Essay:

Essay details:

  • Subject area(s): Engineering
  • Price: Free download
  • Published on: 7th September 2019
  • File format: Text
  • Number of pages: 2

Text preview of this essay:

This page is a preview - download the full version of this essay above.

del, awareness of using common storage in increased.  Considering investment for hardware to store mass data as well as to keep secures them cloud provides ease solutions.  For the reason data storage in cloud is increased. The previous algorithms for securing the cloud data designed to encrypt the content without any knowledge about the type of data.  But the proposed algorithm Ant Colony Model for Data Security in Cloud (AnCoMoDaS) encrypts the content depends the type of content available in the document.  So it’s proved that the size and time is reduced than any other previous algorithms.

Key: Ant Colony, Encryption, Cryptography

Introduction

The collection of servers and datacenters in different places are known as Cloud.   On demand services requested by users are done by the servers and datacenters with help of internet. Users can access the services on cloud by subscribing it from the cloud service provides using internet. It is not important that the physical components like storage, printers are all should be in same place while using cloud.  This is the main advantages cloud. With zero maintenance of hardware, software and storage space users can store and manage data at anywhere, anytime in cloud.  Users are provided all these at low cost. Users have to pay for their usage. Due to this flexibility everyone is transferring his data on cloud.

Security becomes big issue when any one stores its important information to a platform which is not directly controlled by the user and which is far away [1]. While sending of data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. A data is secure whenever it is Confidential, Integral and Available.  Only the receiver can understand the data means confidential. This helps to prevent the unauthorized disclosure of sensitive information.  If the data is received in the same form the Integrity is high.  This integrity helps to prevent modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography.

A technique that is used for Storing and transmitting data in unreadable form is Cryptography.  The unreadable form of data is known as cipher text. When data is received by receiver it, will appear in its original form which is known as plain text. Conversion of plain text to cipher text is known as encryption and reverse of this (cipher text to plain) is known as decryption. Encryption and decryption are take place at sender’s end and receiver’s end correspondingly.

The rest of the paper is organized as follows. In Section II and III, we have defined the related work and background for the proposed security system respectively. Our proposed system security algorithms and performance analysis are explained in Section IV and V respectively. Finally we conclude in Section VI.

Related Work

Several solutions are defined by Qian Wang et al, in [2] to ensure the data integrity of a file in cloud server. The first and straight forward solution to ensure the data integrity is, the data owner pre-compute the MACs for the entire file with a set of secrete keys, before our sourcing data to cloud server. During auditing process, for each time the data owner reveals the secret key to the cloud server and ask for new MAC for verification. The number of secrete keys limits the number of verification in this model. If the keys are exhausted, the entire file must be retrieved by the data owner from the cloud server.  The remaining blocks will be provided new MACS.  The system efficiency is affected because of huge number of communication overhead in this method.

An efficient solution without retrieving the data blocks from server to support the public audit-ability is designed by Qian Wang et al, in [4].. The design of dynamic data operations is a challenging task for cloud storage system. For verification with data dynamic support they proposed a RSA signature authenticator. To support the efficient handling for multiple auditing tasks, they extended the technique of bilinear aggregate signature and then they introduced a third party auditor to perform the multiple auditing task simultaneously.

In DES algorithms block cipher is of 64 bits [5] and key used is of 56 bits out of 64 bits of key is used rest of 8 bits are padded. In block cipher block of data is encrypted which consist of plain text by combination of confusion and diffusion to make cipher block then this cipher block has to pass 16 rounds, before passing through these 16 rounds the 64 bits of data is divided into 32 bits. After dividing the data into 32 bits, F-function (Feistel function) is applied. F-function consists of substitution, permutation, key mixing. The output of function is combined with other half of the data using XOR gate alternate crossing of data is done; then crossing of data is done.

To increase the revenue and degree of connectivity from cloud computing model while accessing and updating data from data center to the cloud user, Dubey et al. in [7] devel-oped a system using RSA and MD5 algorithms for avoiding unauthorized users to access data from cloud server. The main drawback of this method is that the cloud service provider has also an equal control of data as the data owner and the computation load for cloud service provider is proportional to the degree of connectivity so that the performance of the system can degrade.

Proposed Algorithm

Fig .1 Shows the complete architecture of proposed algorithm.

