security of the proposed scheme.
A system [6] proposed a CP-ABE scheme that aimed to reduce the computation cost of heavy decryption by facilitating decryption
outsourcing, revocation attributes, and policy updating. However, the scheme lacks in terms of privacy protection. The performance
of the proposed scheme was analyzed through rigorous tests, which measured storage overhead and processing power.
A. Limitations
1) Potential security issue when the data owner outsources the data to the could as the cloud server usually is provided by an
untrusted third party
2) Access policy, generated when the data was encrypted and remains the same afterwards so some users quit the group and their
access permission should be revoked.
3) Revocation needs to be executed in ABE-RSA algorithm, cannot ensure the integrity of the corresponding message.
4) It takes more processing time.
5) Less security and privacy
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4225
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Creation of Round keys : A Key Schedule algorithm is used to calculate all the round keys from the key. So the initial key is used to
create many different round keys which will be used in the corresponding round of the encryption.
V. SYSTEM ARCHITECTURE
This system has three elemants, those are Cloud environment, Data owner, and Data user. And Figure 2 depicts process of the this
work.
In the cloud environment, data protection is of paramount importance, and preventing data leakage is a critical aspect of it. Leakage
prevention and leaker detection are two main strategies for achieving efficient data protection. Leakage prevention involves
implementing measures that restrict access to data and ensure that only authorized individuals can access it. This can be achieved
through various access control mechanisms such as role-based access control (RBAC), attribute-based access control (ABAC), and
mandatory access control (MAC), among others.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4226
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Cryptography is another approach to preventing data leakage that involves the use of encryption techniques to protect data from
unauthorized access.
Encryption can be used to ensure that data is only accessible to those who have the necessary keys to decrypt it. Additionally,
encryption can help to ensure that data is not altered or tampered with during transmission or storage. Modern encryption
techniques, such as homomorphic encryption, allow for computations to be performed on encrypted data without the need to decrypt
it, making it an efficient way to protect sensitive information.
Leaker detection involves monitoring and identifying individuals or entities that are responsible for data leakage. This can involve
the use of data loss prevention (DLP) solutions that analyze network traffic and identify patterns that indicate potential data leakage.
Leaker detection can also involve the use of forensic analysis to identify the source of data breaches and track down the individuals
responsible. In addition to DLP, machine learning algorithms can be utilized to detect anomalies in user behavior and identify
potential leakers.
Overall, preventing data leakage is an essential aspect of data protection in the cloud environment. Access control mechanisms,
cryptography, and leaker detection are three critical approaches that can be utilized to achieve efficient data protection. By
implementing these strategies, organizations can ensure that their data is protected from unauthorized access, leakage, and misuse. It
is important for businesses to understand the significance of data protection in the cloud environment and take proactive measures to
secure their data.
VI. IMPLEMENTATION
The process of the work is divided into modules.
1) Data Owner request for login to TPA (Third Party Authority).
2) Data User request for login to TPA.
3) Third Party Authority (TPA) validates login access to both data owners and users.
4) Data Owner upload files.
5) Data User request for files.
6) Admin approves user’s request
B. Data Owner
1) Registrations: The data owner will register with his/her details like (name, email, password, conform password, contact,
address).
2) Login: Data owner will login into the system when the CSP accepts the request.
3) Upload Files: Data owner will upload files.
4) View Files: Data owner will view all files which are uploaded by him in cipher text format.
5) Logout: Finally, logout from the system.
C. Data User
1) Registrations: The data user will register with his/her details like (name, email, password, conform password, contact,
address).
2) Login: Data user will login into the system with the valid creditionals.
3) View Files: Data user will view all files which are uploaded by him in cipher text format. Data user will send request to the
CSP.
4) View Response: Csp will accept the request and key will be sent to that requested user through mail.
5) Logout: Finally logout from the system.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4227
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
F. Cloud Service Provider (CSP) Validates Login Access To Both Data Owners And Users
Cloud Service Provider receives the login requests from the both Data Owners and Data Users. CSP only able to validate their
accounts. Then the OTP will be sent to that specific persons registered email.
VII. RESULTS
Below results are screenshots of Cloud computing using AES
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4228
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VIII. CONCLUSION
The use of encryption technologies such as the AES algorithm is crucial to ensure the security of digital data transfers. With the
rapid increase in internet usage and the exchange of massive amounts of data, it is essential to protect vital information from
unauthorized access. The AES algorithm, which is widely endorsed and implemented, is considered one of the best encryption
algorithms in terms of efficiency. Overall, encryption technologies such as the AES algorithm play a critical role in ensuring the
security of digital data transfers. As technology advances, it is crucial to continue developing robust solutions to keep up with
evolving threats and ensure the safety of vital information.
REFERENCES
[1] Mohammad Ausaf Anwar, Durgaprasad Gangodkar, “Design and Implementation of Mobile Phones based Attendance Marking System”, Department of
Computer Science Engineering, Graphic Era University, Dehradun, Uttarakhand, India, 2015.
[2] Jun Lio, “Attendance Management System using a Mobile Device and a Web Application”, Department of Socio-informatics, Faculty of Letters Chuo
University
[3] Mahesh G, Jayahari KR, Kamal Bijlani, “A Smart Phone Integrated Smart Classroom”, Amrita e-Learning Research Lab (AERL) Amrita School of
Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, Amrita University, India, 2016.
[4] Ekta Chhatar, Heeral Chauhan, Shubham Gokhale, Sompurna Mukherjee, Prof. Nikhil Jha, “Survey on Student Attendance Management System”, S.B. Jain
Institute of Technology, Management and Research, Nagpur, 2016.
[5] Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications,
67(19).
[6] Md. Milon Islam, Md. Kamrul Hasan, Md Masum Billah, Md. Manik Uddin, “Development of Smartphone-based Student Attendance System”, Department of
Computer Science and Engineering Khulna University of Engineering & Technology, Khulna-9203, Bangladesh, 2017.
[7] Abdullah, Ako. (2017). Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4229