As in the architectural diagram the content of given document is read and the Ant initialized is traveled throw all the characters and increase the promone for each characters depend its type.  At final the size of the promone declares the encryption type.  As per the size of the promone either Character based encryption or Value base encryption has been done.

Fig 1. Architecture Diagram of proposed algorithm

ALGORITHM 1

Ant Colony model for data security in cloud

FC<=READ(File)

ET<=FINDINFLUENCE(FC)

If (ET equals “TM”)

EK=Random(Integer)

If (ET equals “NM”)

EK=Random(Char)

EF=Encrypt(FC,EK)

Where FC means File Content

ET means Encryption Type

“TM” means Text Major

“NM”means Value Major

EK means Encryption Key and

EF means Encrypted File

ALGORITHM 2

FindInfluence

Let ETA as  Ant

For All Text

If Ant travel Character

TPromon++

Else

VPromon++

If TPromon>VPromon)

Return “TM”

Else

Return “NM”

Where ETA means Encryption Type Ant

The file line of the Algorithm 1 tells that the contents of the file will be buffered (FC) for further operations.  After the contents were buffered the file is categorized whether it is TEXT Major File or Value Major File.  To do so two ants are initialized and let them to travel through all the contents that are buffered.  For every move any of the two ant will be increased depends the type of character.  Finally the if Text majore file encrypted with text based encryption element and value majore file encrypted with Number based encryption.  If both are equal in case there is both the encryption are invoked to give maximum security to the content.

The output earned using this algorithm shows that the size of the encrypted file is less compared to the traditional encrypted algorithms.  A tool is developed to show the accuracy of the proposed algorithm.

Evaluation and Results

A file taken to check the functionality of proposed algorithm

The below results are return by the tool

The key generated by the proposed algorithm is marked with gray in output screen for clear view.

The Encrypted content

The detailed functionality of the tool developed will be presented in separate paper

Conclusion

In this paper, we discuss the problem of data security in cloud storage system. To control the outsourced data and provide the quality of the cloud storage service for the users, we propose an efficient data encryption using Ant Colony Model and cryptographic techniques.  It is concluded that the proposed algorithm generate more secured encrypted content with reduced size and time taken is considerably low than the previous traditional algorithms.

Reference

[1] Alexa Huth and James Cebula ‘The Basics of Cloud Computing’, United States Computer Emergency Readiness Team. (2011).

[2] Cong Wang, Kui Ren, and Jia Wang, Secure and Practical Outsourcing of Linear Programming in cloud computing, In IEEE Internationa Conference on INFOCOM, pages 820-826, 2011.

[3] Q. Wang, C. Wang, J. Li, K. Ren,and W.Lou, Enabling Public Verifi-ability and Data Dynamics for Storage Security in Cloud Computing, In Proceeding of 14th European Symposium, Research in Computer-Security (ESORICS 09), pages 355-370, 2009.

[4] Neha Jain and Gurpreet Kaur, ‘Implementing DES Algorithm in Cloud for Data Security’, VSRD International Journal of CS & IT. (2012), Vol.2 Issue 4, pp. 316-321.

[5] Dubey A K, Dubey A K,Namdev M, Shrivastava S S, Cloud-user Security based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment, Software Engineering (CONSEG), CSI Sixth International Conference on, pages 18, September 2012

[6] M Armbrust, A Fox, R Grifth, A D Joseph, and R Katz, Above the Clouds: A Berkeley View of Cloud Computing, U C Berkeley Reliable Adaptive Distributed Systems Laboratory White Paper, 2009.

[7] Cong Wang, Ning Cao, Jin Li, Kui Ren and W Lou, Secure Ranked Keyword Search over Encrypted Cloud Data, In IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pages 253-262, 2010.

[8] Kuyoro S O, Ibikunle F, Awodele O, Cloud Computing Security Issues and Challenges, In International Journal of Computer Networks, vol. 3, issue 5, 2011.

[9] Cong Wang, Kui Ren, W Lou, Jin Li, Toward Publicly Auditable Secure Cloud Data Storage Services, In IEEE Computer Networks, pages 19-24, 2010.

...(download the rest of the essay above)

About this essay:

This essay was submitted to us by a student in order to help you with your studies.

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, . Available from:< https://www.essaysauce.com/essays/engineering/2017-4-28-1493393891.php > [Accessed 18.10.19].